Proceedings of the 14th International Conference on Availability, Reliability and Security 2019
DOI: 10.1145/3339252.3341496
|View full text |Cite
|
Sign up to set email alerts
|

Ontology of Metrics for Cyber Security Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 9 publications
0
9
0
2
Order By: Relevance
“…The ontology and the related technique were firstly introduced in the paper presented on the IWCC'2019 workshop held in conjunction with the ARES'2019 [10]. In this paper we are extending the results of this paper, including related works, specification of the approach, and the case study.…”
Section: Introductionmentioning
confidence: 77%
“…The ontology and the related technique were firstly introduced in the paper presented on the IWCC'2019 workshop held in conjunction with the ARES'2019 [10]. In this paper we are extending the results of this paper, including related works, specification of the approach, and the case study.…”
Section: Introductionmentioning
confidence: 77%
“…The tools used for the ontology development usually incorporate languages that help in the definition of ontologies. We observe that 24% (12 papers) of the relevant documents (Chukkapalli et al, 2020;Vega Barbas et al, 2019;Doynikova et al, 2019;Zheng et al, 2018;Petrenko and Makoveichuk, 2017;Elnagdy et al, 2016;Falk, 2016;Iannacone et al, 2015;Salem and Wacek, 2015;Laskey et al, 2015) report the use of the OWL language (Dean and Schreiber, 2003).…”
Section: Table 5 Ontology Classification By Used Toolsmentioning
confidence: 97%
“…As shown in Figure 1, the first ontology related to cybersecurity was reported in 2004 (Simmonds et al, 2004), from that year onwards, other works sporadically arise, it is from 2014 that the number of ontologies related to cybersecurity increases, for example in 2019 eleven ontologies were reported (Burita, 2019;Vega Barbas et al, 2019;Gasmi et al, 2019;Doynikova et al, 2019;Scarpato et al, 2019;Niyazova et al, 2019;Islam et al, 2019;Baesso Moreira et al, 2019;Katsantonis et al, 2019;Shaaban et al, 2019;Zamfira et al, 2019). It is worth to note that the relevant papers used in this SLR were subjected to a quality assessment.…”
Section: Executionmentioning
confidence: 99%
“…Assessing information security levels in each of its dimensions will ensure business continuity, as well as early identification of security risks and potential damage to information. The evaluation of security controls and metrics is necessary since they provide information for decision-making at the three decision levels of organizations: operational, tactical and strategic [8].…”
Section: Introductionmentioning
confidence: 99%