{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:06:25Z","timestamp":1774541185994,"version":"3.50.1"},"reference-count":163,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"PETRAS National Center of Excellence in IoT Systems Cybersecurity"},{"name":"U.K. EPSRC","award":["EP\/S035362\/1"],"award-info":[{"award-number":["EP\/S035362\/1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2025.3532224","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T18:30:35Z","timestamp":1737484235000},"page":"2792-2821","source":"Crossref","is-referenced-by-count":10,"title":["Modeling Industrial IoT Security Using Ontologies: A Systematic Review"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5332-1698","authenticated-orcid":false,"given":"Muhammad Aslam","family":"Jarwar","sequence":"first","affiliation":[{"name":"School of Computing and Digital Technologies, Sheffield Hallam University, Sheffield, U.K."}]},{"given":"Jeremy","family":"Watson","sequence":"additional","affiliation":[{"name":"Department of Science, Technology, Engineering and Public Policy, University College London, London, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6905-446X","authenticated-orcid":false,"given":"Sajjad","family":"Ali","sequence":"additional","affiliation":[{"name":"School of Computing, Engineering and Intelligent Systems, Ulster University, Londonderry, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2023.100156"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/standards3010001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3234582"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2023.3331552"},{"key":"ref5","first-page":"425","volume-title":"Smart Health Based on Internet of Things (IoT) and Smart Devices","author":"Lai","year":"2023"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3079916"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.compind.2018.04.015","article-title":"The Industrial Internet of Things (IIoT): An analysis framework","volume":"101","author":"Boyes","year":"2018","journal-title":"Comput. Ind."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3567445.3571103"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1049\/cim2.12093"},{"key":"ref10","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2024.103414","article-title":"Flexible zero trust architecture for the cybersecurity of Industrial IoT infrastructures","volume":"156","author":"Zanasi","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"ref11","volume-title":"Advanced Persistent Threat","year":"2023"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2855563"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/w13010081"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3630103"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3379542"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2744769.2747942."},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/0165551516645528"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.03.023"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048029"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9714-1"},{"key":"ref21","first-page":"49","article-title":"An ontology-based approach to vulnerability and interdependency modelling for critical infrastructure systems","volume-title":"Proc. ICCIP","author":"Trucco"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.websem.2012.05.003","article-title":"The SSN ontology of the W3C semantic sensor network incubator group","volume":"17","author":"Compton","year":"2012","journal-title":"J. Web Semantics"},{"key":"ref23","volume-title":"TS 118 112\u2014V2.0.0\u2014oneM2M; Base Ontology (oneM2M TS-0012 version 2.0.0 Release 2)","year":"2016"},{"key":"ref24","volume-title":"Introducing things descriptions and interactions: An ontology for the Web of Things","author":"Charpenay","year":"2023"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17604-3_3"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12010111"},{"key":"ref27","volume-title":"SoFIoTs: Ontological framework, demonstration outcomes, and recommendations for further work","author":"Smart","year":"2023"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1016\/j.compind.2023.103947","article-title":"Toward the industry 5.0 paradigm: Increasing value creation through the robust integration of humans and machines","volume":"150","author":"Ordieres-Mer\u00e9","year":"2023","journal-title":"Comput. Ind."},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2024.101110","article-title":"Multi-aspect rule-based Ai: Methods, taxonomy, challenges and directions towards automation, intelligence and transparent cybersecurity modeling for critical infrastructures","volume":"25","author":"Sarker","year":"2024","journal-title":"Internet Things"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSC52841.2022.00039"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-022-01013-0"},{"issue":"3","key":"ref32","doi-asserted-by":"crossref","first-page":"518","DOI":"10.3390\/jcp4030025","article-title":"Knowledge graphs and semantic Web tools in cyber threat intelligence: A systematic literature review","volume":"4","author":"Bratsas","year":"2024","journal-title":"J. Cybersecurity Privacy"},{"issue":"3","key":"ref33","doi-asserted-by":"crossref","first-page":"69","DOI":"10.3390\/fi16030069","article-title":"An ontology-based cybersecurity framework for ai-enabled systems and applications","volume":"16","author":"Preuveneers","year":"2024","journal-title":"Future Internet"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-79150-6_41"},{"key":"ref35","volume-title":"Web of Things (WoT) security ontology","year":"2024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3356349"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-03884-6_37"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1016\/j.jmsy.2023.03.009","article-title":"Manufacturing cybersecurity threat attributes and countermeasures: Review, meta-taxonomy, and use cases of cyberattack taxonomies","volume":"68","author":"Rahman","year":"2023","journal-title":"J. Manuf. Syst."},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888919000109"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.32870\/recibe.v9i2.181"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/IECON.2016.7793744"},{"issue":"21","key":"ref42","doi-asserted-by":"crossref","first-page":"8188","DOI":"10.3390\/s22218188","article-title":"A survey and ontology of blockchain consensus algorithms for resource-constrained IoT systems","volume":"22","author":"Khan","year":"2022","journal-title":"Sensors"},{"key":"ref43","article-title":"The security assessment domain: A survey of taxonomies and ontologies","author":"Rosa","year":"2017","journal-title":"arXiv:1706.09772"},{"issue":"11","key":"ref44","doi-asserted-by":"crossref","first-page":"1864","DOI":"10.3390\/electronics9111864","article-title":"Supply chain 4.0: A survey of cyber security challenges, solutions and future directions","volume":"9","author":"Sobb","year":"2020","journal-title":"Electronics"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6677867"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/OJIES.2024.3441112"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ojcoms.2024.3473891"},{"key":"ref48","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2024.102792","article-title":"An automatic unsafe states reasoning approach towards industry 5.0\u2019s human-centered manufacturing via digital twin","volume":"62","author":"Wang","year":"2024","journal-title":"Adv. Eng. Informat."},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3452945"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1111\/j.1471-1842.2009.00848.x"},{"key":"ref51","first-page":"71","article-title":"The PRISMA 2020 statement: An updated guideline for reporting systematic reviews","volume-title":"BMJ","volume":"372","author":"Page","year":"2021"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/12460125.2020.1798591"},{"issue":"2","key":"ref53","first-page":"11","article-title":"Analyzing the past to prepare for the future: Writing a literature review","volume":"26","author":"Webster","year":"2002","journal-title":"MIS Quart."},{"key":"ref54","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.jclinepi.2017.08.010","article-title":"Living systematic review: 1. Introduction\u2014The why, what, when, and how","volume":"91","author":"Elliott","year":"2017","journal-title":"J. Clin. Epidemiol."},{"key":"ref55","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jclinepi.2020.01.009","article-title":"Title, abstract, and keyword searching resulted in poor recovery of articles in systematic reviews of epidemiologic practice","volume":"121","author":"de Vries","year":"2020","journal-title":"J. Clin. Epidemiol."},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.4995\/thesis\/10251\/204584"},{"issue":"6","key":"ref57","doi-asserted-by":"crossref","DOI":"10.1016\/j.im.2020.103334","article-title":"Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system","volume":"57","author":"Syed","year":"2020","journal-title":"Inf. Manag."},{"key":"ref58","doi-asserted-by":"crossref","DOI":"10.3233\/SW-233393","volume-title":"A conceptual model for ontology quality assessment","author":"Wilson","year":"2023"},{"issue":"2","key":"ref59","first-page":"159","article-title":"OQuare: A square-based approach for evaluating the quality of ontologies","volume":"43","author":"Duque-Ramos","year":"2011","journal-title":"J. Res. Practice Inf. Technol."},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2734681"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.11.004"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1186\/s13326-017-0169-2"},{"key":"ref63","volume-title":"Code of practice: Cyber security in the built environment\u2014Revised second edition","year":"2023"},{"key":"ref64","volume-title":"Industrial Internet of Things volume G4: Security framework","author":"Schrecker","year":"2016"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219584"},{"key":"ref66","doi-asserted-by":"crossref","DOI":"10.1016\/j.ress.2021.108270","article-title":"Hybrid ontology for safety, security, and dependability risk assessments and security threat analysis (STA) method for industrial control systems","volume":"220","author":"Alanen","year":"2022","journal-title":"Rel. Eng. Syst. Safety"},{"key":"ref67","volume-title":"NIST\u2014Vulnerability description ontology (VDO)","author":"Booth","year":"2024"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IWMN.2015.7322984"},{"key":"ref69","volume-title":"Information Security Handbook: A Guide for Managers","author":"Bowen","year":"2007"},{"key":"ref70","volume-title":"Draft NIST SP 800\u201312 rev. 1, An introduction to information security","author":"Nieles","year":"2017"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/s18093053"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/iThings.2014.25"},{"key":"ref73","volume-title":"Linked open vocabularies","author":"Gyrard","year":"2017"},{"key":"ref74","volume-title":"Linked open vocabularies for Internet of Things (LOV4IoT)","author":"Gyrard","year":"2014"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533084"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/s21227579"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2008.11.008"},{"key":"ref78","first-page":"12","article-title":"UCO: A unified cybersecurity ontology","volume-title":"Proc. Workshops 13th AAAI Conf. Artif. Intell.","author":"Syed"},{"key":"ref79","volume-title":"About STIX\u2014STIX project documentation","author":"Barnum","year":"2014"},{"key":"ref80","volume-title":"Github\u2014Ebiquity\/unified-cybersecurity-ontology: Unified cybersecurity ontology","year":"2023"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-021-00892-z"},{"key":"ref82","volume-title":"ontologicalmetamodel for cyber-physical system safety, security","year":"2020"},{"key":"ref83","volume-title":"IoT security ontology","year":"2024"},{"key":"ref84","volume-title":"STAC","year":"2024"},{"key":"ref85","volume-title":"ebiquity","year":"2024"},{"key":"ref86","volume-title":"GraphQL schema","year":"2024"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.3390\/s20030801"},{"key":"ref88","volume-title":"Ds4iot","year":"2024"},{"key":"ref89","volume-title":"Github\u2014Mainakae\/DS4IoT: Data security for IoT ontology (DS4IOT)","author":"Gonzalez-Gil","year":"2023"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107810"},{"key":"ref91","volume-title":"ISAGCA quick start guide final.pdf","year":"2021"},{"key":"ref92","volume-title":"Security maturity model\u2014Industry IoT consortium","author":"Cariell","year":"2023"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2914390"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2017.04.023"},{"key":"ref95","volume-title":"NIST special publication 800\u201312 revision 1 an introduction to information security","author":"Nieles","year":"2023"},{"key":"ref96","volume-title":"NVD\u2014Home","year":"2023"},{"key":"ref97","volume-title":"Common vulnerability scoring system version 3.1 specification","year":"2023"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.06.002"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1177\/1548512919874129"},{"key":"ref100","volume-title":"CVSS v3.1 specification document","year":"2023"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ITAIC.2019.8785783"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2019.10.010"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"ref104","volume-title":"Industrial IoT: Threats and countermeasures\u2014RAMBUS","year":"2023"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W50199.2020.00027"},{"key":"ref106","volume-title":"WiFi suspended at big uk train stations after cybersecurity incident U.K. News\u2014The Guardian","year":"2024"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00020"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref109","volume-title":"Building functional safety and security into modern IIoT enterprises","year":"2023"},{"key":"ref110","volume-title":"Data protection best practices","year":"2019"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2022.3152814"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106946"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/s13198-021-01170-3"},{"key":"ref114","volume-title":"Mitre\u2014Security mechanism detection methods","year":"2023"},{"key":"ref115","volume-title":"Networking and security in industrial automation environments","year":"2023"},{"key":"ref116","volume-title":"Is cyber deterrence possible?","author":"Kwast","year":"2023"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/3365995"},{"key":"ref118","volume-title":"The cyber security body of knowledge","year":"2023"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-021-00545-8"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-020-09792-x"},{"key":"ref121","volume-title":"SP 800-213, IoT device cybersecurity guidance for the federal government\u2014CSRC","author":"Fagan","year":"2023"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2019.8891082"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CIT\/IUCC\/DASC\/PICOM.2015.265"},{"key":"ref124","volume-title":"W3C\u2014Asset description metadata schema (ADMS)","year":"2023"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.5220\/0006510400800085"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103611"},{"issue":"16","key":"ref127","doi-asserted-by":"crossref","first-page":"3023","DOI":"10.3390\/rs16163023","article-title":"Digital twin of space environment: Development, challenges, applications, and future outlook","volume":"16","author":"Liu","year":"2024","journal-title":"Remote Sens."},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2740571"},{"key":"ref129","article-title":"Interoperability levels and challenges of digital twins in cyber\u2013physical systems","volume":"42","author":"Acharya","year":"2024","journal-title":"J. Ind. Inf. Integr."},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/3211871"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.36680\/j.itcon.2021.010"},{"issue":"9","key":"ref132","doi-asserted-by":"crossref","first-page":"2804","DOI":"10.3390\/s24092804","article-title":"Developing a novel ontology for cybersecurity in Internet of Medical Things-enabled remote patient monitoring","volume":"24","author":"Bughio","year":"2024","journal-title":"Sensors"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1017\/dce.2021.10"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-1732-z"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00201-3"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-0052-3_20"},{"key":"ref137","volume-title":"Secure ontologies for the Internet of Things: Representing risk and security concepts using basic formal ontology","author":"Smart","year":"2023"},{"issue":"2","key":"ref138","doi-asserted-by":"crossref","first-page":"590","DOI":"10.3390\/s24020590","article-title":"Security at the edge for resource-limited IoT devices","volume":"24","author":"Canavese","year":"2024","journal-title":"Sensors"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-021-00327-z"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.3390\/s22176662"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3023507"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-3243-6_90"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.3390\/s22176662"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2013.6.764"},{"key":"ref145","first-page":"12","article-title":"Large language model assisted multi-agent dialogue for ontology alignment","volume-title":"Proc. 23rd Int. Conf. Auton. Agents Multiagent Syst.","author":"Zhang"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7355582"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2011.2180917"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3902"},{"key":"ref149","doi-asserted-by":"crossref","DOI":"10.1016\/j.artint.2021.103471","article-title":"Using ontologies to enhance human understandability of global post-hoc explanations of black-box models","volume":"296","author":"Confalonieri","year":"2021","journal-title":"Artif. Intell."},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2020.110566"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2864838"},{"key":"ref152","volume-title":"Ontology Learning From Text: Methods, Evaluation and Applications","volume":"123","author":"Buitelaar","year":"2005"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20795-2_6"},{"key":"ref154","doi-asserted-by":"crossref","DOI":"10.1109\/SYNASC61333.2023.00038","volume-title":"Ontology engineering with large language models","author":"Mateiu","year":"2023"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1201\/9781003155799-9"},{"issue":"4","key":"ref156","doi-asserted-by":"crossref","first-page":"1805","DOI":"10.3390\/s23041805","article-title":"Access control for IoT: A survey of existing research, dynamic policies and future directions","volume":"23","author":"Ragothaman","year":"2023","journal-title":"Sensors"},{"key":"ref157","volume-title":"An argumentation and ontology based legal support system for Ai vehicle design","author":"Urquhart","year":"2022"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN61752.2024.10625066"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/1101\/9\/092010"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1088\/1755-1315\/615\/1\/012023"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1504\/IJICT.2024.139829"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6309509"},{"key":"ref163","doi-asserted-by":"crossref","DOI":"10.1016\/j.datak.2021.101907","article-title":"Ontology-driven evolution of software security","volume":"134","author":"Peldszus","year":"2021","journal-title":"Data Knowl. Eng."}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/10847994.pdf?arnumber=10847994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T04:30:46Z","timestamp":1745037046000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10847994\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":163,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3532224","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}