{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:04:05Z","timestamp":1743033845440,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319241289"},{"type":"electronic","value":"9783319241296"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24129-6_5","type":"book-chapter","created":{"date-parts":[[2015,9,3]],"date-time":"2015-09-03T03:55:33Z","timestamp":1441252533000},"page":"51-61","source":"Crossref","is-referenced-by-count":5,"title":["What are Information Security Ontologies Useful for?"],"prefix":"10.1007","author":[{"given":"Miguel-Angel","family":"Sicilia","sequence":"first","affiliation":[]},{"given":"Elena","family":"Garc\u00eda-Barriocanal","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Bermejo-Higuera","sequence":"additional","affiliation":[]},{"given":"Salvador","family":"S\u00e1nchez-Alonso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,3]]},"reference":[{"key":"5_CR1","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-05515-2_7","volume-title":"Soft Computing in Artificial Intelligence","author":"L Atymtayeva","year":"2014","unstructured":"Atymtayeva, L., Kozhakhmet, K., Bortsova, G.: Building a knowledge base for expert system in information security. In: Cho, Y.I., Matson, E.T. (eds.) Soft Computing in Artificial Intelligence. AISC, vol. 270, pp. 57\u201376. Springer, Heidelberg (2014)"},{"key":"5_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-19686-2_1","volume-title":"Practical Aspects of Declarative Languages","author":"M Balduccini","year":"2015","unstructured":"Balduccini, M., Kushner, S., Speck, J.: Ontology-driven data semantics discovery for cyber-security. In: Pontelli, E., Son, T.C. (eds.) PADL 2015. LNCS, vol. 9131, pp. 1\u201316. Springer, Heidelberg (2015)"},{"key":"5_CR3","unstructured":"Benammar, O., Elasri, H., Jebbar, M., Sekkaki, A.: Security Policies Matching Through Ontologies Alignment To Support Security Experts. Journal of Theoretical & Applied Information Technology 71(1) (2015)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Di Modica, G., Tomarchio, O.: Matchmaking semantic security policies in heterogeneous clouds. Future Generation Computer Systems (in press, 2015)","DOI":"10.1016\/j.future.2015.03.008"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"El\u00e7i, A.: Isn\u2019t the time ripe for a standard ontology on security of information and networks? In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 1. ACM (2014)","DOI":"10.1145\/2659651.2664291"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proceedings of the 4th ACM International Symposium on Information, Computer, and Communications Security, pp. 183\u2013194 (2009)","DOI":"10.1145\/1533057.1533084"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsborough, W., Thuraisingham, B.: R OWL BAC: representing role based access control in OWL. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 73\u201382, June 2008","DOI":"10.1145\/1377836.1377849"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Gyrard, A., Bonnet, C., Boudaoud, K.: An ontology-based approach for helping to secure the ETSI machine-to-machine architecture. In: Proc. of the 2014 IEEE International Conference on Internet of Things (iThings) and Green Computing and Communications (GreenCom), IEEE and Cyber, Physical and Social Computing (CPSCom), pp. 109\u2013116 (2014)","DOI":"10.1109\/iThings.2014.25"},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/2428556.2428563","volume":"56","author":"P Hyman","year":"2013","unstructured":"Hyman, P.: Cybercrime: it\u2019s serious, but exactly how serious? Communications of the ACM 56(3), 18\u201320 (2013)","journal-title":"Communications of the ACM"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Iannacone, M., Bohn, S., Nakamura, G., Gerth, J., Huffer, K., Bridges, R., Ferragut, E., Goodall, J.: Developing an ontology for cyber security knowledge graphs. In: Proc. of the 10th Annual Cyber and Information Security Research Conference, p. 12. ACM, April 2015","DOI":"10.1145\/2746266.2746278"},{"key":"5_CR11","unstructured":"Kamongi, P., Gomathisankaran, M., Kavi, K.: Nemesis: automated architecture for threat modeling and risk assessment for cloud computing. In: Proc. of the 6th ASE International Conference on Privacy, Security, Risk and Trust (PASSAT), Cambridge, MA, USA (2015)"},{"issue":"3","key":"5_CR12","first-page":"1","volume":"10","author":"K Kumar","year":"2015","unstructured":"Kumar, K., Vijayalakshmi, K., Bharathi, R.: Semantic Intrusion Detection for the Application Layer-Service Level Attack Detection. Journal of Convergence Information Technology 10(3), 1\u20138 (2015)","journal-title":"Journal of Convergence Information Technology"},{"key":"5_CR13","unstructured":"Mann, D.E., Christey, S.M.: Towards a common enumeration of vulnerabilities. In: Proc. of the 2nd Workshop on Research with Security Vulnerability Databases, Purdue University, West Lafayette, Indiana (1999)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Montesino, R., Fenz, S.: Information security automation: how far can we go? In: Proc. of the Sixth IEEE International Conference on Availability, Reliability and Security (ARES), pp. 280\u2013285 (2011)","DOI":"10.1109\/ARES.2011.48"},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/j.cose.2014.05.005","volume":"45","author":"A Razzaq","year":"2014","unstructured":"Razzaq, A., Anwar, Z., Ahmad, H.F., Latif, K., Munir, F.: Ontology for attack detection: An intelligent approach to web application security. Computers & Security 45, 124\u2013146 (2014)","journal-title":"Computers & Security"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.istr.2009.03.003","volume":"14","author":"A Shabtai","year":"2009","unstructured":"Shabtai, A., Moskovitch, R., Elovici, Y., Glezer, C.: Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey. Information Security Tech. Report 14(1), 16\u201329 (2009)","journal-title":"Information Security Tech. Report"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Salini, P., Shenbagam, J.: Prediction and Classification of Web Application Attacks using Vulnerability Ontology. International Journal of Computer Applications 116(21) (2015)","DOI":"10.5120\/20464-2832"},{"key":"5_CR18","unstructured":"Schiavone, S., Garg, L., Summers, K.: Ontology of Information Security in Enterprises. Electronic Journal Information Systems Evaluation 17(1) (2014)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Sharma, S., Trivedi, M., Kurup, L.: Using Ontologies to Model Attacks in an Internet based Mobile Ad-hoc Network (iMANET). International Journal of Computer Applications 110(2) (2015)","DOI":"10.5120\/19287-0705"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Shenbagam, J., Salini, P.: Vulnerability ontology for web applications to predict and classify attacks. In: Proc. of the 2014 International Conference on Electronics, Communication and Computational Engineering (ICECCE), pp. 268\u2013272. IEEE (2014)","DOI":"10.1109\/ICECCE.2014.7086625"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/978-3-319-15618-7_13","volume-title":"Engineering Secure Software and Systems","author":"A Souag","year":"2015","unstructured":"Souag, A., Salinesi, C., Mazo, R., Comyn-Wattiau, I.: A security ontology for security requirements elicitation. In: Piessens, F., Caballero, J., Bielova, N. (eds.) ESSoS 2015. LNCS, vol. 8978, pp. 157\u2013177. Springer, Heidelberg (2015)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Souag, A., Mazo, R., Salinesi, C., Comyn-Wattiau, I.: Reusable knowledge in security requirements engineering: a systematic mapping study. Requirements Engineering, 1\u201333 (2015)","DOI":"10.1007\/s00766-015-0220-8"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Kadobayashi, Y.: Reference Ontology for Cybersecurity Operational Information. The Computer Journal, bxu101 (2014)","DOI":"10.1093\/comjnl\/bxu101"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Kadobayashi, Y.: Mechanism for linking and discovering structured cybersecurity information over networks. In: Proc. of the 2014 IEEE International Conference on Semantic Computing (ICSC), pp. 279\u2013284 (2014)","DOI":"10.1109\/ICSC.2014.66"},{"key":"5_CR25","unstructured":"Tong, W., Liang, X., Li, X., Zhao, J., Liang, X.: An analysis method of NAC configuration conflict based on ontology. In: Proc. of the 3rd International Conference on Digital Enterprise and Information Systems (DEIS2015), p. 46 (2015)"},{"issue":"4","key":"5_CR26","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1080\/10439463.2013.780222","volume":"23","author":"DS Wall","year":"2013","unstructured":"Wall, D.S., Williams, M.L.: Policing cybercrime: networked and social media technologies and the challenges for policing. Policing and Society 23(4), 409\u2013412 (2013)","journal-title":"Policing and Society"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Yao, Y., Ma, X., Liu, H., Yi, J., Zhao, X., Liu, L.: A semantic knowledge base construction method for information security. In: Proc. of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 803\u2013808 (2014)","DOI":"10.1109\/TrustCom.2014.106"},{"key":"5_CR28","first-page":"022","volume":"1","author":"XQ Zhang","year":"2014","unstructured":"Zhang, X.Q., Xu, J.Y., Gu, C.H.: Information Security Vulnerability Association Analysis Based on Ontology Technology. Journal of East China University of Science and Technology (Natural Science Edition) 1, 022 (2014)","journal-title":"Journal of East China University of Science and Technology (Natural Science Edition)"}],"container-title":["Communications in Computer and Information Science","Metadata and Semantics Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24129-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:34:45Z","timestamp":1559237685000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24129-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319241289","9783319241296"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24129-6_5","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]}}}