Blockchain security: A survey of techniques and research directions

J Leng, M Zhou, JL Zhao, Y Huang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Blockchain, an emerging paradigm of secure and shareable computing, is a systematic
integration of 1) chain structure for data verification and storage, 2) distributed consensus …

Ontology-based systems engineering: A state-of-the-art review

L Yang, K Cormican, M Yu - Computers in Industry, 2019 - Elsevier
In recent years ontology-based systems engineering has grown significantly. Its raison d'etre
is to use ontologies to improve the systems engineering body of knowledge. Specifically …

Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence

V Mavroeidis, S Bromander - 2017 European Intelligence and …, 2017 - ieeexplore.ieee.org
Threat intelligence is the provision of evidence-based knowledge about existing or potential
threats. Benefits of threat intelligence include improved efficiency and effectiveness in …

Developing an ontology for cyber security knowledge graphs

M Iannacone, S Bohn, G Nakamura, J Gerth… - Proceedings of the 10th …, 2015 - dl.acm.org
In this paper we describe an ontology developed for a cyber security knowledge graph
database. This is intended to provide an organized schema that incorporates information …

Phoenix rebirth: Scalable MapReduce on a large-scale shared-memory system

RM Yoo, A Romano, C Kozyrakis - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Dynamic runtimes can simplify parallel programming by automatically managing
concurrency and locality without further burdening the programmer. Nevertheless …

On using grey literature and google scholar in systematic literature reviews in software engineering

A Yasin, R Fatima, L Wen, W Afzal, M Azhar… - IEEE …, 2020 - ieeexplore.ieee.org
Context: The inclusion of grey literature (GL) is important to remove publication bias while
gathering available evidence regarding a certain topic. The number of systematic literature …

Towards improved cyber security information sharing

L Dandurand, OS Serrano - 2013 5th International Conference …, 2013 - ieeexplore.ieee.org
There is a requirement for improved information sharing and automation in the cyber
security domain. Current practices and supporting technologies limit the ability of …

Ontologies for security requirements: A literature survey and classification

A Souag, C Salinesi, I Comyn-Wattiau - … Gdańsk, Poland, June 25-26, 2012 …, 2012 - Springer
Despite existing methodologies in the field, most requirements engineers are poorly trained
to define security requirements. This is due to a considerable lack of security knowledge …

A security ontology for security requirements elicitation

A Souag, C Salinesi, R Mazo… - … Secure Software and …, 2015 - Springer
Security is an important issue that needs to be taken into account at all stages of information
system development, including early requirements elicitation. Early analysis of security …

A catalog of security architecture weaknesses

JCS Santos, K Tarrit, M Mirakhorli - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Secure by design is an approach to developing secure software systems from the ground
up. In such approach, the alternate security tactics are first thought, among them, the best …