{"id":"https://openalex.org/W4413915242","doi":"https://doi.org/10.3233/faia250491","title":"An Ontological Lens on Attack Trees: Toward Adequacy and Interoperability","display_name":"An Ontological Lens on Attack Trees: Toward Adequacy and Interoperability","publication_year":2025,"publication_date":"2025-08-28","ids":{"openalex":"https://openalex.org/W4413915242","doi":"https://doi.org/10.3233/faia250491"},"language":"en","primary_location":{"id":"doi:10.3233/faia250491","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250491","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/faia250491","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079913216","display_name":"\u00cdtalo Oliveira","orcid":"https://orcid.org/0000-0002-2384-3081"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"\u00cdtalo Oliveira","raw_affiliation_strings":["Semantics, Cybersecurity, & Services (SCS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Semantics, Cybersecurity, & Services (SCS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034122691","display_name":"Stefano M. Nicoletti","orcid":"https://orcid.org/0000-0001-5522-4798"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Stefano Maria Nicoletti","raw_affiliation_strings":["Formal Methods and Tools (FMT), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Formal Methods and Tools (FMT), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023310587","display_name":"Gal Engelberg","orcid":"https://orcid.org/0000-0001-9021-9740"},"institutions":[{"id":"https://openalex.org/I1310439424","display_name":"Accenture (Switzerland)","ror":"https://ror.org/041r3e346","country_code":"CH","type":"company","lineage":["https://openalex.org/I1310439424","https://openalex.org/I4210093804"]},{"id":"https://openalex.org/I91203450","display_name":"University of Haifa","ror":"https://ror.org/02f009v59","country_code":"IL","type":"education","lineage":["https://openalex.org/I91203450"]}],"countries":["CH","IL"],"is_corresponding":false,"raw_author_name":"Gal Engelberg","raw_affiliation_strings":["Accenture, The Center of Advanced AI, EMEA","University of Haifa, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Accenture, The Center of Advanced AI, EMEA","institution_ids":["https://openalex.org/I1310439424"]},{"raw_affiliation_string":"University of Haifa, Haifa, Israel","institution_ids":["https://openalex.org/I91203450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012435036","display_name":"Mattia Fumagalli","orcid":"https://orcid.org/0000-0003-3385-4769"},"institutions":[{"id":"https://openalex.org/I171543936","display_name":"Free University of Bozen-Bolzano","ror":"https://ror.org/012ajp527","country_code":"IT","type":"education","lineage":["https://openalex.org/I171543936"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Mattia Fumagalli","raw_affiliation_strings":["KRDB Research Centre on Knowledge and Data, Free University of Bozen-Bolzan, Bolzano, Italy"],"affiliations":[{"raw_affiliation_string":"KRDB Research Centre on Knowledge and Data, Free University of Bozen-Bolzan, Bolzano, Italy","institution_ids":["https://openalex.org/I171543936"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004921249","display_name":"Dan Klein","orcid":"https://orcid.org/0000-0002-8881-1902"},"institutions":[{"id":"https://openalex.org/I1310439424","display_name":"Accenture (Switzerland)","ror":"https://ror.org/041r3e346","country_code":"CH","type":"company","lineage":["https://openalex.org/I1310439424","https://openalex.org/I4210093804"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Dan Klein","raw_affiliation_strings":["Accenture, The Center of Advanced AI, EMEA"],"affiliations":[{"raw_affiliation_string":"Accenture, The Center of Advanced AI, EMEA","institution_ids":["https://openalex.org/I1310439424"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065297243","display_name":"Giancarlo Guizzardi","orcid":"https://orcid.org/0000-0002-3452-553X"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Giancarlo Guizzardi","raw_affiliation_strings":["Semantics, Cybersecurity, & Services (SCS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Semantics, Cybersecurity, & Services (SCS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5079913216"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.50921228,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9458000063896179,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9458000063896179,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9271000027656555,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.900600016117096,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interoperability","display_name":"Interoperability","score":0.7338488101959229},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5142566561698914},{"id":"https://openalex.org/keywords/lens","display_name":"Lens (geology)","score":0.44476425647735596},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22845759987831116},{"id":"https://openalex.org/keywords/geology","display_name":"Geology","score":0.1860036551952362},{"id":"https://openalex.org/keywords/petroleum-engineering","display_name":"Petroleum engineering","score":0.04083862900733948}],"concepts":[{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.7338488101959229},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5142566561698914},{"id":"https://openalex.org/C15336307","wikidata":"https://www.wikidata.org/wiki/Q1766051","display_name":"Lens (geology)","level":2,"score":0.44476425647735596},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22845759987831116},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.1860036551952362},{"id":"https://openalex.org/C78762247","wikidata":"https://www.wikidata.org/wiki/Q1273174","display_name":"Petroleum engineering","level":1,"score":0.04083862900733948}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3233/faia250491","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250491","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire/96314d8d-151b-4a41-9042-01a0fdf2a6c8","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/96314d8d-151b-4a41-9042-01a0fdf2a6c8","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Oliveira, \u00cd, Nicoletti, S M, Engelberg, G, Fumagalli, M, Klein, D & Guizzardi, G 2025, An Ontological Lens on Attack Trees : Toward Adequacy and Interoperability. in T P Sales, C Masolo & C M Keet (eds), Formal Ontology in Information Systems - Proceedings of the 15th International Conference, FOIS 2025. Frontiers in Artificial Intelligence and Applications, vol. 409, IOS, Amsterdam, pp. 151-165, 15th Formal Ontology in Information Systems Conference, FOIS 2025, Catania, Italy, 4/09/25. https://doi.org/10.3233/FAIA250491","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:unibz.it:11364040330001241","is_oa":true,"landing_page_url":"https://doi.org/10.3233/FAIA250491","pdf_url":null,"source":{"id":"https://openalex.org/S4210197018","display_name":"View","issn_l":"2688-268X","issn":["2688-268X","2688-3988"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Proceedings"}],"best_oa_location":{"id":"doi:10.3233/faia250491","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia250491","pdf_url":null,"source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2093262417","https://openalex.org/W4312626803","https://openalex.org/W2123131699","https://openalex.org/W650116260","https://openalex.org/W2378329187","https://openalex.org/W4390790060","https://openalex.org/W2134191509"],"abstract_inverted_index":{"Attack":[0],"Trees":[1],"(AT)":[2],"are":[3,11],"a":[4,53,117,166,197],"popular":[5],"formalism":[6],"for":[7,46,192],"security":[8,29,48,71],"analysis.":[9],"They":[10],"meant":[12],"to":[13,23,56,93,162,200],"display":[14],"an":[15,104],"attacker\u2019s":[16],"goal":[17],"decomposed":[18],"into":[19],"attack":[20,32],"steps":[21],"needed":[22],"achieve":[24],"it":[25],"and":[26,35,60,66,81,114,135,185],"compute":[27],"certain":[28],"metrics":[30,72],"(e.g.,":[31],"cost,":[33],"probability,":[34],"damage).":[36],"ATs":[37,164],"offer":[38],"three":[39],"important":[40],"services:":[41],"(a)":[42],"conceptual":[43],"modeling":[44,160],"capabilities":[45],"representing":[47],"risk":[49,201],"management":[50,202],"scenarios,":[51],"(b)":[52],"qualitative":[54],"assessment":[55],"find":[57],"root":[58],"causes":[59],"minimal":[61,79],"conditions":[62],"of":[63,96,112,133,170],"successful":[64],"attacks,":[65],"(c)":[67],"quantitative":[68],"analyses":[69],"via":[70],"computation":[73],"under":[74],"formal":[75],"semantics,":[76],"such":[77],"as":[78],"time":[80],"cost":[82],"among":[83],"all":[84],"attacks.":[85],"Still,":[86],"the":[87,109,123,130,190],"AT":[88,134],"language":[89],"presents":[90],"limitations":[91],"due":[92],"its":[94],"lack":[95,169],"ontological":[97,105,131,152],"foundations,":[98],"thus":[99],"compromising":[100],"associated":[101],"services.":[102],"Via":[103],"analysis":[106,188],"grounded":[107],"in":[108,148,174],"Common":[110],"Ontology":[111,126],"Value":[113],"Risk":[115],"(COVER)\u2014":[116],"reference":[118],"core":[119],"ontology":[120],"based":[121],"on":[122],"Unified":[124],"Foundational":[125],"(UFO)\u2014":[127],"we":[128],"investigate":[129],"adequacy":[132],"reveal":[136],"four":[137],"significant":[138],"shortcomings:":[139],"(1)":[140],"ambiguous":[141],"syntactical":[142],"terms":[143],"that":[144],"can":[145],"be":[146],"interpreted":[147],"various":[149],"ways;":[150],"(2)":[151],"deficit":[153],"concerning":[154],"crucial":[155],"domain-specific":[156],"concepts;":[157],"(3)":[158],"lacking":[159],"guidance":[161],"construct":[163],"decomposing":[165],"goal;":[167],"(4)":[168],"semantic":[171],"interoperability,":[172],"resulting":[173],"ad":[175],"hoc":[176],"stand-alone":[177],"tools.":[178],"We":[179],"also":[180],"discuss":[181],"existing":[182],"incremental":[183],"solutions":[184],"how":[186],"our":[187],"paves":[189],"way":[191],"overcoming":[193],"those":[194],"issues":[195],"through":[196],"broader":[198],"approach":[199],"modeling.":[203]},"counts_by_year":[],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
