共 50 条
- [31] An Ontology for Effective Security Incident Management [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 26 - 35
- [32] Knowledge Model and Ontology for Security Services [J]. 2018 IEEE FIRST INTERNATIONAL CONFERENCE ON SYSTEM ANALYSIS & INTELLIGENT COMPUTING (SAIC), 2018, : 240 - 243
- [33] An ontology description for SIP security flaws [J]. COMPUTER COMMUNICATIONS, 2007, 30 (06) : 1367 - 1374
- [34] An Ontology Based Approach to Information Security [J]. METADATA AND SEMANTIC RESEARCH, PROCEEDINGS, 2009, 46 : 183 - 192
- [35] An Ontology Based Storage of Security Information [J]. INFORMATION TECHNOLOGY AND CONTROL, 2018, 47 (04): : 655 - 667
- [36] An ontology for modelling security: The Tropos approach [J]. KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2003, 2773 : 1387 - 1394
- [38] The Order Machine - The Ontology of Information Security [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2012, 13 (09): : 695 - 713
- [39] Ontology Based Approach for Network Security [J]. PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2016, : 573 - 578
- [40] A Security Ontology with MDA for Software Development [J]. 2013 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2013, : 67 - 74