2020
DOI: 10.1007/978-3-030-59535-7_28
|View full text |Cite
|
Sign up to set email alerts
|

Format and Usage Model of Security Patterns in Ontology-Driven Threat Modelling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…BRON implements its ontological approach as a knowledge graph using OWL and RDF formats 18 . The implementation of BRON links together ATT&CK [228,154,33] 19 and CAPEC 20 (for the oensive concepts), D3FEND [148] and Engage [215] 21 (for the defensive concepts), and CWE [163,162] 22 and CVE [161] 23 (for the vulnerability concepts).…”
Section: How Do Bron Initiative Ontologies Interact?mentioning
confidence: 99%
“…BRON implements its ontological approach as a knowledge graph using OWL and RDF formats 18 . The implementation of BRON links together ATT&CK [228,154,33] 19 and CAPEC 20 (for the oensive concepts), D3FEND [148] and Engage [215] 21 (for the defensive concepts), and CWE [163,162] 22 and CVE [161] 23 (for the vulnerability concepts).…”
Section: How Do Bron Initiative Ontologies Interact?mentioning
confidence: 99%