{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T23:51:38Z","timestamp":1770681098752,"version":"3.49.0"},"reference-count":109,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T00:00:00Z","timestamp":1656720000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T00:00:00Z","timestamp":1656720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Accenture Israel Cyber R &D Lab"},{"name":"Project Digital Knowledge Graph - Adaptable Analytics API","award":["ERDF and the European Union NextGenerationEU\/PRTR"],"award-info":[{"award-number":["ERDF and the European Union NextGenerationEU\/PRTR"]}]},{"name":"Project Digital Knowledge Graph - Adaptable Analytics API","award":["MICIN\/AEI\/ 10.13039\/501100011033"],"award-info":[{"award-number":["MICIN\/AEI\/ 10.13039\/501100011033"]}]},{"name":"Project Digital Knowledge Graph - Adaptable Analytics API","award":["Spanish State Research Agency"],"award-info":[{"award-number":["Spanish State Research Agency"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Softw Syst Model"],"published-print":{"date-parts":[[2022,8]]},"DOI":"10.1007\/s10270-022-01013-0","type":"journal-article","created":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T09:05:57Z","timestamp":1656752757000},"page":"1437-1464","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A framework for conceptual characterization of ontologies and its application in the cybersecurity domain"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9190-1047","authenticated-orcid":false,"given":"Beatriz Franco","family":"Martins","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1631-7139","authenticated-orcid":false,"given":"Lenin Javier","family":"Serrano Gil","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9598-1301","authenticated-orcid":false,"given":"Jos\u00e9 Fabi\u00e1n","family":"Reyes Rom\u00e1n","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7043-6227","authenticated-orcid":false,"given":"Jos\u00e9 Ignacio","family":"Panach","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1320-8471","authenticated-orcid":false,"given":"Oscar","family":"Pastor","sequence":"additional","affiliation":[]},{"given":"Moshe","family":"Hadad","sequence":"additional","affiliation":[]},{"given":"Benny","family":"Rochwerger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,2]]},"reference":[{"key":"1013_CR1","unstructured":"Agrawal, V.: Towards the ontology of ISO\/IEC 27005:2011 risk management standard. In: HAISA (2016)"},{"issue":"3","key":"1013_CR2","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.csi.2012.01.007","volume":"35","author":"JPA Almeida","year":"2013","unstructured":"Almeida, J.P.A., Guizzardi, G.: An ontological analysis of the notion of community in the RM-ODP enterprise language. Comput. Stand. Interfaces 35(3), 257\u2013268 (2013)","journal-title":"Comput. Stand. Interfaces"},{"key":"1013_CR3","unstructured":"Almeida, J.P.A, Guizzardi, G., Sales, T.P., Falbo, R.A.: gUFO: A Lightweight Implementation of the Unified Foundational Ontology (UFO). Technical Repot Version 1, Federal University of Espirito Santo (2019). https:\/\/nemo-ufes.github.io\/gufo\/"},{"key":"1013_CR4","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-319-51100-9_15","volume":"694","author":"RF Babiceanu","year":"2017","unstructured":"Babiceanu, R.F., Seker, R.: Cybersecurity and resilience modelling for software-defined networks-based manufacturing applications. Stud. Comput. Intell. 694, 167\u2013176 (2017). https:\/\/doi.org\/10.1007\/978-3-319-51100-9_15","journal-title":"Stud. Comput. Intell."},{"key":"1013_CR5","unstructured":"Ben-Asher, N., Oltramari, A., Erbacher, R.F., Gonzalez, C.: Ontology-based adaptive systems of cyber defense. In: STIDS, pp. 34\u201341 (2015)"},{"key":"1013_CR6","doi-asserted-by":"crossref","unstructured":"Benevides, A.B., Guizzardi, G.: A model-based tool for conceptual modeling and domain ontology engineering in OntoUML. In: Enterprise Information Systems, pp. 528\u2013538 (2009)","DOI":"10.1007\/978-3-642-01347-8_44"},{"key":"1013_CR7","doi-asserted-by":"crossref","unstructured":"Bergner, S., Lechner, U.: Cybersecurity ontology for critical infrastructures. In: KEOD, pp. 80\u201385 (2017)","DOI":"10.5220\/0006510400800085"},{"key":"1013_CR8","doi-asserted-by":"crossref","unstructured":"Bizer, C., Heath, T., Berners-Lee, T.: Linked data: the story so far. In: Semantic Services, Interoperability and Web Applications: Emerging Concepts, pp. 205\u2013227. IGI Global (2011)","DOI":"10.4018\/978-1-60960-593-3.ch008"},{"key":"1013_CR9","doi-asserted-by":"crossref","unstructured":"Blanco, C., Lasheras, J., Valencia-Garc\u00eda, R., Fern\u00e1ndez-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: 3th International Conference on Availability, Reliability and Security, pp. 813\u2013820. IEEE (2008)","DOI":"10.1109\/ARES.2008.33"},{"key":"1013_CR10","unstructured":"Booth, H., Turner, C.: Vulnerability description ontology (VDO). In: A Framework for Characterizing Vulnerabilities NIST (2016)"},{"key":"1013_CR11","first-page":"279","volume-title":"Ontological Foundations of DOLCE","author":"S Borgo","year":"2010","unstructured":"Borgo, S., Masolo, C.: Ontological Foundations of DOLCE, pp. 279\u2013295. Springer, Dordrecht (2010)"},{"key":"1013_CR12","volume-title":"Construction of Engineering Ontologies for Knowledge Sharing and Reuse","author":"WN Borst","year":"1997","unstructured":"Borst, W.N.: Construction of Engineering Ontologies for Knowledge Sharing and Reuse. CTIT, Centre for Telematics and Information Technology, New Delhi (1997)"},{"key":"1013_CR13","unstructured":"de\u00a0Almeida\u00a0Falbo, R.: Sabio: systematic approach for building ontologies. In: Guizzardi, G., Pastor, O., Wand, Y., de\u00a0Cesare, S., Gailly, F., Lycett, M., Partridge, C. (eds.) Proceedings of the 1st Joint Workshop ONTO.COM\/ODISE on Ontologies in Conceptual Modeling and Information Systems Engineering, C EUR-WS.org, CEUR Workshop Proceedings, vol. 1301 (2014)"},{"key":"1013_CR14","doi-asserted-by":"crossref","unstructured":"Degen, W., Heller, B., Herre, H., Smith, B.: Gol: toward an axiomatized upper-level ontology. In: Proceedings of the International Conference on Formal Ontology in Information Systems, vol. 2001, pp. 34\u201346 (2001)","DOI":"10.1145\/505168.505173"},{"key":"1013_CR15","unstructured":"Duarte, B.B., Souza VES, de\u00a0Castro\u00a0Leal AL, de\u00a0Almeida\u00a0Falbo, R., Guizzardi, G., Guizzardi, R.S.: Towards an ontology of requirements at runtime. In: FOIS, pp. 255\u2013268 (2016)"},{"key":"1013_CR16","doi-asserted-by":"crossref","unstructured":"Duarte, B.B., Falbo, R.A., Guizzardi, G., Guizzardi, R.S., Souza, V.E.: Towards an ontology of software defects, errors and failures. In: International Conference on Conceptual Modeling, pp. 349\u2013362. Springer (2018)","DOI":"10.1007\/978-3-030-00847-5_25"},{"key":"1013_CR17","doi-asserted-by":"crossref","unstructured":"Elnagdy, S.A., Qiu, M., Gai, K.: Cyber incident classifications using ontology-based knowledge representation for cybersecurity insurance in financial industry. In: 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 301\u2013306. IEEE (2016)","DOI":"10.1109\/CSCloud.2016.45"},{"key":"1013_CR18","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1504\/IJBPIM.2009.032281","volume":"4","author":"R Falbo","year":"2009","unstructured":"Falbo, R., Bertollo, G.: A software process ontology as a common vocabulary about software processes. Int. J. Bus. Process. Integr. Manag. 4, 239\u2013250 (2009)","journal-title":"Int. J. Bus. Process. Integr. Manag."},{"key":"1013_CR19","doi-asserted-by":"crossref","unstructured":"Fensel, D.: Ontologies. In: Ontologies, pp. 11\u201318. Springer (2001)","DOI":"10.1007\/978-3-662-04396-7_2"},{"key":"1013_CR20","unstructured":"Fern\u00e1ndez-L\u00f3pez, M., G\u00f3mez-P\u00e9rez, A., Juristo, N.: Methontology: from ontological art towards ontological engineering. In: Proceedings of the Ontological Engineering AAAI-97 Spring Symposium Series. American Association for Artificial Intelligence (1997)"},{"key":"1013_CR21","unstructured":"Gailly, F., Geerts, G., Poels, G.: Ontological reengineering of the REA-EO using UFO. In: International Workshop on Ontology-Driven Software Engineering (2009)"},{"key":"1013_CR22","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1995","unstructured":"Gamma, E.: Design Patterns: Elements of Reusable Object-Oriented Software. Pearson Education India, New York (1995)"},{"key":"1013_CR23","doi-asserted-by":"publisher","unstructured":"Gasmi, H., Laval, J., Bouras, A.: Cold-start cybersecurity ontology population using information extraction with LSTM. In: 2019 International Conference on Cyber Security for Emerging Technologies (CSET), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/CSET.2019.8904905","DOI":"10.1109\/CSET.2019.8904905"},{"key":"1013_CR24","unstructured":"Giaretta, P., Guarino, N.: Ontologies and knowledge bases towards a terminological clarification. In: Towards Very Large Knowledge Bases: knowledge Building & Knowledge Sharing, vol. 25, p. 32 (1995)"},{"key":"1013_CR25","unstructured":"Giunchiglia, F., Zaihrayeu, I.: Lightweight Ontologies. Technical report, University of Trento (2007)"},{"issue":"1","key":"1013_CR26","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/5254.988453","volume":"17","author":"A G\u00f3mez-P\u00e9rez","year":"2002","unstructured":"G\u00f3mez-P\u00e9rez, A., Corcho, O.: Ontology languages for the semantic web. IEEE Intell. Syst. 17(1), 54\u201360 (2002)","journal-title":"IEEE Intell. Syst."},{"key":"1013_CR27","unstructured":"Gomez-Perez, A., Fern\u00e1ndez-L\u00f3pez, M., Corcho, O.: Ontological Engineering: With Examples from the Areas of Knowledge Management. Springer, E-Commerce and the Semantic Web (2004)"},{"key":"1013_CR28","doi-asserted-by":"crossref","unstructured":"Gr\u00e9gio, A., Bonacin, R., Nabuco, O., Afonso, V.M., De\u00a0Geus, P.L., Jino, M.: Ontology for malware behavior: a core model proposal. In: 2014 IEEE 23rd International WETICE Conference, pp. 453\u2013458. IEEE (2014)","DOI":"10.1109\/WETICE.2014.72"},{"issue":"2","key":"1013_CR29","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber, T.R., et al.: A translation approach to portable ontology specifications. Knowl. Acquis. 5(2), 199\u2013220 (1993)","journal-title":"Knowl. Acquis."},{"key":"1013_CR30","unstructured":"Guarino, N.: The ontological level. Philos. Cogn. Sci. (1994)"},{"key":"1013_CR31","unstructured":"Guarino, N.: Formal ontology in information systems. In: Proceedings of the 1st International Conference, pp. 6\u20138. IOS Press, Trento, Italy (1998)"},{"key":"1013_CR32","doi-asserted-by":"crossref","unstructured":"Guarino, N.: The ontological level: revisiting 30 years of knowledge representation. In: Conceptual Modeling: Foundations and Applications, pp. 52\u201367 (2009)","DOI":"10.1007\/978-3-642-02463-4_4"},{"issue":"5\u20136","key":"1013_CR33","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1006\/ijhc.1995.1064","volume":"43","author":"N Guarino","year":"1995","unstructured":"Guarino, N., Poli, R.: The role of formal ontology in the information technnology. Int. J. Hum. Comput. Stud. 43(5\u20136), 623\u2013965 (1995)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"1013_CR34","volume-title":"Ontological Foundations for Structural Conceptual Models","author":"G Guizzardi","year":"2005","unstructured":"Guizzardi, G.: Ontological Foundations for Structural Conceptual Models. CTIT, Centre for Telematics and Information Technology, New Delhi (2005)"},{"key":"1013_CR35","unstructured":"Guizzardi, G.: The role of foundational ontology for conceptual modeling and domain ontology representation, keynote paper. In: 7th International Baltic Conference on Databases and Information Systems (DB &IS). IEEE Press, Vilnius (2006)"},{"key":"1013_CR36","first-page":"18","volume":"155","author":"G Guizzardi","year":"2007","unstructured":"Guizzardi, G.: On ontology, ontologies, conceptualizations, modeling languages, and (meta) models. Front. Artif. Intell. Appl. 155, 18 (2007)","journal-title":"Front. Artif. Intell. Appl."},{"key":"1013_CR37","doi-asserted-by":"crossref","unstructured":"Guizzardi, G.: Ontology-based evaluation and design of visual conceptual modeling languages. In: Domain Engineering, pp. 317\u2013347. Springer (2013)","DOI":"10.1007\/978-3-642-36654-3_13"},{"key":"1013_CR38","doi-asserted-by":"crossref","unstructured":"Guizzardi, G.: Ontological patterns, anti-patterns and pattern languages for next-generation conceptual modeling. In: International Conference on Conceptual Modeling, pp. 13\u201327. Springer (2014)","DOI":"10.1007\/978-3-319-12206-9_2"},{"key":"1013_CR39","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.scico.2014.02.022","volume":"96","author":"G Guizzardi","year":"2014","unstructured":"Guizzardi, G., Zamborlini, V.: Using a trope-based foundational ontology for bridging different areas of concern in ontology-driven conceptual modeling. Sci. Comput. Program. 96, 417\u2013443 (2014)","journal-title":"Sci. Comput. Program."},{"key":"1013_CR40","doi-asserted-by":"crossref","unstructured":"Guizzardi, G., Pires, L.F,, Van\u00a0Sinderen, M.: An ontology-based approach for evaluating the domain appropriateness and comprehensibility appropriateness of modeling languages. In: MoDELS, pp. 691\u2013705. Springer (2005)","DOI":"10.1007\/11557432_51"},{"key":"1013_CR41","doi-asserted-by":"crossref","unstructured":"Hadar, E., Hassanzadeh, A.: Big data analytics on cyber attack graphs for prioritizing agile security requirements. In: 2019 IEEE 27th International Requirements Engineering Conference (RE), pp. 330\u2013339. IEEE (2019)","DOI":"10.1109\/RE.2019.00042"},{"key":"1013_CR42","unstructured":"Hele-Mai, H., Tanel-Lauri, L.: A survey of concept-based information retrieval tools on the web. In: Proceedings of the 5th East-European Conference AD BIS, pp. 29\u201341 (2001)"},{"key":"1013_CR43","doi-asserted-by":"crossref","unstructured":"Herre, H.: General formal ontology (GFO): a foundational ontology for conceptual modelling. In: Theory and Applications of Ontology: Computer Applications. pp. 297\u2013345. Springer (2010)","DOI":"10.1007\/978-90-481-8847-5_14"},{"key":"1013_CR44","doi-asserted-by":"crossref","unstructured":"Iannacone, M., Bohn, S., Nakamura, G., Gerth, J., Huffer, K., Bridges, R., Ferragut, E., Goodall, J.: Developing an ontology for cyber security knowledge graphs. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, CISR \u201915, pp. 12:1\u201312:4. ACM, New York, NY, USA (2015)","DOI":"10.1145\/2746266.2746278"},{"key":"1013_CR45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21290-2_32","volume-title":"Automated Interpretation and Integration of Security Tools Using Semantic Knowledge","author":"C Islam","year":"2019","unstructured":"Islam, C., Babar, M.A., Nepal, S.: Automated Interpretation and Integration of Security Tools Using Semantic Knowledge. Springer, Berlin (2019). https:\/\/doi.org\/10.1007\/978-3-030-21290-2_32"},{"key":"1013_CR46","unstructured":"ISO Central Secretary: Information Technology\u2014Security Techniques\u2014Information Security Risk Management. Standard ISO\/IEC 27005:2011, International Organization for Standardization, Geneva (2011)"},{"key":"1013_CR47","unstructured":"ISO Central Secretary: Information Technology\u2014Security Techniques\u2014Guidelines for Cybersecurity. Standard ISO\/IEC 27032:2012, International Organization for Standardization, Geneva (2012)"},{"key":"1013_CR48","unstructured":"ISO Central Secretary: Information Technology\u2014Security Techniques\u2014Information Security Management Systems\u2014Overview and Vocabulary. Standard ISO\/IEC 27000:2018-02, International Organization for Standardization, Geneva (2018)"},{"key":"1013_CR49","unstructured":"ISO Central Secretary: Information Technology\u2014Security Techniques\u2014Information Security Risk Management. Standard ISO\/IEC 27005:2018, International Organization for Standardization, Geneva (2018)"},{"issue":"1\u20132","key":"1013_CR50","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1162\/dint\\_r_00024","volume":"2","author":"A Jacobsen","year":"2020","unstructured":"Jacobsen, A., de Miranda, A.R., Juty, N.S., Batista, D., Coles, S.J., Cornet, R., Courtot, M., Crosas, M., Dumontier, M., Evelo, C.T.A., Goble, C.A., Guizzardi, G., Hansen, K.K., Hasnain, A., Hettne, K.M., Heringa, J., Hooft, R.W.W., Imming, M., Jeffery, K.G., Kaliyaperumal, R., Kersloot, M.G., Kirkpatrick, C.R., Kuhn, T., Labastida, I., Magagna, B., McQuilton, P., Meyers, N., Montesanti, A., van Reisen, M., Rocca-Serra, P., Pergl, R., Sansone, S., da Silva Santos, L.O.B., Schneider, J., Strawn, G.O., Thompson, M., Waagmeester, A., Weigel, T., Wilkinson, M.D., Willighagen, E.L., Wittenburg, P., Roos, M., Mons, B., Schultes, E.: FAIR principles: interpretations and implementation considerations. Data Intell. 2(1\u20132), 10\u201329 (2020). https:\/\/doi.org\/10.1162\/dint_r_00024","journal-title":"Data Intell."},{"issue":"1","key":"1013_CR51","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.eng.2018.01.004","volume":"4","author":"Y Jia","year":"2018","unstructured":"Jia, Y., Qi, Y., Shang, H., Jiang, R., Li, A.: A practical approach to constructing a knowledge graph for cybersecurity. Engineering 4(1), 53\u201360 (2018)","journal-title":"Engineering"},{"key":"1013_CR52","unstructured":"Jurisica, I., Mylopoulos, J., Yu, E,: Using ontologies for knowledge management: an information systems perspective. In: Proceedings of the Annual Meeting-American Society For Information Science, Information Today; 1998, vol. 36, pp. 482\u2013496 (1999)"},{"issue":"2","key":"1013_CR53","doi-asserted-by":"publisher","first-page":"1456","DOI":"10.1016\/j.eswa.2009.06.073","volume":"37","author":"D Kang","year":"2010","unstructured":"Kang, D., Lee, J., Choi, S., Kim, K.: An ontology-based enterprise architecture. Expert Syst. Appl. 37(2), 1456\u20131464 (2010). https:\/\/doi.org\/10.1016\/j.eswa.2009.06.073","journal-title":"Expert Syst. Appl."},{"issue":"1","key":"1013_CR54","doi-asserted-by":"publisher","first-page":"33","DOI":"10.3233\/SW-180310","volume":"10","author":"JM Keil","year":"2019","unstructured":"Keil, J.M., Schindler, S.: Comparison and evaluation of ontologies for units of measurement. Semant. Web 10(1), 33\u201351 (2019)","journal-title":"Semant. Web"},{"key":"1013_CR55","doi-asserted-by":"publisher","unstructured":"Kiesling, E., Ekelhart, A., Kurniawan, K., Ekaputra, F.: The SEPSES Knowledge Graph: An Integrated Resource for Cybersecurity, vol. 11779 LNCS. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-30796-7_13","DOI":"10.1007\/978-3-030-30796-7_13"},{"key":"1013_CR56","doi-asserted-by":"publisher","unstructured":"Langer, L., Smith, P., Hutle, M.: Smart grid cybersecurity risk assessment. In: 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST), pp. 475\u2013482 (2015). https:\/\/doi.org\/10.1109\/SEDST.2015.7315255","DOI":"10.1109\/SEDST.2015.7315255"},{"issue":"5","key":"1013_CR57","first-page":"2001","volume":"6","author":"O Lassila","year":"2001","unstructured":"Lassila, O., McGuinness, D.: The role of frame-based representation on the semantic web. Link\u00f6ping Electron. Artic. Comput. Inf. Sci. 6(5), 2001 (2001)","journal-title":"Link\u00f6ping Electron. Artic. Comput. Inf. Sci."},{"key":"1013_CR58","doi-asserted-by":"publisher","unstructured":"Li, K., Zhou, H., Tu, Z., Feng, B.: CSKB: A Cyber Security Knowledge Base Based on Knowledge Graph, vol. 1268 CCIS. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-9129-7_8","DOI":"10.1007\/978-981-15-9129-7_8"},{"key":"1013_CR59","doi-asserted-by":"crossref","unstructured":"Martins, B.F., Serrano, L., Reyes, J.F., Panach, J.I., Pastor, O., Rochwerger, B.: Conceptual characterization of cybersecurity ontologies. In: 13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2020), pp. 323\u2013338. Springer (2020)","DOI":"10.1007\/978-3-030-63479-7_22"},{"key":"1013_CR60","unstructured":"Martins, B.F., Serrano, L., Reyes, J.F., Panach, J.I., Pastor, O.: Towards the Consolidation of Cybersecurity Standardized Definitions. Technical Report Version 2, Universidad Politecnica de Valencia (2021). http:\/\/hdl.handle.net\/10251\/163895"},{"key":"1013_CR61","unstructured":"Martins, B.F., Serrano, L., Reyes, J.F., Panach, J.I., Pastor, O.: Towards the consolidation of cybersecurity standardized definitions: a tool for ontological analysis. In: Proceedings of the XXIV Iberoamerican Conference on Software Engineering, CIbSE 2021, pp. 1\u201314, San Jos\u00e9, Costa Rica (2021)"},{"key":"1013_CR62","unstructured":"Mascardi, V., Cord\u00ec, V., Rosso, P.: A comparison of upper ontologies. In: WOA, vol. 2007, pp. 55\u201364 (2007)"},{"key":"1013_CR63","unstructured":"Masolo, C., Borgo, S., Gangemi, A., Guarino, N., Oltramari, A., Schneider, L.: The WonderWeb library of foundational ontologies: preliminary report. WonderWeb Deliverable D 17 (2002). https:\/\/www.bibsonomy.org\/bibtex\/2e13335234623f07ce0788f9d892e7169\/berrueta"},{"key":"1013_CR64","first-page":"31","volume":"33052","author":"C Masolo","year":"2003","unstructured":"Masolo, C., Borgo, S., Gangemi, A., Guarino, N., Oltramari, A.: Wonderweb deliverable d18 ontology library (final). ICT Project 33052, 31 (2003)","journal-title":"ICT Project"},{"key":"1013_CR65","first-page":"9","volume":"13","author":"R Mizoguchi","year":"1998","unstructured":"Mizoguchi, R., Ikeda, M.: Towards ontology engineering. J. Jpn. Soc. Artif. Intell. 13, 9\u201310 (1998)","journal-title":"J. Jpn. Soc. Artif. Intell."},{"key":"1013_CR66","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-030-60570-4_7","volume-title":"Cybersecurity Ontology","author":"DPF M\u00f6ller","year":"2020","unstructured":"M\u00f6ller, D.P.F.: Cybersecurity Ontology, pp. 99\u2013109. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60570-4_7"},{"issue":"9","key":"1013_CR67","doi-asserted-by":"publisher","first-page":"3053","DOI":"10.3390\/s18093053","volume":"18","author":"BA Mozzaquatro","year":"2018","unstructured":"Mozzaquatro, B.A., Agostinho, C., Goncalves, D., Martins, J., Jardim-Goncalves, R.: An ontology-based cybersecurity framework for the internet of things. Sensors 18(9), 3053 (2018)","journal-title":"Sensors"},{"key":"1013_CR68","unstructured":"Mundie, D.A., Ruefle, R., Dorofee, A.J., Perl, S.J., McCloud, J., Collins, M.: An incident management ontology. In: STIDS, pp. 62\u201371 (2014)"},{"key":"1013_CR69","unstructured":"Narayanan, S., Ganesan, A., Joshi, K., Oates, T., Joshi, A., Finin, T.: Cognitive techniques for early detection of cybersecurity events (2018). arXiv preprint arXiv:1808.00116"},{"key":"1013_CR70","doi-asserted-by":"publisher","unstructured":"Nurse, J.R.C., Creese, S., Goldsmith, M., Lamberts, K.: Trustworthy and effective communication of cybersecurity risks: a review. In: 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST), pp. 60\u201368 (2011). https:\/\/doi.org\/10.1109\/STAST.2011.6059257","DOI":"10.1109\/STAST.2011.6059257"},{"key":"1013_CR71","unstructured":"Obrst, L., Chase, P., Markeloff, R.: Developing an ontology of the cyber security domain. In: STIDS, pp. 49\u201356 (2012)"},{"issue":"1","key":"1013_CR72","first-page":"49","volume":"17","author":"A Oltramari","year":"2018","unstructured":"Oltramari, A., Kott, A.: Towards a reconceptualisation of cyber risk: an empirical and ontological study. J. Inf. Warf. 17(1), 49\u201373 (2018)","journal-title":"J. Inf. Warf."},{"key":"1013_CR73","unstructured":"Oltramari, A., Vetere, G., Lenzerini, M., Gangemi, A., Guarino, N.: Senso comune. In: LREC (2010)"},{"key":"1013_CR74","unstructured":"Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.D.: Building an ontology of cyber security. In: STIDS, pp. 54\u201361. Citeseer (2014)"},{"key":"1013_CR75","doi-asserted-by":"crossref","unstructured":"Oltramari, A., Cranor, L.F., Walls, R.J., McDaniel, P.: Computational ontology of network operations. In: MILCOM 2015\u20132015 IEEE Military Communications Conference, pp. 318\u2013323. IEEE (2015)","DOI":"10.1109\/MILCOM.2015.7357462"},{"key":"1013_CR76","unstructured":"Oltramari, A., Henshel, D.S., Cains, M., Hoffman, B.: Towards a human factors ontology for cyber security. In: STIDS, pp. 26\u201333 (2015)"},{"key":"1013_CR77","doi-asserted-by":"crossref","unstructured":"Onwubiko, C.: Cocoa: an ontology for cybersecurity operations centre analysis process. In: 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1\u20138 (2018)","DOI":"10.1109\/CyberSA.2018.8551486"},{"key":"1013_CR78","unstructured":"Ou, X., Govindavajhala, S., Appel, A.W.: Mulval: a logic-based network security analyzer. In: USENIX Security Symposium, vol. 8, pp. 113\u2013128, Baltimore (2005)"},{"key":"1013_CR79","first-page":"116","volume":"713","author":"MC Parmelee","year":"2010","unstructured":"Parmelee, M.C.: Toward an ontology architecture for cyber-security standards. STIDS 713, 116\u2013123 (2010)","journal-title":"STIDS"},{"key":"1013_CR80","doi-asserted-by":"publisher","unstructured":"Peci\u00f1a, K., Bilbao, A., Bilbao, E.: Physical and logical security risk analysis model. In: 2011 Carnahan Conference on Security Technology, pp. 1\u20137 (2011). https:\/\/doi.org\/10.1109\/CCST.2011.6095895","DOI":"10.1109\/CCST.2011.6095895"},{"key":"1013_CR81","unstructured":"Pipa, A.M.C.: Owl Ontology Quality Assessment and Optimization in the Cybersecurity Domain. Ph.D. thesis, Instituto Universit\u00e1rio de Lisboa (2018)"},{"key":"1013_CR82","doi-asserted-by":"publisher","unstructured":"Qin, S., Chow, K.P.: Automatic analysis and reasoning based on vulnerability knowledge graph. In: Ning, H. (ed.) Communications in Computer and Information Science, vol. 1137 CCIS, pp. 3\u201319. Springer Singapore, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-15-1922-2_1","DOI":"10.1007\/978-981-15-1922-2_1"},{"key":"1013_CR83","unstructured":"Sales, T.P., Guizzardi, G.: Ontological anti-patterns in taxonomic structures. In: ONTOBRAS (2019)"},{"key":"1013_CR84","doi-asserted-by":"crossref","unstructured":"Sales, T.P., Bai\u00e3o, F., Guizzardi, G., Almeida, J.P.A., Guarino, N., Mylopoulos, J.: The common ontology of value and risk. In: International Conference on Conceptual Modeling, pp. 121\u2013135. Springer (2018)","DOI":"10.1007\/978-3-030-00847-5_11"},{"issue":"7","key":"1013_CR85","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1080\/08839514.2019.1592344","volume":"33","author":"N Scarpato","year":"2019","unstructured":"Scarpato, N., Cilia, N.D., Romano, M.: Reachability matrix ontology: a cybersecurity ontology. Appl. Artif. Intell. 33(7), 643\u2013655 (2019)","journal-title":"Appl. Artif. Intell."},{"key":"1013_CR86","doi-asserted-by":"crossref","unstructured":"Schumacher, M.: 6. Toward a security core ontology. In: Security Engineering with Patterns, pp. 87\u201396. Springer (2003)","DOI":"10.1007\/978-3-540-45180-8_6"},{"key":"1013_CR87","unstructured":"Serrano, L., Martins, B.F., Serrano, J.F., Panach, J.I., Pastor, O.: Una encuesta acerca de la Definici\u00f3n de Conceptos de Ciberseguridad. Technical Report Version 1, Universidad Politecnica de Valencia (2021). https:\/\/riunet.upv.es\/handle\/10251\/174756"},{"key":"1013_CR88","doi-asserted-by":"crossref","unstructured":"Sikos, L.F.: OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge, pp. 1\u201317. Springer, Cham (2019)","DOI":"10.1007\/978-3-319-98842-9_1"},{"key":"1013_CR89","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.websem.2012.07.001","volume":"16","author":"E Simperl","year":"2012","unstructured":"Simperl, E., B\u00fcrger, T., Hangl, S., W\u00f6rgl, S., Popov, I.: Ontocom: a reliable cost estimation method for ontology development projects. J. Web Semant. 16, 1\u201316 (2012)","journal-title":"J. Web Semant."},{"key":"1013_CR90","doi-asserted-by":"crossref","unstructured":"Singhal, A., Ou, X.: Security Risk Analysis of Enterprise Networks Using Probabilistic Attack Graphs, pp. 53\u201373. Springer, Berlin (2017)","DOI":"10.1007\/978-3-319-66505-4_3"},{"key":"1013_CR91","doi-asserted-by":"crossref","unstructured":"Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for security requirements: a literature survey and classification. In: International Conference on Advanced Information Systems Engineering, pp. 61\u201369. Springer (2012)","DOI":"10.1007\/978-3-642-31069-0_5"},{"issue":"1\u20132","key":"1013_CR92","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/S0169-023X(97)00056-6","volume":"25","author":"R Studer","year":"1998","unstructured":"Studer, R., Benjamins, V.R., Fensel, D.: Knowledge engineering: principles and methods. Data Knowl. Eng. 25(1\u20132), 161\u2013197 (1998)","journal-title":"Data Knowl. Eng."},{"key":"1013_CR93","doi-asserted-by":"publisher","unstructured":"Syed, R.: Cybersecurity Vulnerability Management: A Conceptual Ontology and Cyber Intelligence Alert System 57(6), 10334. (2020). https:\/\/doi.org\/10.1016\/j.im.2020.103334","DOI":"10.1016\/j.im.2020.103334"},{"key":"1013_CR94","unstructured":"Syed, R., Zhong, H.: Cybersecurity Vulnerability Management: An Ontology-Based Conceptual Model (2018). https:\/\/aisel.aisnet.org\/amcis2018\/Semantics\/Presentations\/6"},{"key":"1013_CR95","unstructured":"Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: a unified cybersecurity ontology. In: Workshops at the Thirtieth AAAI Conference on Artificial Intelligence (2016)"},{"key":"1013_CR96","unstructured":"Takahashi, T., Kadobayashi, Y.: Cybersecurity information exchange techniques: cybersecurity information ontology and cybex. J. Natl. Inst. Inf. Commun. Technol. 58(3\/4) (2011)"},{"key":"1013_CR97","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Kadobayashi, Y.: Reference ontology for cybersecurity operational information. Comput. J. 58(10), 2297\u20132312 (2015)","DOI":"10.1093\/comjnl\/bxu101"},{"key":"1013_CR98","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Fujiwara, H., Kadobayashi, Y.: Building ontology of cybersecurity operational information. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information intelligence Research, pp. 1\u20134 (2010)","DOI":"10.1145\/1852666.1852756"},{"key":"1013_CR99","doi-asserted-by":"crossref","unstructured":"Takahashi, T., Kadobayashi, Y., Fujiwara, H.: Ontological approach toward cybersecurity in cloud computing. In: Proceedings of the 3rd International Conference on Security of Information and Networks, pp. 100\u2013109 (2010)","DOI":"10.1145\/1854099.1854121"},{"key":"1013_CR100","doi-asserted-by":"publisher","DOI":"10.1007\/s40860-020-00115-0","author":"N Tissir","year":"2020","unstructured":"Tissir, N., El Kafhali, S., Aboutabit, N.: Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal. J. Reliab. Intell. Environ. (2020). https:\/\/doi.org\/10.1007\/s40860-020-00115-0","journal-title":"J. Reliab. Intell. Environ."},{"key":"1013_CR101","unstructured":"Undercofer, J., Joshi, A., Finin, T., Pinkston, J., et\u00a0al.: A target-centric ontology for intrusion detection. In: Workshop on Ontologies in Distributed Systems, held at the 18th International Joint Conference on Artificial Intelligence (2003)"},{"issue":"4","key":"1013_CR102","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1041410.1041420","volume":"33","author":"M Uschold","year":"2004","unstructured":"Uschold, M., Gruninger, M.: Ontologies and semantics for seamless connectivity. ACM SIGMod Rec. 33(4), 58\u201364 (2004)","journal-title":"ACM SIGMod Rec."},{"key":"1013_CR103","doi-asserted-by":"crossref","unstructured":"Uschold, M., Gruninger, M., et\u00a0al.: Ontologies: Principles, Methods and Applications. Technical Report, University of Edinburgh Artificial Intelligence Applications Institute AIAI TR (1996)","DOI":"10.1017\/S0269888900007797"},{"key":"1013_CR104","doi-asserted-by":"publisher","unstructured":"Van\u00a0Heijst, G., Schreiber, A.T., Wielinga, B.J.: Using explicit ontologies in kbs development. Int. J. Hum. Comput. Stud. 46(2\u20133), 183\u2013292 (1997). https:\/\/doi.org\/10.1006\/ijhc.1996.0090","DOI":"10.1006\/ijhc.1996.0090"},{"issue":"3","key":"1013_CR105","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1111\/j.1365-2575.1995.tb00108.x","volume":"5","author":"Y Wand","year":"1995","unstructured":"Wand, Y., Weber, R.: On the deep structure of information systems. Inf. Syst. J. 5(3), 203\u2013223 (1995)","journal-title":"Inf. Syst. J."},{"key":"1013_CR106","doi-asserted-by":"crossref","unstructured":"Wang, J.A., Guo, M.: Ovm: an ontology for vulnerability management. In: 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1\u20134 (2009)","DOI":"10.1145\/1558607.1558646"},{"key":"1013_CR107","doi-asserted-by":"crossref","unstructured":"Wang, J.Z., Ali, F.: An efficient ontology comparison tool for semantic web applications. In: The 2005 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI\u201905), pp. 372\u2013378. IEEE (2005)","DOI":"10.1109\/WI.2005.28"},{"key":"1013_CR108","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43839-8","volume-title":"Design Science Methodology for Information Systems and Software Engineering","author":"R Wieringa","year":"2014","unstructured":"Wieringa, R.: Design Science Methodology for Information Systems and Software Engineering. Springer, Berlin (2014)"},{"key":"1013_CR109","unstructured":"Zuanelli, E.: The cybersecurity ontology platform: the POC solution. In: e-AGE2017, p. 1 (2017)"}],"container-title":["Software and Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-022-01013-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10270-022-01013-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10270-022-01013-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T09:41:36Z","timestamp":1727516496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10270-022-01013-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,2]]},"references-count":109,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["1013"],"URL":"https:\/\/doi.org\/10.1007\/s10270-022-01013-0","relation":{},"ISSN":["1619-1366","1619-1374"],"issn-type":[{"value":"1619-1366","type":"print"},{"value":"1619-1374","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,2]]},"assertion":[{"value":"12 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}