Ontology-based distributed intrusion detection system, 14th International CSI Computer Conference, pp.65-70, 2009. ,
An autonomic ontology-based multiagent system for intrusion detection in computing environments, International Journal for Infonomics (IJI), vol.3, pp.182-189, 2011. ,
Ontology-based access control model for security policy reasoning in cloud computing, The Journal of Supercomputing, vol.67, issue.3, pp.711-722, 2013. ,
Alert correlation in collaborative intelligent intrusion detection systems a survey, Applied Soft Computing, vol.11, pp.4349-4365, 2011. ,
Ontology-based model of network and computer attacks for security assessment, Journal of Shanghai Jiaotong University (Science), vol.18, issue.5, pp.554-562, 2013. ,
Alert correlation algorithms: A survey and taxonomy, Cyberspace Safety and Security, vol.8300, pp.183-197, 2013. ,
A knowledge-based approach to intrusion detection modeling, 2012 IEEE Symposium on Security and Privacy Workshops (SPW), pp.75-81, 2012. ,
A logic-based model to support alert correlation in intrusion detection, Information Fusion, vol.10, issue.4, pp.285-299, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-00353059
Owl 2 web ontology language: Structural specification and functional-style syntax. W3C recommendation, vol.27, p.17, 2009. ,
Semantic-based context-aware alert fusion for distributed intrusion detection systems, 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), pp.1-6, 2013. ,
Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers and Security, vol.31, issue.3, pp.357-374, 2012. ,
, , 2009.
Knowledge engineering using ontologies. Handbook of Network and System Administration, vol.4, 2008. ,
Semantic description and verification of security policy based on ontology, Wuhan University Journal of Natural Sciences, vol.19, issue.5, pp.385-392, 2014. ,
A serial combination of anomaly and misuse idses applied to http traffic, 20th Annual Computer Security Applications Conference, pp.428-437, 2004. ,
URL : https://hal.archives-ouvertes.fr/hal-00356403
A target-centric ontology for intrusion detection, 18th International Joint Conference on Artificial Intelligence, pp.9-15, 2004. ,
Ovm: an ontology for vulnerability management, Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, CSIIRW '09, vol.34, pp.1-34, 2009. ,
Using ontologies to perform threat analysis and develop defensive strategies for mobile security, Information Technology and Management, pp.1-25, 2015. ,
Conflicts handling in cooperative intrusion detection: a description logic approach, 22nd IEEE International Conference on Tools with Artificial Intelligence (ICTAI), vol.2, pp.360-362, 2010. ,
A survey of coordinated attacks and collaborative intrusion detection, Computers and Security, vol.29, pp.124-140, 2010. ,