{"id":"https://openalex.org/W2863920142","doi":"https://doi.org/10.1109/rcis.2018.8406673","title":"Semantic integration of security knowledge sources","display_name":"Semantic integration of security knowledge sources","publication_year":2018,"publication_date":"2018-05-01","ids":{"openalex":"https://openalex.org/W2863920142","doi":"https://doi.org/10.1109/rcis.2018.8406673","mag":"2863920142"},"language":"en","primary_location":{"id":"doi:10.1109/rcis.2018.8406673","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rcis.2018.8406673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004221422","display_name":"Ana-Maria Ghiran","orcid":"https://orcid.org/0000-0001-7890-9386"},"institutions":[{"id":"https://openalex.org/I3125347698","display_name":"Babe\u0219-Bolyai University","ror":"https://ror.org/02rmd1t30","country_code":"RO","type":"education","lineage":["https://openalex.org/I3125347698"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Ana-Maria Ghiran","raw_affiliation_strings":["Business Informatics Research Center, Babe\u015f-Bolyai University, Cluj-Napoca, Romania"],"affiliations":[{"raw_affiliation_string":"Business Informatics Research Center, Babe\u015f-Bolyai University, Cluj-Napoca, Romania","institution_ids":["https://openalex.org/I3125347698"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019886944","display_name":"Robert Andrei Buchmann","orcid":"https://orcid.org/0000-0002-7385-1610"},"institutions":[{"id":"https://openalex.org/I3125347698","display_name":"Babe\u0219-Bolyai University","ror":"https://ror.org/02rmd1t30","country_code":"RO","type":"education","lineage":["https://openalex.org/I3125347698"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Robert Andrei Buchmann","raw_affiliation_strings":["Business Informatics Research Center, Babe\u015f-Bolyai University, Cluj-Napoca, Romania"],"affiliations":[{"raw_affiliation_string":"Business Informatics Research Center, Babe\u015f-Bolyai University, Cluj-Napoca, Romania","institution_ids":["https://openalex.org/I3125347698"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5004221422"],"corresponding_institution_ids":["https://openalex.org/I3125347698"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.08163026,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.700901210308075},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.6092292666435242},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.48887914419174194},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4793627858161926},{"id":"https://openalex.org/keywords/information-security-standards","display_name":"Information security standards","score":0.4767761528491974},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.4728396534919739},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.4704177677631378},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.462128609418869},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.43063902854919434},{"id":"https://openalex.org/keywords/knowledge-base","display_name":"Knowledge base","score":0.4127860367298126},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.40723395347595215},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3999638557434082},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2108934223651886},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.09957015514373779}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.700901210308075},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.6092292666435242},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.48887914419174194},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4793627858161926},{"id":"https://openalex.org/C139547956","wikidata":"https://www.wikidata.org/wiki/Q6031202","display_name":"Information security standards","level":5,"score":0.4767761528491974},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4728396534919739},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.4704177677631378},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.462128609418869},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.43063902854919434},{"id":"https://openalex.org/C4554734","wikidata":"https://www.wikidata.org/wiki/Q593744","display_name":"Knowledge base","level":2,"score":0.4127860367298126},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.40723395347595215},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3999638557434082},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2108934223651886},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.09957015514373779},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/rcis.2018.8406673","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rcis.2018.8406673","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 12th International Conference on Research Challenges in Information Science (RCIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320323983","display_name":"Unitatea Executiva pentru Finantarea Invatamantului Superior, a Cercetarii, Dezvoltarii si Inovarii","ror":"https://ror.org/01q7jq182"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1499966149","https://openalex.org/W1514888816","https://openalex.org/W1524147119","https://openalex.org/W1811024770","https://openalex.org/W1983551905","https://openalex.org/W2050764671","https://openalex.org/W2070767329","https://openalex.org/W2072729271","https://openalex.org/W2082043632","https://openalex.org/W2107581074","https://openalex.org/W2110054482","https://openalex.org/W2116068721","https://openalex.org/W2118355922","https://openalex.org/W2121646625","https://openalex.org/W2140941224","https://openalex.org/W2152415989","https://openalex.org/W2156221105","https://openalex.org/W2158572645","https://openalex.org/W2160339156","https://openalex.org/W2165064701","https://openalex.org/W2169187055","https://openalex.org/W2195155348","https://openalex.org/W2252272901","https://openalex.org/W2335968944","https://openalex.org/W2618315025","https://openalex.org/W3121840377","https://openalex.org/W3161918289","https://openalex.org/W4293258406","https://openalex.org/W4301103908","https://openalex.org/W6629566846","https://openalex.org/W6646143945","https://openalex.org/W6676387807","https://openalex.org/W6678264782","https://openalex.org/W6688003050","https://openalex.org/W7075713407"],"related_works":["https://openalex.org/W2397931496","https://openalex.org/W2165898552","https://openalex.org/W2745157681","https://openalex.org/W2290724697","https://openalex.org/W88610236","https://openalex.org/W2299494954","https://openalex.org/W1811024770","https://openalex.org/W4230385779","https://openalex.org/W2418642600","https://openalex.org/W2988129474"],"abstract_inverted_index":{"For":[0],"evaluating":[1],"the":[2,22,42,49,87,164,211,266],"security":[3,10,43,58,68,91,116,189,204,218,242,250,293,302],"in":[4,45,160],"enterprise":[5,46,193],"systems,":[6],"we":[7,157],"need":[8],"a":[9,79,90,147,150,180,183,187,207,283],"model":[11],"that":[12,96,114,121,167,256],"is":[13,153,279],"amenable":[14],"to":[15,162,174,185,202,226,263,296],"integration,":[16],"automated":[17],"comparison":[18],"and":[19,74,112,133,139,209,271,274,299],"assessment.":[20],"Over":[21],"years,":[23],"practitioners":[24],"have":[25],"used":[26],"various":[27,200,236],"frameworks":[28],"or":[29,60,82,223],"standards":[30,95],"(COBIT,":[31],"ISO":[32],"2700x":[33],"family)":[34],"as":[35,259,265],"checklists":[36],"against":[37],"which":[38],"they":[39],"could":[40],"assess":[41],"level":[44],"systems.":[47,194],"On":[48],"other":[50,105],"hand,":[51],"researchers":[52],"were":[53],"more":[54],"concerned":[55],"with":[56,239],"analysing":[57],"requirements":[59,294],"designing":[61],"software":[62],"for":[63,78,182,192,290],"describing":[64,291],"those":[65],"requirements.":[66],"These":[67],"models":[69],"are":[70,83,97,103,119,129,136,257],"either":[71],"too":[72],"general":[73],"contain":[75],"unnecessary":[76],"information":[77],"particular":[80],"organisation,":[81],"highly":[84],"dependent":[85],"on":[86,287],"expertise":[88],"of":[89,149,282],"engineer.":[92],"Besides":[93],"these":[94,143,264],"giving":[98],"guidelines":[99],"regarding":[100],"security,":[101,125],"there":[102,118],"many":[104],"sources":[106,238],"like":[107],"books,":[108],"blogs,":[109],"news,":[110],"trainings":[111],"courses":[113],"produce":[115],"recommendations,":[117],"regulations":[120],"mandate":[122],"awareness":[123],"about":[124],"but":[126],"still,":[127],"organisations":[128],"missing":[130],"appropriate":[131,169],"knowledge":[132,190,205,229,240,251],"their":[134],"systems":[135],"often":[137],"attacked":[138],"breached.":[140],"Having":[141],"all":[142],"means":[144],"available":[145],"at":[146,210],"click":[148],"mouse,":[151],"it":[152],"questionable":[154],"how":[155],"can":[156,214],"use":[158,215,281],"them":[159],"order":[161],"find":[163],"right":[165],"solution":[166,197],"generates":[168],"behaviour.":[170],"This":[171],"paper":[172],"intends":[173],"tackle":[175],"this":[176,228],"problem":[177],"by":[178],"formulating":[179],"proposal":[181],"methodology":[184],"setup":[186],"hybrid":[188],"repository":[191,208],"The":[195,249],"proposed":[196],"will":[198],"enable":[199,245],"stakeholders":[201],"add/share":[203],"in/from":[206],"same":[212],"time":[213],"external":[216,301],"trusted":[217,300],"data":[219],"(from":[220],"collaborative":[221],"partners":[222],"reliable":[224],"organisations)":[225],"enrich":[227],"base":[230],"via":[231],"semantic":[232,288],"inter-operability":[233],"techniques.":[234],"Combining":[235],"online":[237],"from":[241],"officers":[243],"would":[244],"inferring":[246],"new":[247],"insights.":[248],"holds":[252],"some":[253],"key":[254],"characteristics":[255],"considered":[258],"imperative.":[260],"We":[261],"referred":[262],"5C:":[267],"Complexity,":[268],"Continuity,":[269],"Comprehensive":[270],"Cross-organisations,":[272],"Compliance":[273],"Common":[275],"representation.":[276],"Our":[277],"approach":[278],"making":[280],"common":[284],"representation":[285],"based":[286],"technology":[289],"both":[292],"pertaining":[295],"an":[297],"organisation":[298],"data.":[303]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
