Publisher
Springer International Publishing
Reference17 articles.
1. Dandurand, et al.: Standards and tools for exchange and processing of actionable information. European Union Agency for Network and Information Security, Luxembourg (2015)
2. Ekelhart, A., Fenz, S., Neubauer, T.: Aurum: a framework for information security risk management. In: Proceedings of the 42nd Hawaii International Conference on System Sciences (2009).
https://doi.org/10.1109/HICSS.2009.82
3. Fenz, S., Ekelhart, A.: Formalizing information security knowledge. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (2009).
https://doi.org/10.1145/1533057.1533084
4. Guo, M., Wang, J.: An ontology-based approach to model common vulnerabilities and exposures in information security. In: ASEE Southeastern Section Annual Conference (2009)
5. Iannacone, M., et al.: Developing an ontology for cyber security knowledge graphs (2015).
https://doi.org/10.1145/2746266.2746278
Cited by
61 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Compact Vulnerability Knowledge Graph for Risk Assessment;ACM Transactions on Knowledge Discovery from Data;2024-07-31
2. Untargeted Adversarial Attack on Knowledge Graph Embeddings;Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval;2024-07-10
3. Actionable Cyber Threat Intelligence Using Knowledge Graphs and Large Language Models;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
4. Security Orchestration with Explainability for Digital Twins-Based Smart Systems;2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC);2024-07-02
5. Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon;European Interdisciplinary Cybersecurity Conference;2024-06-05