Abdallah, R., Motii, A., Yakymets, N., Lanusse, A.: Using model driven engineering to support multi-paradigms security analysis. In: International Conference on Model-Driven Engineering and Software Development, pp. 278–292 (2015)
Google Scholar
Agrafiotis, I., Nurse, J.R., Goldsmith, M., Creese, S., Upton, D.: A taxonomy of cyber-harms: defining the impacts of cyber-attacks and understanding how they propagate. J. Cybersecur. 4(1), tyy006 (2018)
Google Scholar
Ashibani, Y., Mahmoud, Q.H.: Cyber physical systems security: analysis, challenges and solutions. Comput. Secur. 68, 81–97 (2017)
CrossRef
Google Scholar
Booth, H., Turner, C.: Vulnerability description ontology (vdo): a framework for characterizing vulnerabilities. Technical report, National Institute of Standards and Technology (2016)
Google Scholar
Choraś, M., Flizikowski, A., Kozik, R., Hołubowicz, W.: Decision aid tool and ontology-based reasoning for critical infrastructure vulnerabilities and threats analysis. In: International Workshop on Critical Information Infrastructures Security, pp. 98–110 (2009)
Google Scholar
EBIOS: Ebios risk manager - the method. https://www.ssi.gouv.fr/uploads/ 2019/11/anssi-guide-ebios_risk_manager-en-v1.0.pdf (2019)
ENISA: Cyber security and resilience for Smart Hospitals. https://www.enisa.europa.eu/publications/cyber-security-and-resilience-for-smart-hospitals (2016)
Fernández-López, M., Gómez-Pérez, A., Juristo, N.: Methontology: from ontological art towards ontological engineering (1997)
Google Scholar
Horridge, M., Knublauch, H., Rector, A., Stevens, R., Wroe, C.: A practical guide to building owl ontologies using the protégé-owl plugin and co-ode tools edition 1.0. University of Manchester (2004)
Google Scholar
Ma, M., Liu, L., Lin, Y., Pan, D., Wang, P.: Event description and detection in cyber-physical systems: an ontology-based language and approach. In: 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS), pp. 1–8. IEEE (2017)
Google Scholar
Miller, W.B.: Classifying and cataloging cyber-security incidents within cyber-physical systems (2014)
Google Scholar
Musen, M.A.: The protégé project: a look back and a look forward. AI Matters 1(4), 4–12 (2015)
CrossRef
Google Scholar
Ponemon, I.: Cost of a data breach 2019 report (2019)
Google Scholar
Syed, Z., Padia, A., Finin, T., Mathews, L., Joshi, A.: UCO: a unified cybersecurity ontology. In: Workshops at the 30th Conference on Artificial Intelligence (2016)
Google Scholar
Theocharidou, M., Giannopoulos, G.: Risk assessment methodologies for ci protection. part ii: A new approach. Technical report EUR27332 EN (2015)
Google Scholar
Trucco, P., Petrenj, B., Bouchon, S., Mauro, C.D.: Ontology-based approach to disruption scenario generation for critical infrastructure systems. Int. J. Crit. Infrastruct. 12(3), 248–272 (2016)
CrossRef
Google Scholar