{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:05:37Z","timestamp":1763348737841,"version":"3.35.0"},"reference-count":82,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T00:00:00Z","timestamp":1734912000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T00:00:00Z","timestamp":1734912000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"This study was funded by Natural Sciences and Engineering Research Council of Canada \u2013NSERC\u2013","award":["RGPIN-2020-06859"],"award-info":[{"award-number":["RGPIN-2020-06859"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s10115-024-02308-y","type":"journal-article","created":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T11:34:08Z","timestamp":1734953648000},"page":"167-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Building a comprehensive and multi-dimensional information security ontology: elicitation process and OWL implementation"],"prefix":"10.1007","volume":"67","author":[{"given":"Ines","family":"Meriah","sequence":"first","affiliation":[]},{"given":"Latifa","family":"Ben Arfa Rabai","sequence":"additional","affiliation":[]},{"given":"Ridha","family":"Khedri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,23]]},"reference":[{"issue":"1","key":"2308_CR1","first-page":"3","volume":"16","author":"RL Ackoff","year":"1989","unstructured":"Ackoff RL (1989) From data to wisdom. J Appl Syst Anal 16(1):3\u20139","journal-title":"J Appl Syst Anal"},{"key":"2308_CR2","unstructured":"Agrawal V (2016) Towards the ontology of iso\/iec 27005: 2011 risk management standard. In HAISA, pages 101\u2013111,"},{"key":"2308_CR3","doi-asserted-by":"publisher","first-page":"3901","DOI":"10.1007\/s10462-019-09782-9","volume":"53","author":"FN Al-Aswadi","year":"2020","unstructured":"Al-Aswadi FN, Chan HY, Gan KH (2020) Automatic ontology construction from text: a review from shallow to deep learning trend. Artif Intell Rev 53:3901\u20133928","journal-title":"Artif Intell Rev"},{"issue":"1","key":"2308_CR4","doi-asserted-by":"publisher","first-page":"107","DOI":"10.2307\/3250961","volume":"25","author":"M Alavi","year":"2001","unstructured":"Alavi M, Leidner DE (2001) Review: knowledge management and knowledge management systems: conceptual foundations and research issues. MIS Q 25(1):107\u2013136","journal-title":"MIS Q"},{"key":"2308_CR5","doi-asserted-by":"crossref","unstructured":"Amar F\u00a0B\u00a0B, Gargouri B, Hamadou A\u00a0B (2013) Domain ontology enrichment based on the semantic component of lmf-standardized dictionaries. In International Conference on Knowledge Science, Engineering and Management, pages 404\u2013419. Springer","DOI":"10.1007\/978-3-642-39787-5_33"},{"issue":"4","key":"2308_CR6","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1145\/162124.162127","volume":"25","author":"R Baskerville","year":"1993","unstructured":"Baskerville R (1993) Information systems security design methods: implications for information systems development. ACM Comput Surv (CSUR) 25(4):375\u2013414","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"2308_CR7","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1108\/13673270110384419","volume":"5","author":"GD Bhatt","year":"2001","unstructured":"Bhatt GD (2001) Knowledge management in organizations: examining the interaction between technologies, techniques, and people. J Knowl Manag 5(1):68\u201375","journal-title":"J Knowl Manag"},{"issue":"4","key":"2308_CR8","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1016\/j.csi.2010.12.002","volume":"33","author":"C Blanco","year":"2011","unstructured":"Blanco C, Lasheras J, Fern\u00e1ndez-Medina E, Valencia-Garc\u00eda R, Toval A (2011) Basis for an integrated security ontology according to a systematic review of existing proposals. Comput Standards Interfaces 33(4):372\u2013388","journal-title":"Comput Standards Interfaces"},{"key":"2308_CR9","doi-asserted-by":"crossref","unstructured":"Blanco C, Lasheras J, Valencia-Garc\u00eda R, Fern\u00e1ndez-Medina E, Toval A, Piattini M (2008) A systematic review and comparison of security ontologies. In 2008 Third International Conference on Availability, Reliability and Security, pages 813\u2013820. Ieee","DOI":"10.1109\/ARES.2008.33"},{"key":"2308_CR10","unstructured":"B\u00f6hm A (2004) 5.13 theoretical coding: Text analysis in grounded theory. A Companion to, 270,"},{"issue":"4","key":"2308_CR11","first-page":"27","volume":"2","author":"T Bray","year":"1997","unstructured":"Bray T, Paoli J, Sperberg-McQueen CM, Maler E, Yergeau F (1997) Extensible markup language (xml). World Wide Web Journal 2(4):27\u201366","journal-title":"World Wide Web Journal"},{"key":"2308_CR12","unstructured":"Center CSR (2020) Glossary. https:\/\/csrc.nist.gov\/glossary\/, [Online; accessed 03-March-2020]"},{"issue":"1","key":"2308_CR13","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/s11227-020-03261-7","volume":"77","author":"J Chen","year":"2021","unstructured":"Chen J, Gu J (2021) Adol: a novel framework for automatic domain ontology learning. J Supercomput 77(1):152\u2013169","journal-title":"J Supercomput"},{"issue":"2","key":"2308_CR14","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s12652-015-0330-7","volume":"9","author":"T Chen","year":"2018","unstructured":"Chen T, Honda K (2018) Solving data preprocessing problems in existing location-aware systems. J Ambient Intell Humaniz Comput 9(2):253\u2013259","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"2308_CR15","first-page":"1","volume":"16","author":"Y Cherdantseva","year":"2015","unstructured":"Cherdantseva Y, Hilton J (2015) Understanding information assurance and security. J. Organ End User Comput 16(3):1","journal-title":"J. Organ End User Comput"},{"key":"2308_CR16","unstructured":"Davenport T, Prusak L (1998) Working Knowledge: How Organizations Manage What They Know, volume\u00a01. ACM, 01"},{"key":"2308_CR17","doi-asserted-by":"crossref","unstructured":"de\u00a0Franco\u00a0Rosa F, Jino M (2017) A survey of security assessment ontologies. In Recent Advances in Information Systems and Technologies: Volume 1 5, pages 166\u2013173. Springer","DOI":"10.1007\/978-3-319-56535-4_17"},{"key":"2308_CR18","doi-asserted-by":"crossref","unstructured":"de\u00a0Franco\u00a0Rosa F, Jino M, Bonacin R (2018) Towards an ontology of security assessment: A core model proposal. In Information Technology-New Generations, pages 75\u201380. Springer","DOI":"10.1007\/978-3-319-77028-4_12"},{"issue":"2","key":"2308_CR19","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1108\/09685220810879627","volume":"16","author":"E dos Santos Moreira","year":"2008","unstructured":"dos Santos Moreira E, Andr\u00e9ia Fondazzi\u00a0Martimiano L, Jos\u00e9 dos Santos\u00a0Brand\u00e3o A, C\u00e9sar\u00a0Bernardes M (2008) Ontologies for information security management and governance. Inform Manag Comput Security 16(2):150\u2013165","journal-title":"Inform Manag Comput Security"},{"key":"2308_CR20","doi-asserted-by":"crossref","unstructured":"Dubois \u00c9, Heymans P, Mayer N, Matulevi\u010dius R (2010) A systematic approach to define the domain of information system security risk management. Intentional Perspectives on Information Systems Engineering, pages 289\u2013306","DOI":"10.1007\/978-3-642-12544-7_16"},{"key":"2308_CR21","doi-asserted-by":"crossref","unstructured":"Fenz S, Ekelhart A (2009) Formalizing information security knowledge. In Proceedings of the 4th international Symposium on information, Computer, and Communications Security, pages 183\u2013194","DOI":"10.1145\/1533057.1533084"},{"issue":"5","key":"2308_CR22","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1108\/ICS-02-2018-0020","volume":"26","author":"S Fenz","year":"2018","unstructured":"Fenz S, Neubauer T (2018) Ontology-based information security compliance determination and control selection on the example of iso 27002. Inform Comput Security 26(5):551\u2013567","journal-title":"Inform Comput Security"},{"key":"2308_CR23","doi-asserted-by":"crossref","unstructured":"Fenz S, Plieschnegger S, Hobel H (2016) Mapping information security standard iso 27002 to an ontological structure. Information & Computer Security","DOI":"10.1108\/ICS-07-2015-0030"},{"key":"2308_CR24","doi-asserted-by":"crossref","unstructured":"Fonou-Dombeu J\u00a0V, Viriri S (2019) Ontometrics evaluation of quality of e-government ontologies. In Electronic Government and the Information Systems Perspective: 8th International Conference, EGOVIS 2019, Linz, Austria, August 26\u201329, 2019, Proceedings 8, pages 189\u2013203. Springer","DOI":"10.1007\/978-3-030-27523-5_14"},{"key":"2308_CR25","unstructured":"I.\u00a0O. for Standardization\u00a0(ISO). Information technology \u2013 Security techniques -Code of practice for information security controls. ISO, (2013)"},{"key":"2308_CR26","unstructured":"I.\u00a0O. for Standardization\u00a0(ISO). Information technology \u2013Security techniques \u2013Information security management systems \u2013 Requirements. ISO, (2013)"},{"issue":"5","key":"2308_CR27","doi-asserted-by":"publisher","first-page":"788","DOI":"10.1093\/bib\/bbt026","volume":"15","author":"D Glez-Pe\u00f1a","year":"2014","unstructured":"Glez-Pe\u00f1a D, Louren\u00e7o A, L\u00f3pez-Fern\u00e1ndez H, Reboiro-Jato M, Fdez-Riverola F (2014) Web scraping technologies in an api world. Brief Bioinform 15(5):788\u2013797","journal-title":"Brief Bioinform"},{"issue":"2","key":"2308_CR28","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber TR (1993) A translation approach to portable ontology specifications. Knowl Acquis 5(2):199\u2013220","journal-title":"Knowl Acquis"},{"issue":"4","key":"2308_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jisp.2007100101","volume":"1","author":"A Herzog","year":"2007","unstructured":"Herzog A, Shahmehri N, Duma C (2007) An ontology of information security. Int J Info Security Privacy (IJISP) 1(4):1\u201323","journal-title":"Int J Info Security Privacy (IJISP)"},{"key":"2308_CR30","unstructured":"Horridge M, Knublauch H, Rector A, Stevens R, Wroe C (2004) A practical guide to building owl ontologies using the prot\u00e9g\u00e9-owl plugin and co-ode tools edition 1.0. University of Manchester"},{"key":"2308_CR31","unstructured":"International Organization for Standardization. Risk Management \u2013 Guidelines. ISO, (2018)"},{"key":"2308_CR32","doi-asserted-by":"crossref","unstructured":"Iqbal M, Matulevi\u010dius R (2019) Blockchain-based application security risks: a systematic literature review. In Advanced Information Systems Engineering Workshops: CAiSE 2019 International Workshops, Rome, Italy, June 3-7, 2019, Proceedings 31, pages 176\u2013188. Springer","DOI":"10.1007\/978-3-030-20948-3_16"},{"key":"2308_CR33","doi-asserted-by":"crossref","unstructured":"Iqbal M, Matulevi\u010dius R (2020) Corda security ontology: Example of post-trade matching and confirmation. Baltic Journal of Modern Computing 8(4)","DOI":"10.22364\/bjmc.2020.8.4.11"},{"key":"2308_CR34","doi-asserted-by":"crossref","unstructured":"Iqbal M, Matulevi\u010dius R (2020) Managing security risks in post-trade matching and confirmation using cordapp. In Databases and Information Systems: 14th International Baltic Conference, DB &IS 2020, Tallinn, Estonia, June 16\u201319, 2020, Proceedings 14, pages 325\u2013339. Springer","DOI":"10.1007\/978-3-030-57672-1_24"},{"key":"2308_CR35","unstructured":"ISO Central Secretary. Information technology \u2013security techniques \u2013 information security management systems \u2013overview and vocabulary. Standard ISO\/IEC 27000:2018, International Organization for Standardization, Geneva, CH (2018)"},{"key":"2308_CR36","unstructured":"Jouini M, Ben Arfa Rabai L, Khedri R (2020) A quantitative assessment of security risks based on a multifaceted classification approach. International Journal of Information Security, pages 1\u201318, (Impact Factor: 2.42)"},{"issue":"4","key":"2308_CR37","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s10207-020-00515-6","volume":"20","author":"M Jouini","year":"2021","unstructured":"Jouini M, Ben Arfa\u00a0Rabai L, Khedri R (2021) A quantitative assessment of security risks based on a multifaceted classification approach. Int J Inf Secur 20(4):493\u2013510","journal-title":"Int J Inf Secur"},{"key":"2308_CR38","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.procs.2015.05.024","volume":"52","author":"M Jouini","year":"2015","unstructured":"Jouini M, Rabai LBA, Khedri R (2015) A multidimensional approach towards a quantitative assessment of security threats. Procedia Comput Sci 52:507\u2013514","journal-title":"Procedia Comput Sci"},{"key":"2308_CR39","doi-asserted-by":"publisher","first-page":"100339","DOI":"10.1016\/j.cosrev.2020.100339","volume":"39","author":"AC Khadir","year":"2021","unstructured":"Khadir AC, Aliane H, Guessoum A (2021) Ontology learning: grand tour and challenges. Comput Sci Rev 39:100339","journal-title":"Comput Sci Rev"},{"key":"2308_CR40","doi-asserted-by":"crossref","unstructured":"Khedri R, Chiang F, Sabri K\u00a0E (2013) An algebraic approach for data cleansing. In the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, volume\u00a021 of Procedia Computer Science, pages 50 \u2013 59. Procedia Computer Science, October","DOI":"10.1016\/j.procs.2013.09.009"},{"issue":"9","key":"2308_CR41","doi-asserted-by":"publisher","first-page":"5568","DOI":"10.3390\/app13095568","volume":"13","author":"A Kurylets","year":"2023","unstructured":"Kurylets A, Goranin N (2023) Security ontology ontosecrpa for robotic process automation domain. Appl Sci 13(9):5568","journal-title":"Appl Sci"},{"key":"2308_CR42","first-page":"1","volume":"1684","author":"B Lantow","year":"2016","unstructured":"Lantow B (2016) Ontometrics: application of on-line ontology metric calculation. In BIR Workshops 1684:1\u201312","journal-title":"In BIR Workshops"},{"key":"2308_CR43","unstructured":"Law J (2024) A dictionary of business and management (5 ed.). https:\/\/www.oxfordreference.com\/display\/10.1093\/acref\/9780199234899.001.0001\/acref-9780199234899, [Online; accessed 03-March-2024]"},{"key":"2308_CR44","unstructured":"Lawson R (2015) Web scraping with Python. Packt Publishing Ltd"},{"key":"2308_CR45","unstructured":"Khedri R (2022) A review on ontology modularization techniques-a multi-dimensional perspective. IEEE Transactions on Knowledge and Data Engineering"},{"key":"2308_CR46","doi-asserted-by":"publisher","first-page":"110566","DOI":"10.1016\/j.jss.2020.110566","volume":"165","author":"T Li","year":"2020","unstructured":"Li T, Chen Z (2020) An ontology-based learning approach for automatically classifying security requirements. J Syst Softw 165:110566","journal-title":"J Syst Softw"},{"key":"2308_CR47","doi-asserted-by":"crossref","unstructured":"Lozano J, Carbonera J, Abel M, Pimenta M (2014) Ontology view extraction: an approach based on ontological meta-properties. In 2014 IEEE 26th International Conference on Tools with Artificial Intelligence, pages 122\u2013129. IEEE","DOI":"10.1109\/ICTAI.2014.28"},{"issue":"2","key":"2308_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdm.2004040101","volume":"15","author":"A Lozano-Tello","year":"2004","unstructured":"Lozano-Tello A, G\u00f3mez-P\u00e9rez A (2004) Ontometric: a method to choose the appropriate ontology. J Database Manag (JDM) 15(2):1\u201318","journal-title":"J Database Manag (JDM)"},{"key":"2308_CR49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61717-6","volume-title":"Fundamentals of secure system modelling","author":"R Matulevi\u010dius","year":"2017","unstructured":"Matulevi\u010dius R (2017) Fundamentals of secure system modelling. Springer, Cham"},{"issue":"4","key":"2308_CR50","first-page":"1","volume":"52","author":"M McDaniel","year":"2019","unstructured":"McDaniel M, Storey VC (2019) Evaluating domain ontologies: clarification, classification, and challenges. ACM Computi Surv (CSUR) 52(4):1\u201344","journal-title":"ACM Computi Surv (CSUR)"},{"key":"2308_CR51","unstructured":"McGuinness D\u00a0L, Van\u00a0Harmelen F, et\u00a0al (2004) Owl web ontology language overview. W3C recommendation, 10(10):2004"},{"key":"2308_CR52","doi-asserted-by":"crossref","unstructured":"Meriah I, Rabai L\u00a0B\u00a0A (2018) A survey of quantitative security risk analysis models for computer systems. In Proceedings of the 2nd International Conference on Advances in Artificial Intelligence, pages 36\u201340","DOI":"10.1145\/3292448.3292456"},{"key":"2308_CR53","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.procs.2019.09.447","volume":"160","author":"I Meriah","year":"2019","unstructured":"Meriah I, Rabai LBA (2019) Comparative study of ontologies based iso 27000 series security standards. Procedia Comput Sci 160:85\u201392","journal-title":"Procedia Comput Sci"},{"key":"2308_CR54","doi-asserted-by":"crossref","unstructured":"Meriah I, Rabai L\u00a0B\u00a0A, Khedri R (2021) Towards an automatic approach to the design of a generic ontology for information security. In 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS), pages 1\u20138. IEEE","DOI":"10.1109\/RDAAPS48126.2021.9452006"},{"key":"2308_CR55","doi-asserted-by":"crossref","unstructured":"Meriah I, Rabai L\u00a0BA, Kh\u00e9dri R (2023) An owl multi-dimensional information security ontology. In ENASE, pages 372\u2013380","DOI":"10.5220\/0011841300003464"},{"key":"2308_CR56","doi-asserted-by":"crossref","unstructured":"Meriah I, Rabai L\u00a0B\u00a0A, Khedri R (2024) Multi-dimensional Information Security Ontology (MDISOnt). https:\/\/github.com\/inesmeriah\/MDISOnt","DOI":"10.5220\/0011841300003464"},{"key":"2308_CR57","unstructured":"Meriah I, Rabai L\u00a0B\u00a0A, Khedri R (2024) XML hiearchies of Information Security Concepts. https:\/\/github.com\/inesmeriah\/MDISOnt\/blob\/main\/XMLHierarchies.xml"},{"key":"2308_CR58","doi-asserted-by":"crossref","unstructured":"Mhaskar N, Alabbad M, Khedri R (2021) A formal approach to network segmentation. Computers & Security, pages 1\u201320, (Impact Factor: 4.438)","DOI":"10.1016\/j.cose.2020.102162"},{"key":"2308_CR59","unstructured":"Mhaskar N, Khedri R, Alabbad M (2024) Hardening of network segmentation using automated referential penetration testing. Journal of Network and Computer Applications, pages 1\u201327. Received 29 August 2023, Revised 30 January 2024, Accepted 5 February 2024, Available online 20 February 2024"},{"key":"2308_CR60","doi-asserted-by":"crossref","unstructured":"Milicevic D, Goeken M (2010) Ontology-based evaluation of iso 27001. In Conference on e-Business, e-Services and e-Society, pages 93\u2013102. Springer","DOI":"10.1007\/978-3-642-16283-1_13"},{"key":"2308_CR61","unstructured":"Mitchell R (2018) Web scraping with Python: Collecting more data from the modern web. \" O\u2019Reilly Media, Inc.\","},{"key":"2308_CR62","doi-asserted-by":"crossref","unstructured":"Mohammed\u00a0Alabbad N\u00a0M, Khedri R (2023) Two formal design solutions for the generalization of network segmentation. Journal of Network and Computer Applications, pages 1\u201334","DOI":"10.2139\/ssrn.4487597"},{"key":"2308_CR63","unstructured":"Nguyen V (2011) Ontologies and information systems: a literature survey. Technical report, Departement of Defence, Defence Science and Technology Organisation"},{"key":"2308_CR64","unstructured":"Noy N, McGuinness D\u00a0L, et\u00a0al (2001) Ontology development 101. Knowledge Systems Laboratory, Stanford University, 2001"},{"key":"2308_CR65","unstructured":"N.\u00a0I. of\u00a0Standards and Technology. Framework for improving critical infrastructure cybersecurity, version 1.1. Technical report, NIST (2020)"},{"issue":"2","key":"2308_CR66","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.tifs.2012.10.003","volume":"29","author":"P Olsen","year":"2013","unstructured":"Olsen P, Borit M (2013) How to define traceability. Trends Food Sci Technol 29(2):142\u2013150","journal-title":"Trends Food Sci Technol"},{"key":"2308_CR67","unstructured":"OntoMetrics. https:\/\/ontometrics.informatik.uni-rostock.de\/ontologymetrics\/, Accessed July 5, 2023"},{"key":"2308_CR68","unstructured":"Orobinska O, Chauchat J-H, Sharonova N (2017) Methods and models of automatic ontology construction for specialized domains (case of the radiation security). In Computational linguistics andintelligent systems (COLINS 2017). National Technical University KhPI"},{"key":"2308_CR69","doi-asserted-by":"crossref","unstructured":"Paulsen C (2018) Glossary of key information security terms. Technical report, National Institute of Standards and Technology","DOI":"10.6028\/NIST.IR.7298r3"},{"key":"2308_CR70","doi-asserted-by":"crossref","unstructured":"Petasis G, Karkaletsis V, Paliouras G, Krithara A, Zavitsanos E (2011) Ontology population and enrichment: State of the art. Knowledge-driven multimedia information extraction and ontology evolution, pages 134\u2013166","DOI":"10.1007\/978-3-642-20795-2_6"},{"key":"2308_CR71","unstructured":"Prot\u00e9g\u00e9 (2016 ) A free, open-source ontology editor and framework for building intelligent systems, (accessed January 5, 2020). https:\/\/protege.stanford.edu\/"},{"issue":"6","key":"2308_CR72","first-page":"813","volume":"8","author":"S Ramanauskait\u0117","year":"2013","unstructured":"Ramanauskait\u0117 S, Olifer D, Goranin N, \u010cenys A (2013) Security ontology for adaptive mapping of security standards. Int J Comput Commun Control (IJCCC) 8(6):813\u2013825","journal-title":"Int J Comput Commun Control (IJCCC)"},{"key":"2308_CR73","doi-asserted-by":"crossref","unstructured":"Sanagavarapu L\u00a0M, Iyer V, Reddy Y\u00a0R (2021) Ontoenricher: A deep learning approach for ontology enrichment from unstructured text. arXiv preprint arXiv:2102.04081","DOI":"10.1201\/9781003155799-9"},{"issue":"11","key":"2308_CR74","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1109\/78.650093","volume":"45","author":"M Schuster","year":"1997","unstructured":"Schuster M, Paliwal KK (1997) Bidirectional recurrent neural networks. IEEE Trans Signal Process 45(11):2673\u20132681","journal-title":"IEEE Trans Signal Process"},{"key":"2308_CR75","volume-title":"Enterprise security architecture: a business-driven approach","author":"J Sherwood","year":"2019","unstructured":"Sherwood J, Clark A, Lynas D (2019) Enterprise security architecture: a business-driven approach. CRC Press, Boca Raton"},{"key":"2308_CR76","doi-asserted-by":"crossref","unstructured":"Sikos L (2015) Mastering structured data on the Semantic Web: From HTML5 microdata to linked open data. Apress","DOI":"10.1007\/978-1-4842-1049-9"},{"key":"2308_CR77","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.cose.2004.05.002","volume":"23","author":"B Solms","year":"2004","unstructured":"Solms B (2004) The 10 deadly sins of information security management. Comput Security 23:371\u2013376","journal-title":"Comput Security"},{"issue":"11","key":"2308_CR78","doi-asserted-by":"publisher","first-page":"3001","DOI":"10.1007\/s10115-021-01615-y","volume":"63","author":"G Stratogiannis","year":"2021","unstructured":"Stratogiannis G, Kouris P, Alexandridis G, Siolas G, Stamou G, Stafylopatis A (2021) Semantic enrichment of documents: a classification perspective for ontology-based imbalanced semantic descriptions. Knowl Inf Syst 63(11):3001\u20133039","journal-title":"Knowl Inf Syst"},{"key":"2308_CR79","unstructured":"Syed Z, Padia A, Finin T, Mathews L, Joshi A (2016) Uco: A unified cybersecurity ontology. UMBC Student Collection"},{"key":"2308_CR80","doi-asserted-by":"crossref","unstructured":"Tsoumas B, Gritzalis D (2006) Towards an ontology-based security management. In 20th International Conference on Advanced Information Networking and Applications-Volume 1 (AINA\u201906), volume\u00a01, pages 985\u2013992. IEEE","DOI":"10.1109\/AINA.2006.329"},{"issue":"2","key":"2308_CR81","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1017\/S0269888900007797","volume":"11","author":"M Uschold","year":"1996","unstructured":"Uschold M, Gruninger M (1996) Ontologies: principles, methods and applications. Knowl Eng Rev 11(2):93\u2013136","journal-title":"Knowl Eng Rev"},{"issue":"10","key":"2308_CR82","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/2629489","volume":"57","author":"D Vrande\u010di\u0107","year":"2014","unstructured":"Vrande\u010di\u0107 D, Kr\u00f6tzsch M (2014) Wikidata: a free collaborative knowledgebase. Commun ACM 57(10):78\u201385","journal-title":"Commun ACM"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02308-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10115-024-02308-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-024-02308-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T12:04:26Z","timestamp":1738325066000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10115-024-02308-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,23]]},"references-count":82,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["2308"],"URL":"https:\/\/doi.org\/10.1007\/s10115-024-02308-y","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2024,12,23]]},"assertion":[{"value":"30 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest regarding the publication of this paper. The information about relevant data has been provided by the authors in the manuscript.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}