{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:17:49Z","timestamp":1743113869792,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319079943"},{"type":"electronic","value":"9783319079950"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07995-0_35","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T23:24:31Z","timestamp":1402442671000},"page":"355-365","source":"Crossref","is-referenced-by-count":1,"title":["Specifying and Verifying Meta-Security by Means of Semantic Web Methods"],"prefix":"10.1007","author":[{"given":"Joaqu\u00edn","family":"Borrego-D\u00edaz","sequence":"first","affiliation":[]},{"given":"Antonia M.","family":"Ch\u00e1vez-Gonz\u00e1lez","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 Luis","family":"Pro-Mart\u00edn","sequence":"additional","affiliation":[]},{"given":"Virginia","family":"Matos-Arana","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","series-title":"AISC","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-642-16626-6_4","volume-title":"Computational Intelligence in Security for Information Systems 2010","author":"G.A. Aranda-Corral","year":"2010","unstructured":"Aranda-Corral, G.A., Borrego-D\u00edaz, J.: Mereotopological Analysis of Formal Concepts in Security Ontologies. In: Herrero, \u00c1., Corchado, E., Redondo, C., Alonso, \u00c1. (eds.) Computational Intelligence in Security for Information Systems 2010. AISC, vol.\u00a085, pp. 33\u201340. Springer, Heidelberg (2010)"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Blanco, C., Lasheras, J., Valencia, R., Fern\u00e1ndez, E., Toval, A., Piattini, M.: A Systematic Review and Comparison of Security Ontologies. In: Proc. 3rd. Int. Conf. on Availability, Reliability and Security, pp. 813\u2013820. IEEE Computer Society (2008)","DOI":"10.1109\/ARES.2008.33"},{"key":"35_CR3","unstructured":"D\u00edaz-Vico, J., F\u00edrvida-Pereira, D., Lozano-Merino, M.A.: Identification and reporting of security incidents for strategic operators. A basic guide for the protection of critical infrastructures. National Institute of Communication Tecnologies"},{"key":"35_CR4","unstructured":"D\u00edaz-Vico, J., F\u00edrvida-Pereira, D., Lozano-Merino, M.A.: The Operator Console. A Basic Guide to Critical Infrastructure Protection. National Institute of Communication Tecnologies"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proc. 4th Int. Symp. on Inf. Comp. & Comm. Security, ASIACCS 2009, pp. 183\u2013194. ACM (2009)","DOI":"10.1145\/1533057.1533084"},{"key":"35_CR6","unstructured":"Geers, K.: Strategic Cyber Security. NATO Cooperative Cyber Defence Centre of Excellence (2011)"},{"issue":"4","key":"35_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jisp.2007100101","volume":"1","author":"A. Herzog","year":"2007","unstructured":"Herzog, A., Shahmehri, N., Duma, C.: An Ontology of Information Security. Int. J. Information Security and Privacy\u00a01(4), 1\u201323 (2007)","journal-title":"Int. J. Information Security and Privacy"},{"issue":"1","key":"35_CR8","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.future.2010.12.017","volume":"29","author":"A. Herrero","year":"2013","unstructured":"Herrero, A., Navarro, M., Corchado, E., Juli\u00e1n, V.: RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Comp. Syst.\u00a029(1), 250\u2013261 (2013)","journal-title":"Future Generation Comp. Syst."},{"issue":"3","key":"35_CR9","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.is.2010.11.003","volume":"36","author":"W. Kim","year":"2011","unstructured":"Kim, W., Jeong, O.-R., Kim, C., So, J.: The dark side of the Internet: Attacks, costs and responses. Inf. Syst.\u00a036(3), 675\u2013705 (2011)","journal-title":"Inf. Syst."},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Mace, J.C., Parkin, S., van Moorsel, A.: A collaborative ontology development tool for information security managers. In: Proc. 4th Symp. Comp. Human Inter. for the Management of Information Technology, 10 pages. ACM (2010)","DOI":"10.1145\/1873561.1873566"},{"key":"35_CR11","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-04590-5_17","volume-title":"Metadata and Semantic Research","author":"T. Pereira","year":"2009","unstructured":"Pereira, T., Santos, H.: An Ontology Based Approach to Information Security. In: Sartori, F., Sicilia, M.\u00c1., Manouselis, N. (eds.) MTSR 2009. CCIS, vol.\u00a046, pp. 183\u2013192. Springer, Heidelberg (2009)"},{"key":"35_CR12","doi-asserted-by":"crossref","unstructured":"Sarmah, A., Hazarika, S.M., Sinha, S.K.: Security Pattern Lattice: A Formal Model to Organize Security Patterns. In: Proc. 19th Int. Conf. on Database and Expert Systems Application (DEXA 2008), pp. 292\u2013296. IEEE Computer Society (2008)","DOI":"10.1109\/DEXA.2008.74"},{"key":"35_CR13","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-642-25203-7_16","volume-title":"Complex Systems Design and Management","author":"S. Sadvandi","year":"2012","unstructured":"Sadvandi, S., Chapon, N., Pi\u00e8tre-Cambac\u00e9d\u00e8s, L.: Safety and security interdependencies in complex systems and SoS: challenges and perspectives. In: Complex Systems Design and Management, pp. 229\u2013241. Springer, Heidelberg (2012)"},{"issue":"11","key":"35_CR14","doi-asserted-by":"publisher","first-page":"2595","DOI":"10.1080\/00207540601020544","volume":"45","author":"G.E. Smith","year":"2007","unstructured":"Smith, G.E., Watson, K.J., Baker, W.H., Pokorski, J.A.: A critical balance: Collaboration and security in the IT-enabled supply chain. Int. J. Production Research\u00a045(11), 2595\u20132613 (2007)","journal-title":"Int. J. Production Research"}],"container-title":["Advances in Intelligent Systems and Computing","International Joint Conference SOCO\u201914-CISIS\u201914-ICEUTE\u201914"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07995-0_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T00:40:12Z","timestamp":1675816812000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07995-0_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319079943","9783319079950"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07995-0_35","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]}}}