A comparative study of cloud security ontologies
Cloud Security is one of the foremost concerns among related stakeholders. Each concern
brings diverse effects on discrete assets while analyzing the security issues in Cloud …
brings diverse effects on discrete assets while analyzing the security issues in Cloud …
Comparative study of ontologies based iso 27000 series security standards
Security management standards as ISO/IEC 27000 series provide guidelines, which enable
to evaluate the security in the company on a continuous basis. Security ontology technology …
to evaluate the security in the company on a continuous basis. Security ontology technology …
Ontologies for privacy requirements engineering: A systematic literature review
Privacy has been frequently identified as a main concern for system developers while
dealing with/managing personal information. Despite this, most existing work on privacy …
dealing with/managing personal information. Despite this, most existing work on privacy …
AVARCIBER: a framework for assessing cybersecurity risks
The identification and assessment of risks are a fundamental part of cybersecurity.
Determining the elements that participate in this field is difficult because there is no …
Determining the elements that participate in this field is difficult because there is no …
Leveraging ontologies and machine-learning techniques for malware analysis into android permissions ecosystems
Smartphones form a complex application ecosystem with a myriad of components,
properties, and interfaces that produce an intricate relationship network. Given the intrinsic …
properties, and interfaces that produce an intricate relationship network. Given the intrinsic …
Revisiting cloud security threats: Replay attack
Cloud is an embryonic computing technology that offers immense perspective to develop
product efficiency and operational effectiveness. Cloud technology supports resource …
product efficiency and operational effectiveness. Cloud technology supports resource …
[PDF][PDF] Durchgängiges Wissensmanagement von OT-Security-Wissen im Lebensweg von Produktionsanlagen
C Tebbe - Helmut Schmidt Universität/Universität der …, 2021 - scholar.archive.org
Die Zuverlässigkeit von Produktionsanlagen wird durch Angriffe auf die Security der
Operational Technology (OT) bedroht. Diese Problematik betrifft Unternehmen und Betreiber …
Operational Technology (OT) bedroht. Diese Problematik betrifft Unternehmen und Betreiber …
Cloud computing: vulnerability and threat indications
An innovative approach of providing and delivering resources is the new emerging
technology “cloud computing.” The time demands a reduction in expenditure as an end …
technology “cloud computing.” The time demands a reduction in expenditure as an end …
Cloud security ontology (CSO)
Research study in cloud computing technology reveals the realization of security importance
within its versatile areas. The present security concerns related to issues and challenges …
within its versatile areas. The present security concerns related to issues and challenges …
[PDF][PDF] Ontology and life cycle of knowledge for ICS security assessments
C Tebbe, KH Niemann, A Fay - … Symposium for ICS & …, 2016 - serwiss.bib.hs-hannover.de
Industrial Control Systems (ICS) succumb to an ever evolving variety of threats. Additionally,
threats are increasing in number and get more complex. This requires a holistic and up-to …
threats are increasing in number and get more complex. This requires a holistic and up-to …