1. Balepin, I., Maltsev, S., Rowe, J., & Levitt, K. (2003). Using specification-based intrusion detection for automated response. In Recent advances in intrusion detection (pp. 136–154).
2. Gruber, T. R. (1993). A translation approach to portable ontology specifications. Knowledge Acquisition, 5(2), 199–220.
3. Noy, N. F., & McGuinness, D. (2001). Ontology development 101: A guide to creating your first ontology. Technical report KSL-01-05, SMI-2001-0880, Stanford Knowledge Systems Laboratory and Stanford Medical Informatics Technical Report
4. Velasco, D., & Rodriguez, G. (2017). Ontologies for network security and future challenges. arXiv:abs/1704.02441.
5. Abioye, T. E., Arogundade, O. T., Misra, S., Akinwale, A. T., & Adeniran, O. J. (2020). Toward ontology-based risk management framework for software projects: An empirical study. Journal of Software: Evolution and Process, 32(12),