Stram: Measuring the trustworthiness of computer-based systems

JH Cho, S Xu, PM Hurley, M Mackay… - ACM Computing …, 2019 - dl.acm.org
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …

On using grey literature and google scholar in systematic literature reviews in software engineering

A Yasin, R Fatima, L Wen, W Afzal, M Azhar… - IEEE …, 2020 - ieeexplore.ieee.org
Context: The inclusion of grey literature (GL) is important to remove publication bias while
gathering available evidence regarding a certain topic. The number of systematic literature …

[HTML][HTML] Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems

J Alanen, J Linnosmaa, T Malm… - Reliability Engineering & …, 2022 - Elsevier
This paper introduces a model-based methodology for hybrid reliability, availability,
maintainability, safety, and security (RAMSS) risk assessment management, which extends …

[HTML][HTML] Ontology-based knowledge representation of industrial production workflow

C Yang, Y Zheng, X Tu, R Ala-Laurinaho… - Advanced Engineering …, 2023 - Elsevier
Industry 4.0 is helping to unleash a new age of digitalization across industries, leading to a
data-driven, interoperable, and decentralized production process. To achieve this major …

OQuaRE: A SQuaRE-based approach for evaluating the quality of ontologies

A Duque-Ramos, JT Fernández-Breis… - Journal of research …, 2011 - search.informit.org
The development of the Semantic Web has provoked an increasing interest in the
development of ontologies. There are, however, few mechanisms for guiding users in …

A novel method to detect and prevent SQLIA using ontology to cloud web security

KN Durai, R Subha, A Haldorai - Wireless Personal Communications, 2021 - Springer
Many modern day web applications deal with huge amount of secured and high impact data.
As a result security plays a major role in web application development. The security of any …

A security ontology for security requirements elicitation

A Souag, C Salinesi, R Mazo… - … Secure Software and …, 2015 - Springer
Security is an important issue that needs to be taken into account at all stages of information
system development, including early requirements elicitation. Early analysis of security …

Towards a reference ontology for security in the internet of things

BA Mozzaquatro, R Jardim-Goncalves… - … on Measurements & …, 2015 - ieeexplore.ieee.org
The diversity of wireless technologies, connected to the Internet and the more powerful and
smaller embedded devices, allows to encompass services to improve everyday activities …

Towards an ontology modeling tool. A validation in software engineering scenarios

FJ García-Peñalvo, R Colomo-Palacios, J García… - Expert Systems with …, 2012 - Elsevier
Ontology creation and management related processes are very important to define and
develop semantic services. Ontology Engineering is the research field that provides the …

Ontology-based model of network and computer attacks for security assessment

J Gao, B Zhang, X Chen, Z Luo - Journal of Shanghai Jiaotong University …, 2013 - Springer
With increased cyber attacks over years, information system security assessment becomes
more and more important. This paper provides an ontology-based attack model, and then …