[1]张新兴, 谈大军. 2000—2006年我国基于本体的信息检索研究论文定量分析[J]. 情报科学, 2008, 26(7): 10161021[2]吴志祥, 王昊, 姜霖. 2007—2011年我国图书情报领域本体研究论文计量分析[J]. 情报科学, 2015, 31(10): 6671,84[3]Donner M. Toward a security ontology[J]. IEEE Security and Privacy, 2003, 1(3): 67[4]高建波, 张保稳, 陈晓桦, 等. 安全本体研究进展[J]. 计算机科学, 2012, 39(8): 1419,41[5]Noy N F, Mcguinness D L. Ontology development 101: A guide to creating your first ontology [R]. Palo Alto, CA: Stanford University, 2001[6]Blanco C, Lasheras J, Fernandez E, et al. Basis for an integrated security ontology according to a systematic review of existing proposals [J]. Computer Standards & Interfaces, 2011, 33(4): 372388[7]Singh V, Pandey S K. A comparative study of cloud security ontologies[C] Proc of the 3rd Int Conf on Reliability, Infocom Technologies and Optimization. Piscataway, NJ: IEEE, 2014: 16[8]Vishik C, Balduccini M. Making sense of future cybersecurity technologies: Using ontologies for multidisciplinary domain analysis[C] Proc of Int Symp on Systems Engineering Conf. Berlin: Springer, 2015: 135145[9]Siciliam A, Garcia B E, Bermejo H J, et al. What are information security ontologies useful for[C] Proc of the Research Conf on Metadata and Semantics Research. Berlin: Springer, 2015: 5161[10]赵佳宝, 谈晓洁, 焦小澄, 等. 基于本体的工业综合预报警系统设计与实现[J]. 系统工程与电子技术, 2010, 32(10): 21452150[11]Wang P, Chao K M, Lo C C, et al. Using ontologies to perform threat analysis and develop defensive strategies for mobile security [J]. Information Technology and Management, 2010, 11(1): 125[12]席睿, 彭长根. 空间约束的基于属性和角色的访问控制研究[J]. 贵州大学学报: 自然科学版, 2010, 27(6): 8185[13]顾铁军, 李毅, 顾健, 等. 网络脆弱性扫描产品标准本体构建及测评工具研究[C] 第28次全国计算机安全学术交流会论文集. 合肥: 中国科学技术大学出版社, 2013: 141143[14]Razzaq A, Anwar Z, Ahmad H F, et al. Ontology for attack detection: An intelligent approach to web application security[J]. Computers & Security, 2014, 45(3): 124146[15]Khairkar A D, Kshirsagar D D, Kumar S. Ontology for detection of web attacks[C] Proc of the Int Conf on Communication Systems and Network Technologies. Piscataway, NJ: IEEE, 2013: 612615[16]郝世博, 朱学芳. 云图书馆可信服务监督模型及关键技术研究[J]. 图书情报工作, 2014, 58(13): 113117,106[17]Sankat M, Thakur R S, Jaloree S. A framework for building ontology in education domain for knowledge representation [J]. International Journal of Computer Science and Information Security, 2016, 14(3): 399403[18]刘一阳, 张保稳. 一种基于信息流的社交网络安全本体模型[J]. 信息安全与通信保密, 2012, 12(1): 6466[19]Takahashi T, Fujiwara H, Kadobayashi Y. Building ontology of cybersecurity operational information[C] Proc of the 6th Annual Workshop on Cyber Security and Information Intelligence Research Conf. New York: ACM, 2010: 8791[20]Liccardo L, Rak M, Modica G, et al. Ontologybased negotiation of security requirements in cloud[C] Proc of the 4th Int Conf on Computational Aspects of Social Networks. Piscataway, NJ: IEEE, 2012: 192197[21]Mangold L V. Using ontologies for adaptive information security training[C] Proc of the 7th Int Conf on Availability, Reliability and Security. Piscataway, NJ: IEEE, 2012: 522524[22]Chun S A, Geller J. Developing a pedagogical cybersecurity ontology[C] Proc of Int Conf on Data Management Technologies and Applications. Berlin: Springer, 2014: 117135[23]Maines C L, Lewellyn J D, Tang S, et al. A cyber security ontology for BPMNSecurity extensions[C] Proc of Int Conf on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing. Piscataway, NJ: IEEE, 2015: 17561763[24]Blackwell C. A security ontology for incident Analysis[C] Proc of the 6th Annual Workshop on Cyber Security and Information Intelligence Research. New York: ACM, 2010: 4649[25]Brahmi I, Brahmi H, Yahia S B. A multiagents intrusion detection system using ontology and clustering techniques[C] Proc of Int Conf on Computer Science and Its Applications. Berlin: Springer, 2015: 381393[26]Choi C, Choi J, Kim P. Ontologybased access control model for security policy reasoning in cloud computing [J]. The Journal of Supercomputing, 2014, 67(3): 711722[27]Si C, Zhang H, Wang Y, et al. Network security situation elements fusion method based on ontology[C] Proc of the 7th Int Symp on Computational Intelligence and Design. Piscataway, NJ: IEEE, 2014: 272275[28]Solic K, Ocevcic H, Golub M. The information systems security level assessment model based on an ontology and evidential reasoning approach [J]. Computers & Security, 2015, 55: 100112[29]Fenz S. An ontology and bayesianbased approach for determining threat probabilities[C] Proc of the 6th ACM Symp on Information, Computer and Communications Security. New York: ACM, 2011: 344354
|