2018
DOI: 10.1007/978-3-319-98842-9_1
|View full text |Cite
|
Sign up to set email alerts
|

OWL Ontologies in Cybersecurity: Conceptual Modeling of Cyber-Knowledge

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 33 publications
0
7
0
Order By: Relevance
“…We would like to clarify that this research is a first step to conduct a systematic research in the future. We are aware that the search string is very limited, but it is enough to look for the particularities of ontologies, like those presented by Leslie Sikos [45]. Therefore we know the necessity of a new further step on refining the terminology used.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We would like to clarify that this research is a first step to conduct a systematic research in the future. We are aware that the search string is very limited, but it is enough to look for the particularities of ontologies, like those presented by Leslie Sikos [45]. Therefore we know the necessity of a new further step on refining the terminology used.…”
Section: Discussionmentioning
confidence: 99%
“…The work of Leslie Sikos [45] presents a literature review in the context of Cybersecurity Ontologies. This related work introduces multiple classifications but the orthogonality relationship among those is not clear, sometimes mixing.…”
Section: Related Workmentioning
confidence: 99%
“…Shiho Kim et al [ Ville Sulkamo [26] security issue is the main concern in IoT, has discussed about IoT architecture with Network Mapper, NMAP and NESSUS scanners is used to find threats in the first phase, scanners are installed in kali Linux servers . Raspberry Pi4 computer with big data analytics to collect data and used Pentaho PDI tools.…”
Section: Cyber Se Security In Internet Of Thingsmentioning
confidence: 99%
“…Cybercriminals such as hackers tend to constantly evolve their attack strategies, which makes monitoring tools crucial to assess risks and obtain cyber-situational awareness. Efficient monitoring and logging can be complemented by complex behavior analysis performed by automated software agents, which utilize artificial intelligence in cybersecurity applications [24]. The security-first approach particularly benefits small to medium-sized businesses with very limited resources to secure their network [25].…”
Section: Introductionmentioning
confidence: 99%