M : A systematic review and comparison of security ontologies. (ARES), 2008. ,
Towards the development of secure information systems: Security Reference Diagram and Security Attack Scenarios, CAiSE, 2004. ,
Security Ontologies: Improving Quantitative Risk Analysis, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07), 2007. ,
DOI : 10.1109/HICSS.2007.478
Toward principles for the design of ontologies used for knowledge sharing?, International Journal of Human-Computer Studies, vol.43, issue.5-6, pp.5-6, 1995. ,
DOI : 10.1006/ijhc.1995.1081
Revisiting Ontology-Based Requirements Engineering in the age of the Semantic Web, Requirements Engineering, 2006. ,
Toward a Security Ontology, IEEE Security and Privacy, 2003. ,
Assessing the value of IS journals, Communications of the ACM, vol.48, issue.1, 2005. ,
DOI : 10.1145/1039539.1039573
Examining differences across journal rankings, Communications of the ACM, vol.48, issue.2, pp.91-94, 2005. ,
DOI : 10.1145/1042091.1042096
Telos ? a language for representing knowledge about information systems, ACM Trans. Information Systems, vol.8, issue.4, pp.327-362, 1990. ,
Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, 2004. ,
DOI : 10.1109/TDSC.2004.2
A taxonomy of computer program security flaws, ACM Comput. Surv, vol.26, issue.3, pp.211-254, 1994. ,
An Ontology of Information Security, International Journal of Information Security, vol.14, pp.1-23, 2007. ,
Formalizing information security knowledge. (ASIACCS '09), pp.183-194, 2009. ,
Modeling Computer Attacks: An Ontology for Intrusion Detection, Lecture Notes in Computer Science, pp.113-135, 2003. ,
DOI : 10.1007/978-3-540-45248-5_7
An ontology description for SIP security flaws, Computer Communications, vol.30, issue.6, 2006. ,
DOI : 10.1016/j.comcom.2006.12.023
OWL-S Semantics of Security Web Services: a [18, Security in the Semantic Web using OWL. Information Security Technical Report, pp.51-58, 2005. ,
Security Attack Ontology for Web Services. SKG '06, p.42, 2006. ,
Ontology Development for Industrial Risk Analysis, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, 2008. ,
DOI : 10.1109/ICTTA.2008.4530312
Towards an Ontology-based Security Management, 20th International Conference on Advanced Information Networking and Applications, Volume 1 (AINA'06), pp.985-992, 2006. ,
DOI : 10.1109/AINA.2006.329
An ontology for secure e-government applications (ARES'06), pp.1033-1037, 2006. ,
A taxonomy of security-related requirements An Ontology for Modeling Security: The Tropos Approach, in Knowledge-Based Intelligent Information and Engineering Systems, Paris,05. [25, pp.1387-1394, 2003. ,
An Extended Ontology for Security Requirements, pp.20-24, 2011. ,
DOI : 10.1007/978-3-540-45248-5_7
Security Requirements Engineering: State of the Art and Practice and Challenges, 2009. ,
Ontologies and Information Systems: A Literature Survey, 1947. ,
Industry needs and research directions in requirements engineering for embedded systems, Requirements Engineering, vol.15, issue.2, 2012. ,
DOI : 10.1007/s00766-011-0144-x