Have a personal or library account? Click to login

Security Ontology in a Virtual University

Open Access
|Jun 2024

References

  1. Borja Rivadeneira, W.F., & Gómez, O.S. (2020). Cybersecurity Ontologies: A Systematic Literature Review. ReCIBE - Revista electrónica de Computación, Informática, Biomédica y Electrónica, Vol. 9, Núm. 2, 1-18.
  2. De Rosa, F., et al. (2021). Ontology for Cybersecurity Governance of ICT Systems. Available at: https://ceur-ws.org/Vol-3260/paper4.pdf.
  3. Dinicu, A., Oancea, R. & Bârsan, G. (2021). The Multidimensional Impact On Society Of Cyber Attacks Targeting The Energy Critical Infrastructure Sector. Land Forces Academy Review, Vol. XXVI, No. 4 (104).
  4. Georgescu, T.M., & Smeureanu, I. (2017). Using Ontologies in Cybersecurity Field. Informatica Economică, Vol. 21, Issue 3. Available at: https://www.revistaie.ase.ro/content/83/01%20-%20smeureanu,%20georgescu.pdf.
  5. Gligorea, I., Yaseen, M., Cioca, M., Gorski, H., & Oancea, R. (2022). An Interpretable Framework for an Efficient Analysis of Students’ Academic Performance. Sustainability, Vol. 14, Issue 14. Available at: https://doi.org/10.3390/su14148885.
  6. Gomes, H., Zúquete, A., & Paiva Dias, G. (2009). An Overview of Security Ontologies. 9ª Conferência da Associação Portuguesa de Sistemas de Informação (CAPSI 2009), Portugal.
  7. https://www.techtarget.com/searchsecurity/definition/CVSS-Common-Vulnerability-Scoring-System.
  8. https://capec.mitre.org/.
  9. https://info.opswat.com/dm/.
  10. https://www.techtarget.com/searchsecurity/definition/STIX-Structured-Threat-Information-eXpression.
  11. https://cyware.com/security-guides/cyber-threat-intelligence/what-is-cybox-how-doyou-use-a-cybox-object-af90.
  12. https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA.
  13. https://nordlayer.com/zero-trust-security/?gclid=EAIaIQobChMItv3H2MaA_gIVgeJ3Ch3FEQA_EAAYAyAAEgLVbPD_BwE.
  14. https://www.techtarget.com/searchsecurity/definition/authentication-authorization-and-accounting.
  15. https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-defense-in-depth-did.
  16. https://www.nist.gov/cyberframework.
  17. Léger, M.-A., Gagnon, S., & Valverde, R. (2021). Ontology engineering methodology for cybersecurity requirements in Business Technology Management. Available at: https://www.researchgate.net/publication/357284585_Ontology_engineering_methodology_for_cybersecurity_requirements_in_Business_Technology_Management.
  18. Modiba, N., Ojo, S., & Ncube, Z. (2019). An Ontology Based Model for Cyber Security Awareness Education. Kalpa Publications in Computing, Proceedings of 4th International Conference on the Internet, Cyber Security and Information Systems 2019, Vol. 12, 169-179.
  19. Pastuszuk, J., Burek, P., & Ksiȩżopolski, B. (2021). Systems Cybersecurity Ontology for Dynamic Analysis of IT Systems. Procedia Computer Science Journal, Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES2021, Vol. 192, 1011-1020. Available at: https://www.sciencedirect.com/science/article/pii/S1877050921015921.
DOI: https://doi.org/10.2478/raft-2024-0017 | Journal eISSN: 3100-5071 | Journal ISSN: 3100-5063
Language: English
Page range: 161 - 170
Published on: Jun 26, 2024
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2024 Loredana Mocean, Miranda-Petronella Vlad, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.