{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:47:51Z","timestamp":1730292471703,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/rcis.2018.8406673","type":"proceedings-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T18:52:35Z","timestamp":1531162355000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Semantic integration of security knowledge sources"],"prefix":"10.1109","author":[{"given":"Ana-Maria","family":"Ghiran","sequence":"first","affiliation":[]},{"given":"Robert Andrei","family":"Buchmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","first-page":"12","article-title":"Developing an ontology for cyber security knowledge graphs","author":"iannacone","year":"2005","journal-title":"Proceedings of the 10th Annual Cyber and Infnrmntion Security Reseacrch Confrefence"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2008.110"},{"key":"ref31","first-page":"129","article-title":"A semantic representation for domain-specific patterns","author":"montero","year":"2004","journal-title":"Metainformatics Symposium"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1558607.1558646"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24129-6_5"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61073-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05183-8_6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/236156.236164"},{"journal-title":"Security Patterns Integrating Security and Systems Engineering","year":"2013","author":"schumacher","key":"ref13"},{"journal-title":"Security Patterns in Practice Designing Secure Architectures Using Software Patterns","year":"2013","author":"fernandez-buglioni","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.2007.4"},{"key":"ref16","article-title":"A pattern language for security models","volume":"1","author":"fernandez","year":"2001","journal-title":"Proceedings of PLoP"},{"key":"ref17","first-page":"75","article-title":"Security patterns: Comparing modeling approaches","author":"nhlabatsi","year":"2010","journal-title":"Software Engineering for Secure Systems Industrial and Research Perspectives"},{"journal-title":"RDF 1 1 Concepts and Abstract Syntax","year":"2014","key":"ref18"},{"journal-title":"Java framework for prcocessing and handling rdf data","year":"2018","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.33"},{"journal-title":"Guest editorial security requirements engineering past present and future","year":"2010","author":"dubois","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753203"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.19"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.93"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2012.26"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194007003240"},{"key":"ref8","first-page":"412","article-title":"Umlsec: Extending uml for secure systems development","author":"j\u00fcrjens","year":"2002","journal-title":"International Conference on The Unified Modeling Language"},{"key":"ref7","first-page":"816","article-title":"Syntactic and semantic extensions to secure tropos to support security risk management","volume":"18","author":"matulevicius","year":"2012","journal-title":"J UCS"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0194-4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-015-0222-6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.2"},{"journal-title":"Graphdb - semantic graph database","year":"2018","key":"ref20"},{"journal-title":"Web ontology language (owl) second edition","year":"2012","author":"group","key":"ref22"},{"journal-title":"RDF Schema 1 1","year":"2014","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2003.09.001"},{"key":"ref23","article-title":"A common language for computer security incidents","author":"howard","year":"1998","journal-title":"Sandia National Labs Albuquerque NM (US) Sandia National Labs"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59888-8_6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2013.6682760"}],"event":{"name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2018,5,29]]},"location":"Nantes","end":{"date-parts":[[2018,5,31]]}},"container-title":["2018 12th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8401323\/8406639\/08406673.pdf?arnumber=8406673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T03:54:35Z","timestamp":1533009275000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8406673\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/rcis.2018.8406673","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}