<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">An Automated Method for the Ontological Representation of Security Directives</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Giampaolo</forename><surname>Bella</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Mathematics and Computer Science</orgName>
								<orgName type="institution">University of Catania</orgName>
								<address>
									<addrLine>Viale Andrea Doria 6</addrLine>
									<postCode>95125</postCode>
									<settlement>Catania</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Gianpietro</forename><surname>Castiglione</surname></persName>
							<email>gianpietro.castiglione@phd.unict.it</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Mathematics and Computer Science</orgName>
								<orgName type="institution">University of Catania</orgName>
								<address>
									<addrLine>Viale Andrea Doria 6</addrLine>
									<postCode>95125</postCode>
									<settlement>Catania</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Daniele</forename><forename type="middle">Francesco</forename><surname>Santamaria</surname></persName>
							<email>daniele.santamaria@unict.it</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Mathematics and Computer Science</orgName>
								<orgName type="institution">University of Catania</orgName>
								<address>
									<addrLine>Viale Andrea Doria 6</addrLine>
									<postCode>95125</postCode>
									<settlement>Catania</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<address>
									<addrLine>(G. Bella), (G. Castiglione</addrLine>
									<postBox>D. F. Santamaria)</postBox>
									<postCode>0000-0002-7615-8643, 0000-0003-2215-0416, 0000-0002-4273-6521D. F</postCode>
									<settlement>Santamaria</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">An Automated Method for the Ontological Representation of Security Directives</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">E41EF491C4F92620BD435C5E62054234</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:25+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>NLP</term>
					<term>POS tagging</term>
					<term>NIS 2</term>
					<term>Semantic reasoning</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Large documents written in juridical language are difficult to interpret, with long sentences leading to intricate and intertwined relations between the nouns. The present paper frames this problem in the context of recent European security directives. The complexity of their language is here thwarted by automating the extraction of the relevant information, namely of the parts of speech from each clause, through a specific tailoring of Natural Language Processing (NLP) techniques. These contribute, in combination with ontology development principles, to the design of our automated method for the representation of security directives as ontologies. The method is showcased on a practical problem, namely to derive an ontology representing the NIS 2 directive, which is the peak of cybersecurity prescripts at the European level. Although the NLP techniques adopted showed some limitations and had to be complemented by manual analysis, the overall results provide valid support for directive compliance in general and for ontology development in particular.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The promulgation of security directives is a new and increasingly used approach to addressing security issues on a large scale. As the capillarity of security risks rises, so does the complexity of the security directives. In consequence, both the interpretation and the compliance check of each of the defined measures are highly prone to inconsistencies. This forms the motivation for the work presented in this paper, which illustrates a method to treat, and ultimately apply security directives by making them more widely accessible with respect to the legal context from which they originate. Our method innovatively combines techniques and tools from two known branches of Informatics: natural language processing (NLP) and ontology development.</p><p>To introduce the basics of both constituent branches, we assert the main definitions. NLP is a technique for making the human natural language more and more understandable for machines, hence for automatic processing. NLP is widely used in the general context of Artificial Intelligence, and it can leverage machine learning algorithms to attain better performance. Then, "An ontology is an explicit specification of a conceptualisation" <ref type="bibr" target="#b0">[1]</ref>, hence an ontology allows us to model a domain through the definitions of its entities and axioms involving them. In particular, entities include classes (categories), individuals (instances of classes) and properties (relations among individuals). Ontologies inherit the logical reasoning capabilities from description logic (DL), a family of formal and decidable formalism tailored towards representing terminological knowledge of a domain in a structured and well-understood way. An advantage of ontologies is that they offer mathematically sound support that can be useful for the compliance verification phase. We apply our method to the NIS 2 Directive (Directive (EU) 2022/2555) <ref type="bibr" target="#b1">[2]</ref>, which was promulgated by European Commission on 16 January 2023 and can be considered the main European framework for cybersecurity. It aims to achieve a high common level of security across the EU.</p><p>Our method promotes ontology engineering and development towards the precise representation of the Directive in support of automated compliance checking. Meanwhile, it employs specific NLP techniques for the grammatical tagging of the Parts Of Speech (POS) to automate the extraction of the relevant information from the Directive to be represented within the ontology. More precisely, by following the established Methontology methodology <ref type="bibr" target="#b2">[3]</ref>, the ontology is developed as a Python program leveraging the RDFLib library <ref type="bibr" target="#b3">[4]</ref> for what concerns the manipulation of ontological artefacts; the NLP part is developed by using ClausIE <ref type="bibr" target="#b4">[5]</ref>, a sub-library of Spacy <ref type="bibr">[6]</ref>. Our NIS 2 ontology is the main result of this paper, besides the general method used to produce it. Notably, the NLP techniques that we used worked generally well but were put at stake by the lengthy style of the Directive. Therefore, we also conducted a manual clause analysis next to the NLP one, indicating the limitations of the latter. The experiments shown in this paper are online available <ref type="bibr">[7]</ref>.</p><p>An overview of related work is illustrated below (Section 2), while the description of our method is illustrated in Section 3 and its application to the NIS 2 as a relevant case study in Section 4. The evaluation of the method is illustrated in Section 5 and the Conclusions are finally drawn (Section 6).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related work</head><p>For the representation of legal documents through ontologies, the works that have been produced are not many. In a similar context to the NIS 2 Directive, some work has been done on GDPR; in particular, Sawasaki T. et al. <ref type="bibr" target="#b5">[8]</ref> leverage not ontological reasoning for resolving legal disputes on personal data transferring between different jurisdictions, in this case between Europe and Japan, while Pandit et al. <ref type="bibr" target="#b6">[9]</ref> propose GDPR as a linked data resource, leveraging pre-existing vocabularies for concepts linking.</p><p>A remarkable software product developed for leveraging NLP for compliance verification is the CyberStrong platform <ref type="bibr" target="#b7">[10]</ref>. However, it does not adopt ontological reasoning, and it is difficult to view how it works since it is a commercial product. The integration of ontologies and NLP has been considered in a few works. In some contexts, ontologies have been used for supporting NLP in the phases of information retrieval <ref type="bibr" target="#b8">[11]</ref>  <ref type="bibr" target="#b9">[12]</ref>.</p><p>The closest work to ours was published by Zhang J. et al. <ref type="bibr" target="#b10">[13]</ref>. The use case proposed is emblematic since the integration of ontologies and NLP is used for compliance verification purposes. However, the information extraction is not applied in a security context, and also in this case, the ontologies are considered as a support for NLP and not for representation of juridical language, as in our case.</p><p>TextRazor is a commercial tool with an online interface and also API access offering valid support for POS tagging <ref type="bibr" target="#b11">[14]</ref>. It is clear that its structured, intensive use requires the purchase of an API key, which future researchers would have to fetch for their own usage. Because we aim at providing a freely accessible tool to automate the tasks of anyone who pursues the ontological representation of security directives, it means that we must appeal to existing open-source products and develop them as necessary.</p><p>Among the open source products that can be leveraged for POS tagging comes CoreNLP, a toolkit developed at Stanford <ref type="bibr" target="#b12">[15]</ref> that appears to be valid for POS tagging, hence worth evaluating for our purposes in the future. While CoreNLP requires the setup of a server to route requests to the Spacy library can be easily leveraged by a calling program, and works well to name the leading entities in a statement, its clauses and its parts of speech <ref type="bibr">[6]</ref>. We see below that this library is chosen as a basis for our developments.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Automated method to represent directives as ontologies</head><p>This Section is the core of the present work and describes our method to source information from a given security directive and leverage it, through precise modelling decisions, to build an ontology in an automated fashion. Notably, the method takes advantage of the use of specific NLP techniques for POS tagging and then sets out to adapt the various steps for building an ontology on our particular application, as well as to develop the corresponding software. Therefore, we initially have to establish what methodology of ontological representation to adopt and use as a consolidated basis for our developments.</p><p>At an abstract level, we take a waterfall approach, which prescribes a sequence of steps such as specification, through implementation and up to evaluation, as with any software. A more specific incarnation of the waterfall approach is the Methontology methodology <ref type="bibr" target="#b2">[3]</ref> of ontological development, which consists of precise steps: 1) Specification, 2) Knowledge Acquisition, 3) Conceptualisation, 4) Integration, 5) Implementation, 6) Evaluation, and 7) Documentation. Our method leverages Methontology and, in particular, step 3 can be expected to be crucial for our purposes, for example, to fit the NLP part with the rest of the developments and produce an ontology in the end. By contrast, we shall see that the other steps need to be tailored towards the representation of a security directive. The following subsections illustrate the various steps of our method.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Designing a modular ontological pattern for security directives</head><p>This step is inspired by step 1 of Methontology. Because cybersecurity is increasingly challenging worldwide, more and more legislation about it is appearing. Therefore, virtually every organisation is facing the problem of interpreting that legislation before a compliance process can be initiated.</p><p>A specific category of European legislation is represented by security directives. In particular, we want to design a modular structure of the security directives, in which, assuming they are divided into articles, every Article can be represented as a class as depicted in Fig. <ref type="figure" target="#fig_0">1</ref>, where a node of the diagram represents a class and an edge stands for a class axiom. The core idea is to leverage ontological reasoning to check that an entity follows the measures created specifically for it, and for that, the exact relations between modules must be established. The compliance check will be carried out by one of the possible entities named in the security directives, here conceptualised as EntityX. In fact, the term entity has two meanings: an ontological entity and the entity defined within the context of a security directive. Every EntityX, for example, a NIS 2 Member State or a GDPR Data Protection Officer (DPO), will be associated with a specific sub-article class, namely Article-Y-EntityX-Compliant, which describes the specific measures Article-Y refers to EntityX. For example, Article 10 of NIS 2 Directive involves entities Member State and CSIRT (Computer Security Incident Response Team), and consequently, we will have entity Article-10 with subclasses Article-10-MemberState-Compliant and Article-10-CSIRT-Compliant classes, each in turn with their respective related classes.</p><p>The specification of measures is represented by module Article-Y-EntityX-Measures, connected to Article-Y-EntityX-Compliant with the EquivalentTo property so that there is direct equivalence between an article and the measures defined therein. It represents the measures through the combination of ontological entities, individuals, classes and properties; in particular, we want to design the measures of each Article as a logical conjunction of exactly each action to be done by EntityX. If the relation is EquivalentTo, by the transitive property we obtain that EntityX is equivalent to Article-Y-EntityX-Measures. The meaning of this association brings its benefits in a possible reasoning phase. For example, let us model an individual (namely a specific instance of a class) EntityX-test of class Entity-X for the sake of verifying compliance with Article-Y. Then, only if EntityX-test owns all the properties related to the specific Article-Y, can the reasoning infer that EntityX-test equals EntityX. This in turn means that EntityX-test is compliant with Article-Y. The term compliant is specifically chosen for this phase, in fact, if the individual possesses all the measures, then the inference "EntityX-test inferred Article-Y-EntityX-Compliant" will be produced.</p><p>By adopting this type of design, we can represent the security directives with small and separated modules, and this facilitates the management of the ontology and of the directives themselves. The separation between entities and their respective measures aims at a loose coupling in support of readiness for modifications if any errors are found or modifications become necessary. The details of how each measure will be represented will be discussed later.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Extraction and tagging of parts of speech from security measures</head><p>Once the modular ontological pattern is available, we continue to the knowledge acquisition step, which is inspired by step 2 of Methontology but is here tailored to the parts of speech.</p><p>POS tagging involves, in particular, the extraction of essential parts of speech such as subject, predicate and object. By framing these in the context of security directives, we have that the subject is the NIS 2 entity to which a measure is referred, the predicate is the action the entity must perform, and the object is the entity or composition of nouns upon which the action is directed.</p><p>There are two main approaches to the automatic extraction of parts of speech, namely to entirely rely on some full-fledged software as an oracle or to resort to dedicated coding where fine-tuning is arguably possible. As discussed above ( §2), we pursue the open source philosophy, hence we take the second approach and, in particular, leverage Spacy to develop a parser that takes the given security directive as input and outputs the POS tagging based on the sub-class ClaucIE <ref type="bibr" target="#b4">[5]</ref> of Spacy. The present step prescribes, in turn, the following ones.</p><p>Preprocessing Juridical language may take various complicated structures. A recurrent structure sees a sentence with various, alternative objects (or objective clauses). The various objects are itemised, while the subject and verb are omitted to limit redundancy. One of the preprocessing routines is to introduce that redundancy, namely to build the full sentence for each object in order to facilitate the next steps. Other preprocessing routines are minor and omitted here.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Identification of sentences</head><p>We analyse each sentence that grammatically ends with a full stop, also taking advantage of the preprocessing just discussed. This choice fits perfectly with our goal of extracting the parts of speech, as we shall see in the next sub-step.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Grammatical tagging of each sentence</head><p>Each extracted sentence is subsequently subjected to functions for the tagging of the relevant parts of speech. One of the biggest complicating factors can be anticipated to be the high complexity of some sentences of the security directive given by input. Sometimes, sentences may span over many lines and may adopt a somewhat intricate language. Therefore, we appeal to the specific features of the Spacy library that turn out useful at this particular point, and we leverage ClausIE, the sub-library of Spacy oriented at the identification of clauses. The advantage of using ClausIE instead of Spacy is that dividing the single sentence into several clauses can be expected to raise the probability of obtaining the correct and wanted results in terms of tagging.</p><p>By applying the functions of ClausIE, each sentence is parsed and the identified pattern is generated. The pattern is a combination of the main POS, namely Subject (S), Verb (V), Object (O), Complement (C) and Adverb (A). Two more considerations need to be made here. One is that POS Verb refers to what we introduced as the predicate, the other one is that we consider POS Object and Complement with the same role. However, our experiments demonstrate that not all clauses can be automatically extracted, particularly when a number of clauses are listed, each depending on a previous one. In such cases, which we shall evaluate below on practical demonstration of our method, the object complement of a sentence is the entire part of the sentence following the main verb.</p><p>Tabulation The patterns of tags produced provide us with the information we need for the next steps. For this reason, we now take care of storing them in tables for possible statistical analyses to be conducted later or simply to support the subsequent development of the target ontology.</p><p>However, it cannot be assumed that our tool succeeds in finding all parts of speech in all cases, namely it might be the case that its output is either incomplete or entirely wrong. In such cases, we as analysts shall be prepared to step in and perform manual tagging. In particular, we also did manual tagging of all relevant articles of the NIS 2, as we shall see in the next Section while our method is demonstrated.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Mapping of grammatical tags onto modular ontological patterns</head><p>The information collected with tables in the previous step of our method supports the present step. Inspired by step 3 of Methontology, here we instantiate the patterns defined in the first step by means of the extracted parts of speech. This conceptualisation of the domain is fundamental to consistently executing the next phase, where the target ontology is implemented. Therefore, this step offers the first conceptual representation of the input directive and assumes a concrete meaning in the application of the method.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4.">Implementation of an automated ontology builder</head><p>This implementation step, inspired by step 5 of Methontology, consists of automating the ontology-building process for the specific parts of the security directive identified by means of POS tagging. The implementation of the ontology is divided into a manual phase and an automatic phase. The first consists of manually defining with Protégé <ref type="bibr" target="#b13">[16]</ref> some entities that cannot be automatically extracted, but this lies outside the focus of the present paper.</p><p>The automatic phase leverages the code we developed for the automated representation with the support of the RDFLibrary <ref type="bibr" target="#b3">[4]</ref>. Our code contains three main modules: module i to parse the document taking the exact articles and sentences, module ii to apply NLP calls to each extracted part and store the results, and module iii to take the stored results and give them an ontological representation. ) 31 32 g . add ( ( m a i n C l a s s , OWL. ←˒ e q u i v a l e n t C l a s s , c ) ) 33 g . add ( ( m a i n C l a s s , RDF . type , ←˒ OWL. C l a s s ) ) 34 35 g . add ( ( s u b j e c t , OWL. ←˒ e q u i v a l e n t C l a s s , m a i n C l a s s ) ←˒ )</p><p>Code 1-Extract of python code for the automated creation of the measures of the Directive on ontology For example, an extract from module iii is shown in Code 1. The code exemplifies the general case of an Article, treating only two measures of it. No imports of the library are shown to lighten the illustration. The imports used are submodules of the RDFLib library. The main function defined on line 1 has input subj as EntityX of the modular pattern, and then has pred1, obj1, pred2, obj2 as the extracted POS for the representation of the measures. Each of them is associated with a specific ontological entity through a reference via URI (lines from 12 to 16). However, the graph representing the ontology and the namespace must be created first (lines 3 and 4).</p><p>As we want each measure to be considered essential for compliance checking, we defined them as ontological restrictions (lines 18 to 20, and from 22 to 24), which are assigned to the ontological nodes a and b, defined in lines 6 and 7. Each restriction involves a specific predicate (or verb, here representing a relation) and object. The relation is represented by an ontological property. The creation of the restriction will output the result «predicate» some «object» where some is an ontological keyword necessary for defining an existential restriction, namely classes of individuals who participate in at least one relationship along a specified property. Once the restrictions have been defined, it is necessary to connect them together in order to obtain their logical conjunction. An exemplification of this would result in («predicate1» some «object1») and («predicate2» some «object2») and ..</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>. and («predicateN» some «objectN»).</head><p>The logical conjunction implements a correct compliance check, namely only if all the restrictions are simultaneously respected, then there will be compliance with the relevant article. We connect the restrictions with the constructor Collection and we associate the collection to the node c (defined in line 8) through OWL.intersectionOf (lines from 26 to 30). The last step consists of associating the now ontological measures within the subject. In lines 32 and 33, we associate the measures (contained in c) to the correct article (mainClass, which is defined in line 10), and second, we create a specific class for it. The Article (mainClass) is, in the end, associated with the subject, in order to link the measures that it contains to the specific entity to which they are addressed (line 35).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Demonstration of our method on the NIS 2 directive</head><p>This Section demonstrates our automated method to represent directives as ontologies in the particular case of the latest European directive on cybersecurity, the NIS.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Designing a modular ontological pattern for security directives</head><p>Following the general guidelines given above through the description of our method, this step prescribes the definition of the modular ontological pattern for the NIS 2. For example, Fig. <ref type="figure" target="#fig_3">3</ref>, presents the pattern for an extract of Article 10. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Extraction of fundamental entities and relations from security measures</head><p>The parts of the Directive subject to acquisition are only those in which the specific measures are defined for regulatory bodies to follow and, in particular, articles from 7 to 37. The remaining articles are not relevant to our purposes because they pertain to premises, definitions and abbreviations, hence do not describe specific compliance actions or activities for the various entities to conduct.</p><p>Let us take here the following extracts, respectively from Article 8 and 14 of the Directive, as examples:</p><p>5. Member States shall ensure that their competent authorities and single points of contact have adequate resources to carry out, in an effective and efficient manner, the tasks assigned to them and thereby fulfil the objectives of this Directive. them and t h e r e b y f u l f i l t h e o b j e c t i v e s o f t h i s D i r e c t i v e , t h a t ←˒ t h e i r c o m p e t e n t a u t h o r i t i e s and s i n g l e p o i n t s o f c o n t a c t have←˒ a d e q u a t e r e s o u r c e s t o c a r r y out , in an e f f e c t i v e and ←˒ e f f i c i e n t manner , , [ ] &gt; , &lt;SVO , t h e i r c o m p e t e n t a u t h o r i t i e s and ←˒ s i n g l e p o i n t s o f c o n t a c t , have , None , a d e q u a t e r e s o u r c e s t o ←˒ c a r r y out , None , [ in an e f f e c t i v e and e f f i c i e n t manner ] &gt; ] Code 3: Extract of application of ClausIE to Article 14 1 [ &lt;SV , The European E x t e r n a l A c t i o n S e r v i c e , s h a l l p a r t i c i p a t e , ←˒ None , None , None , [ in t h e a c t i v i t i e s o f t h e C o o p e r a t i o n Group , ←˒ a s an o b s e r v e r ] &gt; ] C l a u s e s [ ' The European E x t e r n a l A c t i o n ←˒ S e r v i c e s h a l l p a r t i c i p a t e in t h e a c t i v i t i e s o f t h e ←˒ C o o p e r a t i o n Group a s an o b s e r v e r ' , ' The European E x t e r n a l ←˒ A c t i o n S e r v i c e s h a l l p a r t i c i p a t e i n t h e a c t i v i t i e s o f t h e ←˒ C o o p e r a t i o n Group ' , ' The European E x t e r n a l A c t i o n S e r v i c e ←˒ s h a l l p a r t i c i p a t e a s an o b s e r v e r ' ]</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">The Cooperation</head><p>The optimal case would be to obtain a pattern that has extracted all relevant POS, namely at least SVOC. However, the complexity of sentences can be problematic in general for the Spacy library, and our parser may either output a partial set of POS or suggest more than one possible tagging for the same clause. In such cases, we obviously have to intervene and finalise the tagging manually For example, analysing code extracts 2 and 3, it is clear that the first pattern is SVOC, is correct and can be considered complete, while the second is correct but not complete because our tool was unable to identify the object. In this case, the POS will still be collected, as the ontology must cover the entirety of articles 7-37 of the Directive, but we must review all POS and extract the missing ones manually.</p><p>Iterating the previous step to all the selected parts of the Directive, a classification of all ontological-related information is then collected in tables. The information we collected suggests how much we are able to fully automate the creation of an ontology. For each article, we build a table to represent the information that was extracted. For each sentence number in the article, we take note of subject, verb and object. For each of these three POS, we have two versions, namely the correct one that we identified manually and the version derived through our parser, which we prefix with an "I". For example, the subject that was identified manually is headed as "Sub" and the version that was identified automatically is headed as "I-Sub". Moreover, there is a third column, identified by the suffix "HIT" for each tag to identify whether the tool worked well or not. All symbols are explained Table <ref type="table">1</ref>. More precisely, the tick can identify a correct, wrong or incomplete extraction -we consider the incomplete extraction as correct.Conversely, a cross symbol means that we found the automatic tagging to be wrong. The same considerations are valid for verb and object. Additionally, the objects are collected in the tables reachable via the references in Appendix. The conceptualisation ends by defining the measure, composed by the verb designate and the object referred in N8.5 or S8.5, depending on the correctness of the NLP response. The concrete meaning is the following: in order that a Member State to be compliant with Article8, it must designate N8.5. Obviously, the meaning is the same as in the Directive but we built it starting from the POS that was extracted, which are now mapped on the modular ontological patterns.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4.">Implementation of an automated ontology builder</head><p>By executing the code illustrated above in the definition of the method, we get, in general for Article 8, the following extract of the target ontology, presented in Turtle format. The depicted ontology extract reflects the considerations made within the description of the code.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Overall evaluation of the method</head><p>Building an ontology for NIS 2 fully relying on automation was far from simple. Several challenges were encountered.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Full and correct interpretation of sentences</head><p>Strictly following the extraction of sentences via NLP calls and associating the related part of speech to subject, predicate, and object ontological pattern, some information could be lost. The biggest portion of a sentence is transformed into an object with a low possibility of interpreting its content. For example, see the following purposely made-up sentence: Each Member State shall notify its incidents within 3 months. We correctly get that its incidents within 3 months is the object of the sentence but we have no possibility to further extract additional information, for example, 3 months as an ontological data Property, indeed limiting the power ontological representation. Even if it were possible, it would be too complex to define a general strategy that includes all possible similar cases.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Full and coherent representation of parts of speech</head><p>As a design decision, we assumed to rebuild (to ontological language) the articles of the Directive through different and separated modules, each one related to one entity. One problem that may arise if automating is the difficulty to associate EntityX with the correct associated measures. Recalling the code 1, such a problem arises when composing measures from different articles, a task that requires modifying the pre-existent collection of restrictions.</p><p>A similar issue regards the objects since it is difficult to establish a criterion for the name of the entity representing the object itself since it may be composed of many words.</p><p>Another problem may arise when the predicate of a sentence is a passive one. In such cases, the object is almost always undetected, and the transformation to the active form is needed. Attempts at transformations are still complex due to the limitations of NLP.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Hierarchical issues</head><p>The automation surely leads to a "flat hierarchy" problem. The extraction of entities and relations lacks critical observation that can be useful for defining a hierarchy among them. In two different contexts that could happen: a) for simple entities; b) for the complex entities that resume with a single word the meaning of an entire object.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Writing of ontological axioms</head><p>The only axioms we can define are the ones representing each measure we are translating. This happens on a case-by-case basis while parsing the document we are facing. It is not possible to add more axioms since we don't know how any of each identified part of speech behaves in the document, not allowing us to make more specific considerations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>The combination of ontologies and NLP aimed at the representation and automation of the reading of security directives turned out to be challenging but, arguably, successful.</p><p>The overall task became more manageable by following our method of ontological construction, which required our effort in the first place. Such a method is, in fact, a general contribution of the present paper. It took inspiration from Methontology but rearranged and refocused its steps. In particular, while we deemed the Integration step unnecessary for our purposes because there is no existing vocabulary that can be linked with NIS 2 entities, we expect to complete our method with appropriate instantiations of the Evaluation and Documentation steps in the future, after fully covering the ontology.</p><p>If we consider the present work as the first stage of the application of the proposed method, it is clear that some limitations are there. Our experiments confirm that modern, forefront NLP techniques struggle with the complex juridical language and nested structuring of the directive <ref type="bibr" target="#b14">[17]</ref>. The main reason appears to be the number of clauses that are used per sentence and depend on each other, as well as the length of each clause. Future work will focus on perfecting automation, completing the target ontology, and its companion documentation. We also plan to integrate the ontology with the OASIS ontology <ref type="bibr" target="#b15">[18,</ref><ref type="bibr" target="#b16">19,</ref><ref type="bibr" target="#b17">20,</ref><ref type="bibr" target="#b18">21]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Overview of the main classes for the security directives</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 ∀Figure 2 :</head><label>22</label><figDesc>Figure 2: Representation of articles</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>1</head><label></label><figDesc>def c r e a t e _ o n t o l o g y ( s u b j , ←˒ pred1 , o b j 1 , pred2 , o b j 2 ) : 2 3 g = Graph ( ) 4 ex = Namespace ( " h t t p : / / n a s . ←˒ o n C l a s s = U R I R e f ( " h t t p : / / n a s ←˒ . o n t o / A r t i c l e −X− C o m p l i a n t " ) s u b j e c t = U R I R e f ( " h t t p : / / n a s . ←˒ o n t o / " + s u b j ) r e l a t i o n 1 = U R I R e f ( " h t t p : / / n a s ←˒ . o n t o / " + p r e d 1 ) o b j e c t 1 = U R I R e f ( " h t t p : / / n a s . ←˒ o n t o / " + o b j 1 ) r e l a t i o n 2 = U R I R e f ( " h t t p : / / n a s ←˒ . o n t o / " + p r e d 2 ) o b j e c t 2 = U R I R e f ( " h t t p : / / n a s . ←˒ o n t o / " + o b j 2 ) g . add ( ( a , RDF . type , OWL. ←˒ R e s t r i c t i o n ) ) g . add ( ( a , OWL. o n P r o p e r t y , ←˒ r e l a t i o n 1 ) ) 20 g . add ( ( a , OWL. someValuesFrom , ←˒ o b j e c t 1 ) ) 21 22 g . add ( ( b , RDF . type , OWL. ←˒ R e s t r i c t i o n ) ) 23 g . add ( ( b , OWL. o n P r o p e r t y , ex . ←˒ r e l a t i o n 2 ) ) 24 g . add ( ( b , OWL. someValuesFrom , ←˒ ex . o b j e c t 2 ) ) 25 26 c o l l = BNode ( ) 27 C o l l e c t i o n ( g , c o l l , [ a , b ] ) 28 29 g . add ( ( c , OWL. i n t e r s e c t i o n O f , ←˒ c o l l ) ) 30 g . add ( ( c , RDF . type , OWL. C l a s s ) ←˒</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Pattern applied to an extract of Article 10</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Code 2 :</head><label>2</label><figDesc>Group shall be composed of representatives of Member States, the Commission and ENISA. The European External Action Service shall participate in the activities of the Cooperation Group as an observer. The European Supervisory Authorities (ESAs) and the competent authorities under Regulation (EU) 2022/2554 may participate in the activities of the Cooperation Group in accordance with Article 47(1) of that Regulation Preprocessing is empty in this case. For what concerns the identification of sentences, we get respectively 1 and 3 sentences from the two extracts. Then, we run our parser and obtain the following structured extracts: Extract of application of ClausIE to Article 8 1 [ &lt;SVOC , Member S t a t e s , s h a l l e n s u r e , None , t h e t a s k s a s s i g n e d t o ←˒</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>table 4 .3. Mapping of grammatical tags onto modular ontological patterns</head><label>4</label><figDesc>Following coherently what is output from the second step, we are now able to instantiate a concrete representation of the modules by leveraging the pattern depicted in the first step. What we created, in fact, is a Data Dictionary, where the essential entities for the ontological representation are collected. Taking the first row of Table2, we get the following associations: Member State (even if the subject is plural, we always take the singular, as in ontological terms it represents the single entity) as EntityX; Article8 as ArticleY; Article-8-MemberState-Compliant as Article-Y-EntityX-Compliant.</figDesc><table><row><cell></cell><cell></cell><cell>Name</cell><cell></cell><cell></cell><cell>Acronym</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell cols="2">Member State</cell><cell></cell><cell>MS</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="5">National Cybsersecurity Strategy</cell><cell>NCS</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell cols="3">Competent Authority</cell><cell></cell><cell>CA</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell cols="2">Commission</cell><cell></cell><cell>Co</cell><cell cols="2">Symbol</cell><cell cols="2">Acronym</cell></row><row><cell></cell><cell></cell><cell cols="2">Point of Contact</cell><cell></cell><cell>POC</cell><cell>✔</cell><cell></cell><cell cols="2">Correct answer</cell></row><row><cell></cell><cell></cell><cell>CSIRT</cell><cell></cell><cell></cell><cell>C</cell><cell>✘</cell><cell></cell><cell cols="2">Wrong answer</cell></row><row><cell></cell><cell></cell><cell>ENISA</cell><cell></cell><cell></cell><cell>E</cell><cell>❙</cell><cell cols="3">Correct but incomplete answer</cell></row><row><cell></cell><cell cols="3">Cooperation Group</cell><cell></cell><cell>CG</cell><cell>P</cell><cell></cell><cell cols="2">Passive Verb</cell></row><row><cell cols="5">The European External Action Service</cell><cell>EEAS</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="5">European Supervisory Authorities</cell><cell>ESA</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell>CN</cell><cell></cell><cell cols="2">CSIRTs Network</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell></cell><cell cols="2">Eu-Cyclone</cell><cell></cell><cell>EuC</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Table 1</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>Legend</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>N.</cell><cell cols="3">Sub I-Sub Sub-HIT</cell><cell>Verb</cell><cell>I-Verb</cell><cell>Verb-HIT</cell><cell>Obj</cell><cell cols="2">I-Obj Obj-HIT</cell></row><row><cell>1</cell><cell>MS</cell><cell>MS</cell><cell>✔</cell><cell cols="2">designate designate</cell><cell>✔</cell><cell>N8.1</cell><cell>S8.1</cell><cell>❙</cell></row><row><cell>2</cell><cell>CA</cell><cell>CA</cell><cell>✔</cell><cell>monitor</cell><cell>referred</cell><cell>✘</cell><cell>N8.2</cell><cell>S8.2</cell><cell>❙</cell></row><row><cell>3.1</cell><cell>MS</cell><cell>MS</cell><cell>✔</cell><cell cols="2">designate designate</cell><cell>✔</cell><cell cols="2">N8.3.1 S8.3.1</cell><cell>❙</cell></row><row><cell>3.2</cell><cell>CA</cell><cell>CA</cell><cell>✔</cell><cell>be</cell><cell>be</cell><cell>✔</cell><cell cols="2">N8.3.2 S8.3.2</cell><cell>✘</cell></row><row><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell></row><row><cell>5</cell><cell>MS</cell><cell>MS</cell><cell>✔</cell><cell>ensure</cell><cell>ensure</cell><cell>✔</cell><cell>N8.5</cell><cell>S8.5</cell><cell>✔</cell></row><row><cell>6.1</cell><cell>MS</cell><cell>MS</cell><cell>✔</cell><cell>notify</cell><cell>notify</cell><cell>✔</cell><cell cols="2">N8.6.1 S8.6.1</cell><cell>❙</cell></row><row><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell><cell>. . .</cell></row><row><cell>Table 2</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="3">Article 8 POS table</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Code 4 :</head><label>4</label><figDesc>Turtle ontological serialisation of the measures of the Directive</figDesc><table><row><cell></cell><cell>. . .</cell></row><row><cell></cell><cell>[ a owl : R e s t r i c t i o n ;</cell></row><row><cell></cell><cell>owl : o n P r o p e r t y &lt; h t t p : / / n a s . o n t o / predN &gt; ;</cell></row><row><cell></cell><cell>owl : someValuesFrom &lt; h t t p : / / n a s . o n t o / ObjectN &gt; ] ) ] .</cell></row><row><cell></cell><cell>&lt; h t t p : / / n a s . o n t o / MemberState &gt; a owl : C l a s s ;</cell></row><row><cell></cell><cell>owl : e q u i v a l e n t C l a s s &lt; h t t p : / / n a s . o n t o / A r t i c l e −8− Com plian t &gt;</cell></row><row><cell></cell><cell>&lt; h t t p : / / n a s . o n t o / A r t i c l e −8− Com plian t &gt; a owl : C l a s s ;</cell></row><row><cell></cell><cell>owl : e q u i v a l e n t C l a s s [ a owl : C l a s s ;</cell></row><row><cell></cell><cell>owl : i n t e r s e c t i o n O f (</cell></row><row><cell></cell><cell>[ a owl : R e s t r i c t i o n ;</cell></row><row><cell></cell><cell>owl : o n P r o p e r t y &lt; h t t p : / / n a s . o n t o / e n s u r e &gt; ;</cell></row><row><cell></cell><cell>owl : someValuesFrom &lt; h t t p : / / n a s . o n t o / CA− SinglePOC −←˒</cell></row><row><cell></cell><cell>H a v e A d e q u a t e R e s o u r c e s T o C a r r y O u t T a s k s A s s i g n e d &gt; ]</cell></row><row><cell>10</cell><cell>[ a owl : R e s t r i c t i o n ;</cell></row><row><cell>11</cell><cell>owl : o n P r o p e r t y &lt; h t t p : / / n a s . o n t o / pred2 &gt; ;</cell></row><row><cell>12</cell><cell>owl : someValuesFrom &lt; h t t p : / / n a s . o n t o / O b j e c t 2 &gt; ] ) ] .</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>Gianpietro Castiglione acknowledges a studentship by Intrapresa S.r.l. and Italian "Ministero dell'Università e della Ricerca" (D.M. n. 352/2022). Giampaolo Bella acknowledges financial support from: PNRR MUR project PE0000013-FAIR.</p></div>
			</div>

			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0" />			</div>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Toward principles for the design of ontologies used for knowledge sharing?</title>
		<author>
			<persName><forename type="first">T</forename><forename type="middle">R</forename><surname>Gruber</surname></persName>
		</author>
		<idno type="DOI">10.1006/ijhc.1995.1081</idno>
		<ptr target="https://doi.org/10.1006/ijhc.1995.1081" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Human-Computer Studies</title>
		<imprint>
			<biblScope unit="volume">43</biblScope>
			<biblScope unit="page" from="907" to="928" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="https://eur-lex.europa.eu/eli/dir/2022/2555/oj" />
		<title level="m">Nis 2 directive</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Methontology: From ontological art towards ontological engineering</title>
		<author>
			<persName><forename type="first">M</forename><surname>Fernández-López</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gómez-Pérez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Juristo</surname></persName>
		</author>
		<ptr target="https://oa.upm.es/5484/,ontologyEngineeringGroup-OEG" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Ontological Engineering AAAI-97 Spring Symposium Series, American Asociation for Artificial Intelligence</title>
				<meeting>the Ontological Engineering AAAI-97 Spring Symposium Series, American Asociation for Artificial Intelligence</meeting>
		<imprint>
			<date type="published" when="1997">1997</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title/>
		<author>
			<persName><surname>Rdflib</surname></persName>
		</author>
		<ptr target="https://rdflib.readthedocs.io/en/stable/" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<ptr target="https://spacy.io/universe/project/spacy-clausie" />
		<title level="m">The Spacy-Clausie Library</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A use case on GDPR of modular-proleg for private international law</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sawasaki</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Satoh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Troussel</surname></persName>
		</author>
		<ptr target="https://ceur-ws.org/Vol-3257/paper1.pdf" />
	</analytic>
	<monogr>
		<title level="m">Joint Proceedings of the 3th International Workshop on Artificial Intelligence Technologies for Legal Documents (AI4LEGAL 2022) and the 1st International Workshop on Knowledge Graph Summarization (KGSum 2022) co-located with the 21st International Semantic Web Conference (ISWC 2022), Virtual Event</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<editor>
			<persName><forename type="first">M</forename><surname>Navas-Loro</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">C</forename><surname>Badenes-Olmedo</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Koubarakis</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">J</forename><forename type="middle">L R</forename><surname>García</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Kirrane</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">N</forename><surname>Mihindukulasooriya</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">K</forename><surname>Satoh</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">M</forename><surname>Acosta</surname></persName>
		</editor>
		<meeting><address><addrLine>Hangzhou, China</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022">October 23-24, 2022. 2022</date>
			<biblScope unit="volume">3257</biblScope>
			<biblScope unit="page" from="1" to="11" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Gdprtext -gdpr as a linked data resource</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">J</forename><surname>Pandit</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Fatema</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>O'sullivan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Lewis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Extended Semantic Web Conference</title>
				<imprint>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<ptr target="https://www.cybersaint.io/cyberstrong" />
		<title level="m">Cybserstrong platform</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Seseionto: Interfacing nlp and ontology extraction</title>
		<author>
			<persName><forename type="first">M</forename><surname>Morneau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">W</forename><surname>Mineau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Corbett</surname></persName>
		</author>
		<idno type="DOI">10.1109/WI.2006.158</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE/WIC/ACM International Conference on Web Intelligence (WI 2006 Main Conference Proceedings)</title>
				<meeting><address><addrLine>WI</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2006">2006. 2006</date>
			<biblScope unit="page" from="449" to="455" />
		</imprint>
	</monogr>
	<note>&apos;06</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Towards ontology-based natural language processing</title>
		<author>
			<persName><forename type="first">D</forename><surname>Estival</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Nowak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Zschorn</surname></persName>
		</author>
		<idno type="DOI">10.3115/1621066.1621075</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of NLP-XML</title>
				<meeting>NLP-XML</meeting>
		<imprint>
			<date type="published" when="2004">2004</date>
			<biblScope unit="page">2004</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Semantic nlp-based information extraction from construction regulatory documents for automated compliance checking</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">M</forename><surname>El-Gohary</surname></persName>
		</author>
		<idno type="DOI">10.1061/(ASCE)CP.1943-5487.0000346</idno>
		<idno>ASCE)CP.1943-5487.0000346</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Computing in Civil Engineering</title>
		<imprint>
			<biblScope unit="volume">30</biblScope>
			<biblScope unit="page">4015014</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">Text</forename><surname>Razor</surname></persName>
		</author>
		<ptr target="https://www.textrazor.com/" />
		<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">The Stanford CoreNLP natural language processing toolkit</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">D</forename><surname>Manning</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Surdeanu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Finkel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">J</forename><surname>Bethard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Mcclosky</surname></persName>
		</author>
		<ptr target="http://www.aclweb.org/anthology/P/P14/P14-5010" />
	</analytic>
	<monogr>
		<title level="m">Association for Computational Linguistics (ACL) System Demonstrations</title>
				<imprint>
			<date type="published" when="2014">2014</date>
			<biblScope unit="page" from="55" to="60" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">The protégé project: a look back and a look forward</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Musen</surname></persName>
		</author>
		<idno type="DOI">10.1145/2757001.2757003</idno>
		<idno>doi:10.1145/2757001.2757003</idno>
		<ptr target="https://doi.org/10.1145/2757001.2757003" />
	</analytic>
	<monogr>
		<title level="j">AI Matters</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page" from="4" to="12" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Towards grammatical tagging for the legal language of cybersecurity</title>
		<author>
			<persName><forename type="first">G</forename><surname>Castiglione</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Bella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Santamaria</surname></persName>
		</author>
		<idno type="DOI">10.1145/3600160.3605069</idno>
	</analytic>
	<monogr>
		<title level="m">ACM International Conference Proceeding Series</title>
				<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="1" to="9" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Towards an Ontology-Based Framework for a Behavior-Oriented Integration of the IoT</title>
		<author>
			<persName><forename type="first">D</forename><surname>Cantone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">F</forename><surname>Longo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nicolosi-Asmundo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Santamaria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Santoro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 20th Workshop From Objects to Agents</title>
		<title level="s">CEUR Workshop Proceeding</title>
		<meeting>the 20th Workshop From Objects to Agents<address><addrLine>Parma, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019-06-28">26-28 June, 2019. 2019</date>
			<biblScope unit="volume">2404</biblScope>
			<biblScope unit="page" from="119" to="126" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">The ontology for agents, systems and integration of services: recent advancements of oasis</title>
		<author>
			<persName><forename type="first">G</forename><surname>Bella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Cantone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nicolosi-Asmundo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Santamaria</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of WOA 2022-23nd Workshop From Objects to Agents, 1-2</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<meeting>WOA 2022-23nd Workshop From Objects to Agents, 1-2<address><addrLine>Genova, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2022-09">September 2022. 2022</date>
			<biblScope unit="volume">3261</biblScope>
			<biblScope unit="page" from="176" to="193" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">The Ontology for Agents, Systems and Integration of Services: OASIS version 2</title>
		<author>
			<persName><forename type="first">G</forename><surname>Bella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Cantone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">F</forename><surname>Longo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nicolosi-Asmundo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Santamaria</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Intelligenza Artificiale</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="51" to="62" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS</title>
		<author>
			<persName><forename type="first">G</forename><surname>Bella</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Cantone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Longo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nicolosi-Asmundo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">F</forename><surname>Santamaria</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intelligent Distributed Computing XIV, Studies in Computational Intelligence</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Camacho</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="1026">1026. 2022</date>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="249" to="259" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
