Proceedings of the 18th International Conference on Information Integration and Web-Based Applications and Services 2016
DOI: 10.1145/3011141.3011157
|View full text |Cite
|
Sign up to set email alerts
|

Taon

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Most of them are ontologies. In [30] the proposed ontology is used for generating attacks while [28] and [29] ontologies contribute to social engineering analysis and targeted attacks mitigation. These ontologies emphasize the link between the asset concept and the other security concepts (threat, vulnerability, etc.).…”
Section: A Models For Asset Management and Analysismentioning
confidence: 99%
“…Most of them are ontologies. In [30] the proposed ontology is used for generating attacks while [28] and [29] ontologies contribute to social engineering analysis and targeted attacks mitigation. These ontologies emphasize the link between the asset concept and the other security concepts (threat, vulnerability, etc.).…”
Section: A Models For Asset Management and Analysismentioning
confidence: 99%