Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management 2015
DOI: 10.5220/0005614502910300
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge-based Engineering of Automation Systems using Ontologies and Engineering Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…Some ontologies also include relations between, for example, a risk scenario and recommended security measures, which can be regarded as a way of library-supported security decision making. CPS-related examples can be found in [ 45 , 46 , 47 ]. In addition, frameworks such as MITRE ATT&CK for ICS [ 48 ], including both popular attack techniques and countermeasures, can be regarded as ontologies that can be used for library-supported security decision making.…”
Section: State Of the Artmentioning
confidence: 99%
“…Some ontologies also include relations between, for example, a risk scenario and recommended security measures, which can be regarded as a way of library-supported security decision making. CPS-related examples can be found in [ 45 , 46 , 47 ]. In addition, frameworks such as MITRE ATT&CK for ICS [ 48 ], including both popular attack techniques and countermeasures, can be regarded as ontologies that can be used for library-supported security decision making.…”
Section: State Of the Artmentioning
confidence: 99%
“…Perhaps the biggest challenge in making security design decisions -to be more precise, selecting appropriate security measures -lies in distinguishing the security-relevant information from the irrelevant in a large pool of engineering information [2], [4].…”
Section: Introductionmentioning
confidence: 99%
“…They do not identify, let alone process, relevant information to decide upon security measures. Some of the authors even explicitly state that they regard supporting systematic identification of security measures using their approaches a challenge [4], [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation