{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:43:34Z","timestamp":1774719814950,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/iwmn.2015.7322984","type":"proceedings-article","created":{"date-parts":[[2015,11,12]],"date-time":"2015-11-12T18:02:40Z","timestamp":1447351360000},"page":"1-6","source":"Crossref","is-referenced-by-count":30,"title":["Towards a reference ontology for security in the Internet of Things"],"prefix":"10.1109","author":[{"given":"Bruno A.","family":"Mozzaquatro","sequence":"first","affiliation":[]},{"given":"Ricardo","family":"Jardim-Goncalves","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Agostinho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"113","article-title":"Modeling Computer Attacks: An Ontology for Intrusion Detection","author":"undercoffer","year":"2003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2005.01.009"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2006.08.002"},{"key":"ref13","article-title":"An Ontology-Based Approach for Helping to Secure the ETSI Machine-to-Machine Architecture To cite this version: Architecture","author":"gyrard","year":"2014","journal-title":"IEEE Int Conf Internet Things"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/03081079.2010.484278"},{"key":"ref15","first-page":"1483","article-title":"Security Ontology for Annotating Resources","author":"kim","year":"2005"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2004.11.002"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2009.10.003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref19","author":"ekelhart","year":"2006","journal-title":"Security ontology Simulating threats to corporate assets"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1115\/IMECE2015-51042","article-title":"A Semantic Enrichment approach based on the Vector Space Model supporting Accepted for publication in","author":"figueiras","year":"2015","journal-title":"Proceedings of the ASME International Mechanical Engineering Congress and Exposition (IMECE 2015)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"ref27","article-title":"SP 800&#x2013;30. Risk management guide for information technology systems","author":"stoneburner","year":"2002"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/341852.341877"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.08.001"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/jisp.2007100101"},{"key":"ref7","article-title":"Integrating Security and Software Engineering: Advances and Future Visions: Advances and Future Visions","author":"mouratidis","year":"2006","journal-title":"IGI Global"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1145\/1533057.1533084","article-title":"Formalizing information security knowledge","author":"fenz","year":"2009","journal-title":"Proc 4th Int Symp Information Comput Commun Secur - ASIACCS'09 p"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.478"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2006.49"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2008.211"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-48438-9_5"},{"key":"ref23","article-title":"Ontology development 101: A guide to creating your first ontology","author":"noy","year":"2001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2010.12.002"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/1.4.398"}],"event":{"name":"2015 IEEE International Workshop on Measurements and Networking (M&N)","location":"Coimbra, Portugal","start":{"date-parts":[[2015,10,12]]},"end":{"date-parts":[[2015,10,13]]}},"container-title":["2015 IEEE International Workshop on Measurements &amp; Networking (M&amp;N)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7309519\/7322959\/07322984.pdf?arnumber=7322984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T09:51:01Z","timestamp":1567331461000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7322984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iwmn.2015.7322984","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}