M. D. AimeF. Guasconi 2010 Enhanced Vulnerability Ontology for Information Risk Assessment and Dependability Management Third International Conference on Dependability (DEPEND) Venice, Italy 18-25 07 2010 92 97
M. Andriani et al 2014 Theoretical model of knowledge management in SMEs life cycle: (A literature study) 2nd International Conference on Technology, Informatics, Management, Engineering & Environment Bandung, Indonesia 19-21 08 2014 351 356
B. BarnettA. Crapo 2011 A Semantic Model for Cyber Security Grid-Interop Proceedings: Implementing Interoperability,Advancing Smart Grid Standards, Architecture and Community Phoenix, AZ, USA 05-08 12 2011
A. BazazJ. Arthur 2007 Towards a Taxonomy of Vulnerabilities 40th Annual Hawaii International Conference on System Sciences (HICSS) Waikoloa, Hawaii, USA Jan 2007
C. Blanco et al 2011 Basis for an integrated security ontology according to a systematic review of existing proposals Computer Standards & Interfaces 33 4 372 388
M. BouetM. Israel 2011 INSPIRE Ontology Handler: Automatically building and managing a knowledge base for Critical Information Infrastructure protection Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on Dublin, Ireland 23-27 05 2011 694 697
Bundesamt für Sicherheit in der Informationstechnik (BSI) 2013 ICS-Security-Kompendium
M. Choraś et al 2010aDecision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis Critical Information Infrastructures Security: Revised Papers of 4th International Workshop Bonn, Germany 30 09-02 10 2009 98 110
M. Choraś et al 2010bOntology Applied in Decision Support System for Critical Infrastructures Protection Trends in applied intelligent systems: 23rd International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, Proceedings part 1 Cordoba, Spain 01-06 2010 671 680
DIN ISO/IEC TR 27019 2015 Informationstechnik - Sicherheitsverfahren - Leitfaden für das Informationssicherheitsmanagement von Steuerungssystemen der Energieversorgung auf Grundlage der ISO/IEC 27002 (ISO/IEC TR 27019:2014) Berlin Beuth Verlag GmbH
M. Evans et al 2014 A Holistic View of the Knowledge Life Cycle: The KnowledgeManagementCycle (KMC) Model Electronic Journal of Knowledge Management 12 2 85 97
S. FenzA. Ekelhart 2009 Formalizing information security knowledge 4th International Symposium on Information, Computer, and Communications Security: Proceedings Sydney, NSW, Australia 10-12 03 2009 183 194
A. HerzogN. ShahmehriC. Duma 2007 An Ontology of Information Security International Journal of Information Security and Privacy 1 4 1 23
Homeland Security and CPNI 2010 Cyber Security Assessments of Industrial Control Systems: Good Practice Guide
R. Hosseingholizadeh 2014 Managing the knowledge lifecycle: A integrated knowledge management process model 4th International eConference on Computer and Knowledge Engineering (ICCKE) Mashhad, Iran 29-30 08 2014 102 110
ISA 62443-1-1 2015aSecurity for Industrial Automation and Control Systems - Models and Concepts. Draft 5, Edit 5
ISA-62443-2-1 2015bSecurity for industrial automation and control systems - Part 2-1: Industrial automation and control system security management system. Draft 7, Edit 5
ISA-62443-3-2 2015cIndustrial communication networks - Network and system security - Part 32: Security risk assessment and system design. Draft 6, Edit 3
ISO/IEC 27001 2013 Information technology -Security techniques - Information security management systems - Requirements Second
J. JarmakiewiczK. MaslankaK. Parobczak 2015 Development of cyber security testbed for critical infrastructure International Conference on Military Communications and Information Systems (ICMCIS) Cracow, Poland 18-19 05 2015 1 10
F. Koster et al 2009 Collaboration in security assessments for critical infrastructures Fourth International Conference on Critical Infrastructures (CRIS) Linköping, Sweden 28-30 April 2009 1 7
R. D. Larkin et al 2014 Evaluation of security solutions in the SCADA environment SIGMIS Database 45 1 38 53
L. Lemaire et al 2014 A SysML Extension for Security Analysis of Industrial Control Systems 2nd International Symposium for ICS & SCADA Cyber Security Research 2014: Proceedings St. Pölten, Austria 11-12 Sep 2014
L. Lemaire et al 2015 Extracting Vulnerabilities in Industrial Control Systems using a Knowledge-Based System 3rd International Symposium for ICS & SCADA Cyber Security Research: Proceedings Ingolstadt, Deutschland 17z-18 Sep 2015
A. Miede et al 2010 A Generic Metamodel for IT Security Attack Modeling for Distributed Systems 10th International Conference on Availability, Reliability, and Security Krakau, Poland 15-18 02 2010 430 437
NE 153 2015 Automation Security 2020 - Design, Implementierung und Betrieb industrieller Automatisierungssysteme
Van Nguyen 2011 Ontologies and Information Systems: A Literature Survey, DSTO-TN-1002 Edinburgh, South Australia 5111, Australia
NIST Computer Security Division (CSD) 2013 NIST SP 800-53 Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations National Institute of Standards and Technology
R. Oates et al 2013 Practical Extensions of Safety Critical Engineering Processes for Securing Industrial Control Systems 8th IET International System Safety Conference incorporating the Cyber Security Conference 2013 Cardiff, UK 16-17 10 2013 2
L. Obrst et al 2012 Developing an Ontology of the Cyber Security Domain Proceedings of the Seventh International Conference on Semantic Technologies for Intelligence, Defense, and Security Fairfax, VA USA 23-26 10 2012
Leo Obrst 2006 The Ontology Spectrum Semantic Models 12. Januar. MITRE Corporation - Information Semantics Group http://ontolog.cim3.net/file/resource/presentation/ LeoObrst_20060112/OntologySpectrumSemanti cModels-LeoObrst_20060112.ppt 21 April 2016
I. Oleg et al 2013 Cyber security lifecycle and assessment technique for FPGA-based I&C systems 11th East-West Design and Test Symposium Rostov-on-Don, Russia 27-30 09 2013 1 5
A. Pease et al 2002 The Suggested Upper Merged Ontology: A Large Ontology for the Semantic Web and its Applications Proceedings of the Eighteenth National Conference on Artificial Intelligence Edmonton, Alberta, USA 28 07-01 08 2002
J. Schneider et al 2015 Cyber Security Maintenance for SCADA Systems Proceedings of the 3rd International Symposium for ICS & SCADA Cyber Security Research Ingolstadt, Germany 17-18 09 2015
B. Shepard et al 2005 A knowledge-based approach to network security: applying Cyc in the domain of network risk assessment Proceedings of the Seventeenth Conference on innovative applications of Artificial Intelligence Edmonton, Alberta, USA 09-13 07 2005 1563 1568
V. SinghS. K. Pandey 2014 Revisiting Security Ontologies IJCSI International Journal of Computer Science Issues 11 6 150 159
A. SinghalD. Wijesekera 2010 Ontologies for modeling enterprise level security metrics Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research Oak Ridge, Tennessee, USA 21-23 04 2010
K. Solic et al 2015 The information systems’ security level assessment model based on an ontology and evidential reasoning approach Computers & Security 55 100 112
A. Souag et al 2015 A Security Ontology for Security Requirements Elicitation Engineering Secure Software and Systems: Proceedings of 7th International Symposium Milan Italy 04-06 03 2015 157 177
K. Stouffer et al 2015 Guide to Industrial Control Systems (ICS) Security: Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC) 800 82 2 National Institute of Standards and Technology
B. TsoumasD. Gritzalis 2006 Towards an Ontology-based Security Management 20th International Conference on Advanced Information Networking and Applications -Volume 1 (AINA’06) Vienna, Austria 18-20 2006 985 992
VDI/VDE 2182 Blatt 1 2011 Informationssicherheit in der industriellen Automatisierung - Allgemeines Vorgehensmodell. Edit 3 Berlin Beuth Verlag GmbH