D. Adrian et al 2015 Imperfect forward secrecy: How Diffie–Hellman fails in practice 22nd ACM Conference on Computer and Communications Security 5 17
S. FenzA. Ekelhart 2009 Formalizing information security knowledge. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security 183 194
W. M. Fitzgerald 2010 An ontology engineering approach to network access control configuration
B. Glimm et al 2014 HermiT: An OWL 2 Reasoner Journal of Automated Reasoning 53 3 245 269
P. Hitzler 2008 Semantic Web: Grundlagen Berlin, Germany Springer-Verlag
H. Holm et al 2015 P2CySeMoL: Predictive, Probabilistic Cyber Security Modeling Language IEEE Transactions on Dependable and Secure Computing 12 6 626 639
S. Jajodia et al 2011 Cauldron mission-centric cyber situational awareness with defense in depth Military Communications Conference 1339 1344
Y. Ji et al 2009 Aug A logic-based approach to network security risk assessment Computing, Communication, Control, and Management 2009 CCCM 2009. ISECS International Colloquium on 3 9 14
J. Jürjens 2002 UMLsec: Extending UML for Secure Systems Development Berlin, Germany Springer
A. Kim et al 2005 Security Ontology for Annotating Resources Springer
K. Knorr et al 2011 Automatisierung von Penetrationstest-Berichten mittels CWE DACH Security 2011
R. Lippmann et al 2006 Validating and Restoring Defense in Depth Using Attack Graphs IEEE Military Communications conference 1 10
T. Lodderstedt et al 2002 SecureUML: A UML-Based Modeling Language for Model-Driven Security Berlin, Germany Springer
G. F. Lyon 2008 Nmap Network Scanning - Official Nmap Project Guide to Network Discovery and Security Scanning Insecure.Com, LLC
R. A. Martin et al 2005 The case for common flaw enumeration NIST Workshop on Software Security Assurance Tools, Techniques, and Metrics
S. Noel et al 2009 Advances in topological vulnerability analysis. In: Conference For Homeland Security, 2009. CATCH ’09 Cybersecurity Applications & Technology 124 129
X. Ou et al 2005 MulVAL: A logic-based network security analyzer USENIX Security 8
E. Sirin et al 2007 Pellet: A practical OWL-DL reasoner Web Semantics:Science,Services and Agents on the World Wide Web 5 2 51 53
T. Sommestad et al 2013 The cyber security modeling language: A tool for assessing the vulnerability of enterprise system architectures IEEE Systems Journal 7 3 363 373
R. Zakeri et al 2006 Using description logics for network vulnerability analysis Fifth InternationalConference on Networking and the International Conference on Systems (ICN/ICONS/MCL,Mauritiu 78