{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:06:39Z","timestamp":1725537999030},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642040191"},{"type":"electronic","value":"9783642040207"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04020-7_99","type":"book-chapter","created":{"date-parts":[[2009,9,14]],"date-time":"2009-09-14T18:43:19Z","timestamp":1252953799000},"page":"920-927","source":"Crossref","is-referenced-by-count":6,"title":["Ontology-Based Decision Support for Security Management in Heterogeneous Networks"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Chora\u015b","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Flizikowski","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]},{"given":"Witold","family":"Ho\u0142ubowicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"99_CR1","unstructured":"FP7 INTERSECTION Deliverable D.2.2: Identification and classification of vulnerabilities of network infrastructures (2008)"},{"key":"99_CR2","unstructured":"Flizikowski, A., et al.: On Applying Ontologies to Security and QoS Management in Heterogeneous Networks. In: Information Systems Architecture and Technology - Information Systems and Computer Communications Network, 189-200, ISBN 978-83-7493-416-9 (2008)"},{"key":"99_CR3","unstructured":"Michal, C., et al.: Ontology-based description of networks vulnerabilities. Polish Journal of Environmental Studies\u00a05c (2008)"},{"key":"99_CR4","unstructured":"ISO\/IEC 13335-1:2004, Information Technology Security Techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management"},{"key":"99_CR5","unstructured":"Shared Information\/Data Model TeleManagement Forum (2002)"},{"key":"99_CR6","unstructured":"http:\/\/nvd.nist.gov\/"},{"key":"99_CR7","unstructured":"FP7 INTERSECTION (INfrastructure for heTErogeneous, Reislient, Secure, Complex, Tightly Inter-Operating Networks) Project Description of Work."},{"key":"99_CR8","doi-asserted-by":"crossref","unstructured":"Ekelhart, A., et al.: Security Ontologies: Improving Quantative Risk Analy-sis. In: Proc. of the 40th Hawaii International Conference on System Sciences (2007)","DOI":"10.1109\/HICSS.2007.478"},{"key":"99_CR9","unstructured":"http:\/\/protege.stanford.edu\/"},{"key":"99_CR10","unstructured":"OWL Web Ontology Language Semantics and Abstract Syntax (2006), http:\/\/www.w3.org\/TR\/owl-features\/"},{"key":"99_CR11","unstructured":"SWRL: A Semantic Web Rule Language Combning OWL and RuleML, W3C Member Submission, http:\/\/www.w3.org\/Submission\/SWRL\/"},{"key":"99_CR12","doi-asserted-by":"crossref","unstructured":"Spector, A.Z.: Achieving application requirements. Distributed Systems, 0-201-41660-3, 19-33 (1990)","DOI":"10.1145\/90417.90738"},{"key":"99_CR13","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/5254.988453","volume":"1904","author":"A. Gomez","year":"2002","unstructured":"Gomez, A., Corcho, O.: Ontology languages for the Semantic Web. IEEE Intelligent Systems\u00a01904, 54\u201360 (2002)","journal-title":"IEEE Intelligent Systems"}],"container-title":["Lecture Notes in Computer Science","Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04020-7_99.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:37:53Z","timestamp":1606185473000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04020-7_99"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642040191","9783642040207"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04020-7_99","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}