• Wen S and Katt B. (2022). Ontology-Based Metrics Computation for System Security Assurance Evaluation. Journal of Applied Security Research. 10.1080/19361610.2022.2157190. 19:2. (230-275). Online publication date: 2-Apr-2024.

    https://www.tandfonline.com/doi/full/10.1080/19361610.2022.2157190

  • Wen S and Katt B. SAEOn: An Ontological Metamodel for Quantitative Security Assurance Evaluation. Computer Security. ESORICS 2022 International Workshops. (605-624).

    https://doi.org/10.1007/978-3-031-25460-4_35

  • Shukla A, Katt B, Nweke L, Yeng P and Weldehawaryat G. (2022). System security assurance. Computer Science Review. 45:C. Online publication date: 1-Aug-2022.

    https://doi.org/10.1016/j.cosrev.2022.100496

  • Bialas A. (2019). Common Criteria IT Security Evaluation Methodology – An Ontological Approach. Contemporary Complex Systems and Their Dependability. 10.1007/978-3-319-91446-6_3. (23-34).

    http://link.springer.com/10.1007/978-3-319-91446-6_3

  • Leberknight C. (2016). Perceived Threat Modeling for Cyber‐Physical Systems. Cyber‐Assurance for the Internet of Things. 10.1002/9781119193784.ch11. (257-281). Online publication date: 7-Nov-2016.

    https://onlinelibrary.wiley.com/doi/10.1002/9781119193784.ch11

  • (2016). Bibliography. Cyber‐Assurance for the Internet of Things. 10.1002/9781119193784.biblio. (433-455). Online publication date: 7-Nov-2016.

    https://onlinelibrary.wiley.com/doi/10.1002/9781119193784.biblio

  • Parreira P and Dellosso Penteado R. (2015). Domain ontologies in the context of Requirements Engineering 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA). 10.1109/AICCSA.2015.7507206. 978-1-5090-0478-2. (1-8).

    https://ieeexplore.ieee.org/document/7507206/

  • Białas A. (2013). Specification Means Definition for the Common Criteria Compliant Development Process – An Ontological Approach. Complex Systems and Dependability. 10.1007/978-3-642-30662-4_3. (37-53).

    https://link.springer.com/10.1007/978-3-642-30662-4_3

  • Bialas A. (2011). Common Criteria Related Security Design Patterns for Intelligent Sensors—Knowledge Engineering-Based Implementation. Sensors. 10.3390/s110808085. 11:8. (8085-8114).

    https://www.mdpi.com/1424-8220/11/8/8085

  • Bialas A. Ontology-Based Security Problem Definition and Solution for the Common Criteria Compliant Development Process. Proceedings of the 2009 Fourth International Conference on Dependability of Computer Systems. (3-10).

    https://doi.org/10.1109/DepCoS-RELCOMEX.2009.15

  • Białas A. (2009). Ontological Approach to the IT Security Development. Internet – Technical Development and Applications. 10.1007/978-3-642-05019-0_28. (261-269).

    http://link.springer.com/10.1007/978-3-642-05019-0_28

  • Franke K and Srihari S. Computational Forensics. Proceedings of the Third International Symposium on Information Assurance and Security. (383-386).

    https://doi.org/10.1109/IAS.2007.30