“…For example, a core node for linking, and mediating between, cybersecurity Linked Open Data (LOD) KOSes in the LOD Cloud 36 is the Unified Cybersecurity Ontology (UCO). It defines typed connections between STIX, CAPEC, 37 MAEC, 38 CWE, 39 CVE, 40 CVSS, 41 Cybox, 42 CPE, 43 OpenIOC, 44 STUCCO, Mobile Access Control, and the Cloud User Ontology terms [61]. VulOntology 45 is a vulnerability ontology that defines the relationship between vulnerabilities and applications, platforms, and weaknesses [44].…”