Cite

Borja Rivadeneira, W.F., & Gómez, O.S. (2020). Cybersecurity Ontologies: A Systematic Literature Review. ReCIBE - Revista electrónica de Computación, Informática, Biomédica y Electrónica, Vol. 9, Núm. 2, 1-18. Search in Google Scholar

De Rosa, F., et al. (2021). Ontology for Cybersecurity Governance of ICT Systems. Available at: https://ceur-ws.org/Vol-3260/paper4.pdf. Search in Google Scholar

Dinicu, A., Oancea, R. & Bârsan, G. (2021). The Multidimensional Impact On Society Of Cyber Attacks Targeting The Energy Critical Infrastructure Sector. Land Forces Academy Review, Vol. XXVI, No. 4 (104). Search in Google Scholar

Georgescu, T.M., & Smeureanu, I. (2017). Using Ontologies in Cybersecurity Field. Informatica Economică, Vol. 21, Issue 3. Available at: https://www.revistaie.ase.ro/content/83/01%20-%20smeureanu,%20georgescu.pdf. Search in Google Scholar

Gligorea, I., Yaseen, M., Cioca, M., Gorski, H., & Oancea, R. (2022). An Interpretable Framework for an Efficient Analysis of Students’ Academic Performance. Sustainability, Vol. 14, Issue 14. Available at: https://doi.org/10.3390/su14148885. Search in Google Scholar

Gomes, H., Zúquete, A., & Paiva Dias, G. (2009). An Overview of Security Ontologies. 9ª Conferência da Associação Portuguesa de Sistemas de Informação (CAPSI 2009), Portugal. Search in Google Scholar

https://www.techtarget.com/searchsecurity/definition/CVSS-Common-Vulnerability-Scoring-System. Search in Google Scholar

https://capec.mitre.org/. Search in Google Scholar

https://info.opswat.com/dm/. Search in Google Scholar

https://www.techtarget.com/searchsecurity/definition/STIX-Structured-Threat-Information-eXpression. Search in Google Scholar

https://cyware.com/security-guides/cyber-threat-intelligence/what-is-cybox-how-doyou-use-a-cybox-object-af90. Search in Google Scholar

https://www.techtarget.com/whatis/definition/Confidentiality-integrity-and-availability-CIA. Search in Google Scholar

https://nordlayer.com/zero-trust-security/?gclid=EAIaIQobChMItv3H2MaA_gIVgeJ3Ch3FEQA_EAAYAyAAEgLVbPD_BwE. Search in Google Scholar

https://www.techtarget.com/searchsecurity/definition/authentication-authorization-and-accounting. Search in Google Scholar

https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-defense-in-depth-did. Search in Google Scholar

https://www.nist.gov/cyberframework. Search in Google Scholar

Léger, M.-A., Gagnon, S., & Valverde, R. (2021). Ontology engineering methodology for cybersecurity requirements in Business Technology Management. Available at: https://www.researchgate.net/publication/357284585_Ontology_engineering_methodology_for_cybersecurity_requirements_in_Business_Technology_Management. Search in Google Scholar

Modiba, N., Ojo, S., & Ncube, Z. (2019). An Ontology Based Model for Cyber Security Awareness Education. Kalpa Publications in Computing, Proceedings of 4th International Conference on the Internet, Cyber Security and Information Systems 2019, Vol. 12, 169-179. Search in Google Scholar

Pastuszuk, J., Burek, P., & Ksiȩżopolski, B. (2021). Systems Cybersecurity Ontology for Dynamic Analysis of IT Systems. Procedia Computer Science Journal, Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 25th International Conference KES2021, Vol. 192, 1011-1020. Available at: https://www.sciencedirect.com/science/article/pii/S1877050921015921. Search in Google Scholar