F. Abdoli and M. Kahani, Ontology-based distributed intrusion detection system, 14th International CSI Computer Conference, pp.65-70, 2009.

R. Azevedo, E. Dantas, F. Freitas, C. Rodrigues, W. Almeida et al., An autonomic ontology-based multiagent system for intrusion detection in computing environments, International Journal for Infonomics (IJI), vol.3, pp.182-189, 2011.

C. Choi, J. Choi, and P. Kim, Ontology-based access control model for security policy reasoning in cloud computing, The Journal of Supercomputing, vol.67, issue.3, pp.711-722, 2013.

H. T. Elshoush and I. M. Osman, Alert correlation in collaborative intelligent intrusion detection systems a survey, Applied Soft Computing, vol.11, pp.4349-4365, 2011.

J. Gao, B. Zhang, X. Chen, and Z. Luo, Ontology-based model of network and computer attacks for security assessment, Journal of Shanghai Jiaotong University (Science), vol.18, issue.5, pp.554-562, 2013.

S. Seyed-ali-mirheidari, R. Arshad, and . Jalili, Alert correlation algorithms: A survey and taxonomy, Cyberspace Safety and Security, vol.8300, pp.183-197, 2013.

S. More, M. Matthews, A. Joshi, and T. Finin, A knowledge-based approach to intrusion detection modeling, 2012 IEEE Symposium on Security and Privacy Workshops (SPW), pp.75-81, 2012.

B. Morin, L. Mé, H. Debar, and M. Ducassé, A logic-based model to support alert correlation in intrusion detection, Information Fusion, vol.10, issue.4, pp.285-299, 2009.
URL : https://hal.archives-ouvertes.fr/hal-00353059

B. Motik, P. F. Patel-schneider, B. Parsia, C. Bock, A. Fokoue et al., Owl 2 web ontology language: Structural specification and functional-style syntax. W3C recommendation, vol.27, p.17, 2009.

A. Sadighian, S. T. Zargar, J. M. Fernandez, and A. Lemay, Semantic-based context-aware alert fusion for distributed intrusion detection systems, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.1-6, 2013.

A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers and Security, vol.31, issue.3, pp.357-374, 2012.

S. Staab and R. Studer, , 2009.

J. Strassner, Knowledge engineering using ontologies. Handbook of Network and System Administration, vol.4, 2008.

C. Tang, L. Wang, S. Tang, B. Qiang, and J. Tian, Semantic description and verification of security policy based on ontology, Wuhan University Journal of Natural Sciences, vol.19, issue.5, pp.385-392, 2014.

E. Tombini, H. Debar, L. Me, and M. Ducasse, A serial combination of anomaly and misuse idses applied to http traffic, 20th Annual Computer Security Applications Conference, pp.428-437, 2004.
URL : https://hal.archives-ouvertes.fr/hal-00356403

J. Undercoffer, J. Pinkston, A. Joshi, and T. Finin, A target-centric ontology for intrusion detection, 18th International Joint Conference on Artificial Intelligence, pp.9-15, 2004.

A. Ju, M. Wang, and . Guo, Ovm: an ontology for vulnerability management, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, vol.34, pp.1-34, 2009.

P. Wang, K. Chao, C. Lo, and Y. Wang, Using ontologies to perform threat analysis and develop defensive strategies for mobile security, Information Technology and Management, pp.1-25, 2015.

S. Yahi, S. Benferhat, and T. Kenaza, Conflicts handling in cooperative intrusion detection: a description logic approach, 22nd IEEE International Conference on Tools with Artificial Intelligence (ICTAI), vol.2, pp.360-362, 2010.

C. Zhou, C. Leckie, and S. Karunasekera, A survey of coordinated attacks and collaborative intrusion detection, Computers and Security, vol.29, pp.124-140, 2010.