Stram: Measuring the trustworthiness of computer-based systems
Various system metrics have been proposed for measuring the quality of computer-based
systems, such as dependability and security metrics for estimating their performance and …
systems, such as dependability and security metrics for estimating their performance and …
On using grey literature and google scholar in systematic literature reviews in software engineering
Context: The inclusion of grey literature (GL) is important to remove publication bias while
gathering available evidence regarding a certain topic. The number of systematic literature …
gathering available evidence regarding a certain topic. The number of systematic literature …
[HTML][HTML] Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems
J Alanen, J Linnosmaa, T Malm… - Reliability Engineering & …, 2022 - Elsevier
This paper introduces a model-based methodology for hybrid reliability, availability,
maintainability, safety, and security (RAMSS) risk assessment management, which extends …
maintainability, safety, and security (RAMSS) risk assessment management, which extends …
[HTML][HTML] Ontology-based knowledge representation of industrial production workflow
C Yang, Y Zheng, X Tu, R Ala-Laurinaho… - Advanced Engineering …, 2023 - Elsevier
Industry 4.0 is helping to unleash a new age of digitalization across industries, leading to a
data-driven, interoperable, and decentralized production process. To achieve this major …
data-driven, interoperable, and decentralized production process. To achieve this major …
OQuaRE: A SQuaRE-based approach for evaluating the quality of ontologies
A Duque-Ramos, JT Fernández-Breis… - Journal of research …, 2011 - search.informit.org
The development of the Semantic Web has provoked an increasing interest in the
development of ontologies. There are, however, few mechanisms for guiding users in …
development of ontologies. There are, however, few mechanisms for guiding users in …
A novel method to detect and prevent SQLIA using ontology to cloud web security
Many modern day web applications deal with huge amount of secured and high impact data.
As a result security plays a major role in web application development. The security of any …
As a result security plays a major role in web application development. The security of any …
A security ontology for security requirements elicitation
Security is an important issue that needs to be taken into account at all stages of information
system development, including early requirements elicitation. Early analysis of security …
system development, including early requirements elicitation. Early analysis of security …
Towards a reference ontology for security in the internet of things
BA Mozzaquatro, R Jardim-Goncalves… - … on Measurements & …, 2015 - ieeexplore.ieee.org
The diversity of wireless technologies, connected to the Internet and the more powerful and
smaller embedded devices, allows to encompass services to improve everyday activities …
smaller embedded devices, allows to encompass services to improve everyday activities …
Towards an ontology modeling tool. A validation in software engineering scenarios
FJ García-Peñalvo, R Colomo-Palacios, J García… - Expert Systems with …, 2012 - Elsevier
Ontology creation and management related processes are very important to define and
develop semantic services. Ontology Engineering is the research field that provides the …
develop semantic services. Ontology Engineering is the research field that provides the …
Ontology-based model of network and computer attacks for security assessment
J Gao, B Zhang, X Chen, Z Luo - Journal of Shanghai Jiaotong University …, 2013 - Springer
With increased cyber attacks over years, information system security assessment becomes
more and more important. This paper provides an ontology-based attack model, and then …
more and more important. This paper provides an ontology-based attack model, and then …