A comparative study of cloud security ontologies

V Singh, SK Pandey - Proceedings of 3rd International …, 2014 - ieeexplore.ieee.org
Cloud Security is one of the foremost concerns among related stakeholders. Each concern
brings diverse effects on discrete assets while analyzing the security issues in Cloud …

Comparative study of ontologies based iso 27000 series security standards

I Meriah, LBA Rabai - Procedia Computer Science, 2019 - Elsevier
Security management standards as ISO/IEC 27000 series provide guidelines, which enable
to evaluate the security in the company on a continuous basis. Security ontology technology …

Ontologies for privacy requirements engineering: A systematic literature review

M Gharib, P Giorgini, J Mylopoulos - arXiv preprint arXiv:1611.10097, 2016 - arxiv.org
Privacy has been frequently identified as a main concern for system developers while
dealing with/managing personal information. Despite this, most existing work on privacy …

AVARCIBER: a framework for assessing cybersecurity risks

AM Rea-Guaman, J Mejía, T San Feliu… - Cluster …, 2020 - Springer
The identification and assessment of risks are a fundamental part of cybersecurity.
Determining the elements that participate in this field is difficult because there is no …

Leveraging ontologies and machine-learning techniques for malware analysis into android permissions ecosystems

LC Navarro, AKW Navarro, A Grégio, A Rocha… - Computers & …, 2018 - Elsevier
Smartphones form a complex application ecosystem with a myriad of components,
properties, and interfaces that produce an intricate relationship network. Given the intrinsic …

Revisiting cloud security threats: Replay attack

V Singh, SK Pandey - 2018 4th International Conference on …, 2018 - ieeexplore.ieee.org
Cloud is an embryonic computing technology that offers immense perspective to develop
product efficiency and operational effectiveness. Cloud technology supports resource …

[PDF][PDF] Durchgängiges Wissensmanagement von OT-Security-Wissen im Lebensweg von Produktionsanlagen

C Tebbe - Helmut Schmidt Universität/Universität der …, 2021 - scholar.archive.org
Die Zuverlässigkeit von Produktionsanlagen wird durch Angriffe auf die Security der
Operational Technology (OT) bedroht. Diese Problematik betrifft Unternehmen und Betreiber …

Cloud computing: vulnerability and threat indications

V Singh, SK Pandey - … Management of Integrated Systems and its …, 2020 - Springer
An innovative approach of providing and delivering resources is the new emerging
technology “cloud computing.” The time demands a reduction in expenditure as an end …

Cloud security ontology (CSO)

V Singh, SK Pandey - Cloud Computing for Geospatial Big Data Analytics …, 2019 - Springer
Research study in cloud computing technology reveals the realization of security importance
within its versatile areas. The present security concerns related to issues and challenges …

[PDF][PDF] Ontology and life cycle of knowledge for ICS security assessments

C Tebbe, KH Niemann, A Fay - … Symposium for ICS & …, 2016 - serwiss.bib.hs-hannover.de
Industrial Control Systems (ICS) succumb to an ever evolving variety of threats. Additionally,
threats are increasing in number and get more complex. This requires a holistic and up-to …