<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Integrating Ontology and Graph Neural Network for Explainable Malware Detection</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Monday Onoja</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Applied Informatics, Comenius University in Bratislava</institution>
          ,
          <addr-line>Mlynská dolina, 842 48 Bratislava</addr-line>
          ,
          <country country="SK">Slovakia</country>
        </aff>
      </contrib-group>
      <fpage>33</fpage>
      <lpage>38</lpage>
      <abstract>
        <p>Modern machine learning (ML) models for malware detection ofer high predictive power but often lack transparency, hindering trust and interpretability. Ontology-driven representation provides a formal, structured way to model malware behavior that is both machine-readable and human-interpretable. This research proposes a dynamic malware ontology leveraging standard vocabularies from Malware Attribute Enumeration and Characterization (MAEC) and Structured Threat Information Expression (STIX), aimed at capturing behavioral features extracted via dynamic analysis. The structured dataset resulting from the ontology will serve as input to Graph Neural Networks (GNNs) and DeepProbLog to produce explainable detection results. This work addresses key challenges in explainability, semantic representation, and robust malware classification, contributing a novel dataset, ontology, and interpretability framework for cybersecurity applications.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Malware detection</kwd>
        <kwd>Malware ontology</kwd>
        <kwd>Explanability</kwd>
        <kwd>Graph Neural Network</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>and STIX languages for describing and representing malware actions, artifacts, and threat patterns for
ontology-based knowledge representation that are suitable for the integration of results obtained from
static and dynamic malware analysis (hybrid features). Aligned with the MITRE ATT&amp;CK2 framework,
this ontology enables the definition of malware techniques and tactics.</p>
      <p>This research aims to bridge that gap by developing an integrated malware ontology enriched with
dynamic features derived from live malware analysis. The ontology will leverage standard vocabularies
from MAEC and STIX to formalize the representation. By integrating this structured representation
with Graph Neural Networks (GNNs) and DeepProbLog as explainable models, the work will advance
both detection performance and interpretability.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Research Plan and Objectives</title>
      <p>The proposed research seeks to create a pipeline that connects dynamic malware analysis,
ontologybased representation, and explainable AI (XAI) methods for malware detection. The following key
objectives guide this research:</p>
      <sec id="sec-2-1">
        <title>2.1. Ontology Development</title>
        <p>We will create a semantically rich and comprehensive ontology that formally represents malware
behavior, actions, and threat patterns. The ontology will incorporate dynamic malware attributes such
as runtime behaviors and system-level interactions using standardized vocabularies from MAEC and
STIX. This structured representation will enable both humans and machines to understand the context
of malware operations more clearly and provide a basis for interpretable reasoning. MAEC (Malware
Attribute Enumeration and Characterization) and STIX (Structured Threat Information Expression) are
standardized vocabularies for malware and threat intelligence. MAEC provides a structured language
for describing low-level malware behaviors, while STIX adds higher-level context and granularity,
thereby enriching MAEC classes. Used together, they enhance the ontology’s expressiveness and
interoperability, and their wide adoption and support across analysis tools make them particularly
suitable for our approach.</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Dynamic Malware Analysis</title>
        <p>To enhance the ontology with real-world behavioral data, this step involves performing dynamic
analysis on live malware samples. Using Cuckoo Sandbox, the malware is executed in a controlled
environment to capture runtime features such as API calls, file manipulations, registry changes, and
network activity. These behaviors ofer valuable insights into how malware interacts with a system,
especially those that evade static detection through obfuscation or encryption.</p>
      </sec>
      <sec id="sec-2-3">
        <title>2.3. Ontology-based Dataset Construction</title>
        <p>The dynamically extracted features will be mapped to the ontology and used to generate a structured
dataset. This dataset will contain instances represented as graph-like structures suitable for input
into machine learning models. The process involves transforming unstructured behavioral logs into
semantically labeled data points, thus enabling downstream algorithms to learn from meaningful,
domain-grounded representations.</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.4. Explainable Detection Models</title>
        <p>
          In the final stage, the structured dataset will be used to train Graph Neural Networks (GNNs) and
DeepProbLog, a probabilistic logic programming framework. GNNs are well-suited for learning from
graph-structured data (e.g., ontology instances) [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], while DeepProbLog allows for symbolic reasoning
with probabilistic inference [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]. Together, these models will support interpretable classification decisions
by associating predictions with human-understandable rules, dependencies, or paths in the graph making
the malware detection process more transparent and trustworthy.
        </p>
        <p>
          This integration of the symbolic structure of the ontology and sub-symbolic learning enables
transparent and logically grounded explanations for model predictions. Through this combination, our
approach not only aims to improve malware classification performance but also provides rule-based
explanations for why a sample was labeled as malicious or benign thus enhancing the trust, auditability,
and human interpretability of AI-driven security systems [
          <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
          ].
        </p>
        <p>This research also aim to address the following questions:
• RQ1: Which dynamic features are most suitable (or unsuitable) for representing malware behavior?
• RQ2: To what extent does integrating these features into a formal ontology produce a structured
and expressive dataset?
• RQ3: How efective are GNNs and DeepProbLog in providing interpretable decisions based on
ontological data, and what are their limitations?</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Current Progress</title>
      <p>
        We have developed MAECO, an ontology constructed using classes derived from the vocabularies of
MAEC and STIX languages. This section introduces key classes in the ontology, primarily derived
from MAEC’s top-level objects, along with selected object properties that define relationships between
these classes, and relevant data properties. We formalize our ontology in OWL, one of the most widely
used ontology languages for knowledge representation. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. It is a more expressive language for
designing complex ontologies which support the extension of RDFS with richer semantics such as
property restriction, equivalence and disjointness and enhances reasoning [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ].
      </p>
      <p>MAEC Specifications
and STIX vocabularies</p>
      <p>Define concepts,
relationships and
individuals</p>
      <p>Design Ontology
(Protege)</p>
      <p>Malware Ontology
(MONTFRAME)</p>
    </sec>
    <sec id="sec-4">
      <title>4. Investigating the Suitability of GNNs on Ontology-Based Datasets</title>
      <p>
        We constructed PyTorch Geometric (PyG) graph data from ontology-based knowledge graphs created
by Daniel et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], derived using the malware ontology of Švec et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] from the EMBER dataset
(1,000 binary-labeled samples). To assess the suitability of graph neural networks (GNNs), we conducted
four experiments:
1. GCN1 – Graph Convolutional Network
2. GCN2 – Graph Convolutional Network with edge reversal
3. RGCN1 – Relational Graph Convolutional Network
4. RGCN2 – Relational Graph Convolutional Network with edge reversal
      </p>
      <p>The goal was to evaluate the efect of bidirectional relations (edge reversal) when learning from
numeric feature subsets. The results are summarized in Table 2.</p>
      <p>The results show that bidirectional relations significantly improve performance. In particular, RGCN
with edge reversal (RGCN2) achieved 98% accuracy and TPR, compared to 67% in baseline models. This
demonstrates that relational GNNs are highly suitable for ontology-based datasets, where relational
structures are central.</p>
      <p>In our envisaged neuro-symbolic pipeline, the ontology structures domain knowledge into relational
graphs of malware samples. A relational graph convolutional network (RGCN) learns embeddings and
probabilistic predictions from these graphs, which are then passed into DeepProbLog and combined with
logical rules derived from the ontology. This integration allows the ontology to constrain the feature
space, the RGCN to capture statistical relational patterns, and DeepProbLog to provide probabilistic
reasoning with symbolic explanations.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Related Work</title>
      <p>
        Ontology-based approaches for malware detection have been investigated in various forms, aiming to
formalize malware behaviors and characteristics for better representation and reasoning. The earliest
ontology [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]; a core ontology to model suspicious malware behaviour, lacks grounding in formal
standards such as MAEC or STIX, reducing reusability and interoperability.
      </p>
      <p>
        Chowdhury and Bhowmik [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] introduced a knowledge graph-based approach to model malware
behavior, capturing relationships between malware indicators and behavior patterns. While their system
provided graphical interpretations, it did not explicitly rely on standardized ontology vocabularies and
lacked dynamic feature integration. More recently, Svec et al. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] presented a PE malware ontology
using the MAEC vocabulary to model features from static analysis. Although their model included
explainability considerations, it was limited to Windows PE binaries and static features leaving out
dynamic behaviors which are essential in uncovering evasive malware traits. Balogh and Galko [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]
addressed integration of both static and dynamic analysis results into an ontological model using MAEC.
Their work is foundational to this proposal, as it confirms the feasibility of unifying hybrid malware
attributes into a single semantic representation. However, it stops short of applying explainable machine
learning models to the resulting ontology-enhanced datasets. In a broader AI context, research on
explainability has progressed rapidly. [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] outlines principles of Explainable AI (XAI), highlighting its
role in transparency, fairness, and user trust. While numerous studies explore XAI in domains such as
healthcare or finance, few have systematically applied XAI to malware detection in conjunction with
ontology-based representations.
      </p>
      <p>To the best of our knowledge, no existing work has combined dynamic malware analysis,
ontologybased semantic modeling grounded in MAEC/STIX, and explainable learning using GNNs and
DeepProbLog. This research thus fills a key gap by proposing a novel end-to-end pipeline that incorporates
all these elements for interpretable malware detection.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>Funded by the EU NextGenerationEU through the Recovery and Resilience Plan for Slovakia under the
project No. 09I05-03-V02-00064.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>During the preparation of this work, the author(s) used X-GPT-4 in order to: Grammar and spelling
check. After using these tool/service, the authors reviewed and edited the content as needed and take
full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>B.</given-names>
            <surname>Molina-Coronado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ruggia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Mori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Merlo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mendiburu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Miguel-Alonso</surname>
          </string-name>
          ,
          <article-title>Light up that droid! on the efectiveness of static analysis features against app obfuscation for android malware detection</article-title>
          ,
          <source>Journal of Network and Computer Applications</source>
          <volume>235</volume>
          (
          <year>2025</year>
          )
          <article-title>104094</article-title>
          . doi:https: //doi.org/10.1016/j.jnca.
          <year>2024</year>
          .
          <volume>104094</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>J.</given-names>
            <surname>Geng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Ge</surname>
          </string-name>
          ,
          <article-title>A survey of strategy-driven evasion methods for pe malware: Transformation, concealment, and attack</article-title>
          ,
          <source>Computers &amp; Security</source>
          <volume>137</volume>
          (
          <year>2024</year>
          )
          <article-title>103595</article-title>
          . doi:https://doi.org/10.1016/j.cose.
          <year>2023</year>
          .
          <volume>103595</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>B.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <article-title>Malware detection based on static and dynamic features analysis</article-title>
          , in: X.
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Yan</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          <string-name>
            <surname>Yan</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          Zhang (Eds.),
          <source>Machine Learning for Cyber Security</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Syed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Padia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. W.</given-names>
            <surname>Finin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. L.</given-names>
            <surname>Mathews</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Joshi</surname>
          </string-name>
          ,
          <article-title>Uco: A unified cybersecurity ontology</article-title>
          ,
          <source>in: AAAI Workshop: Artificial Intelligence for Cyber Security</source>
          ,
          <year>2016</year>
          . URL: https://api.semanticscholar. org/CorpusID:6896947.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S. U.</given-names>
            <surname>Zamida</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. J. M. Chowdhury</surname>
            ,
            <given-names>N. R.</given-names>
          </string-name>
          <string-name>
            <surname>Chakraborty</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Biswas</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          <string-name>
            <surname>Sami</surname>
          </string-name>
          ,
          <article-title>Cybersecurity vulnerability management: A conceptual ontology and cyber intelligence alert system</article-title>
          ,
          <source>Information &amp; Management</source>
          <volume>57</volume>
          (
          <year>2020</year>
          )
          <article-title>103334</article-title>
          . doi:https://doi.org/10.1016/j.im.
          <year>2020</year>
          .
          <volume>103334</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P.</given-names>
            <surname>Svec</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Balogh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Homola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kluka</surname>
          </string-name>
          , T. Bisták,
          <article-title>Semantic data representation for explainable windows malware detection models</article-title>
          ,
          <source>CoRR abs/2403</source>
          .11669 (
          <year>2024</year>
          ). URL: https://doi.org/10.48550/ arXiv.2403.11669. doi:
          <volume>10</volume>
          .48550/ARXIV.2403.11669. arXiv:
          <volume>2403</volume>
          .
          <fpage>11669</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Khemani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Patil</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Kotecha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tanwar</surname>
          </string-name>
          ,
          <article-title>A review of graph neural networks: concepts, architectures, techniques, challenges, datasets, applications, and future directions</article-title>
          ,
          <source>Journal of Big Data</source>
          <volume>11</volume>
          (
          <year>2024</year>
          ). URL: http://dx.doi.org/10.1186/s40537-023-00876-4. doi:
          <volume>10</volume>
          .1186/ s40537-023-00876-4.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Manhaeve</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dumančić</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kimmig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Demeester</surname>
          </string-name>
          , L. De Raedt,
          <article-title>Neural probabilistic logic programming in deepproblog</article-title>
          ,
          <source>Artificial Intelligence</source>
          <volume>298</volume>
          (
          <year>2021</year>
          )
          <article-title>103504</article-title>
          . URL: http://dx.doi.org/10. 1016/j.artint.
          <year>2021</year>
          .
          <volume>103504</volume>
          . doi:
          <volume>10</volume>
          .1016/j.artint.
          <year>2021</year>
          .
          <volume>103504</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>H.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ji</surname>
          </string-name>
          ,
          <article-title>Explainability in graph neural networks: A taxonomic survey</article-title>
          ,
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          . URL: http://dx.doi.org/10. 1109/tpami.
          <year>2022</year>
          .
          <volume>3204236</volume>
          . doi:
          <volume>10</volume>
          .1109/tpami.
          <year>2022</year>
          .
          <volume>3204236</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Kakkad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jannu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Medya</surname>
          </string-name>
          ,
          <article-title>A survey on explainability of graph neural networks (</article-title>
          <year>2023</year>
          ). URL: https://arxiv.org/abs/2306.
          <year>01958</year>
          . doi:
          <volume>10</volume>
          .48550/ARXIV.2306.
          <year>01958</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F. H.</given-names>
            <surname>Abanda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. H. M.</given-names>
            <surname>Tah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Keivani</surname>
          </string-name>
          ,
          <article-title>Trends in built environment semantic web applications: Where are we today?</article-title>
          ,
          <source>Expert Syst. Appl</source>
          .
          <volume>40</volume>
          (
          <year>2013</year>
          )
          <fpage>5563</fpage>
          -
          <lpage>5577</lpage>
          . URL: https://doi.org/10.1016/j.eswa.
          <year>2013</year>
          .
          <volume>04</volume>
          .027. doi:
          <volume>10</volume>
          .1016/J.ESWA.
          <year>2013</year>
          .
          <volume>04</volume>
          .027.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J. Z.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <article-title>OWL for the Novice: A Logical Perspective</article-title>
          , Springer US,
          <year>2008</year>
          , pp.
          <fpage>159</fpage>
          -
          <lpage>182</lpage>
          . doi:
          <volume>10</volume>
          . 1007/978-0-
          <fpage>387</fpage>
          -48438-
          <issue>9</issue>
          _
          <fpage>9</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zuo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>Web ontology language owl and its description logic foundation</article-title>
          ,
          <source>in: Proceedings of the 8th International Scientific and Practical Conference of Students, Post-graduates and Young Scientists. Modern Technique and Technologies. MTT'2002 (Cat. No.02EX550)</source>
          , IEEE,
          <year>2003</year>
          , pp.
          <fpage>157</fpage>
          -
          <lpage>160</lpage>
          . doi:
          <volume>10</volume>
          .1109/PDCAT.
          <year>2003</year>
          .
          <volume>1236278</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>B.</given-names>
            <surname>Jordan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Piazza</surname>
          </string-name>
          , T. Darley,
          <source>STIX™ Version 2</source>
          .1,
          <string-name>
            <surname>Committee</surname>
            <given-names>Specification 02</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>OASIS</given-names>
            <surname>Cyber Threat Intelligence (CTI) Technical</surname>
          </string-name>
          <string-name>
            <surname>Committee</surname>
          </string-name>
          ,
          <year>2021</year>
          . URL: https://docs.oasis-open.org/cti/stix/v2.1/cs02/ stix-v2.
          <fpage>1</fpage>
          -
          <lpage>cs02</lpage>
          .html, approved
          <issue>25</issue>
          <year>January 2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Musen</surname>
          </string-name>
          ,
          <article-title>The protégé project: a look back and a look forward</article-title>
          ,
          <source>AI</source>
          Matters
          <volume>1</volume>
          (
          <year>2015</year>
          )
          <fpage>4</fpage>
          -
          <lpage>12</lpage>
          . URL: https://doi.org/10.1145/2757001.2757003. doi:
          <volume>10</volume>
          .1145/2757001.2757003.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>D.</given-names>
            <surname>Trizna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Anthony</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Homola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Adams</surname>
          </string-name>
          , Š. Balogh,
          <article-title>Learning explainable malware characterization using knowledge base embedding</article-title>
          ,
          <source>in: 2024 IEEE 5th International Conference on Electro-Computing Technologies for Humanity (NIGERCON)</source>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>20</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .1109/NIGERCON62786.
          <year>2024</year>
          .
          <volume>10927262</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>P.</given-names>
            <surname>Švec</surname>
          </string-name>
          , Š. Balogh,
          <string-name>
            <given-names>M.</given-names>
            <surname>Homola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kľuka</surname>
          </string-name>
          , T. Bisták,
          <article-title>Semantic data representation for explainable windows malware detection models</article-title>
          ,
          <source>arXiv preprint arXiv:2403.11669</source>
          (
          <year>2024</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>A. G. R. de Geus</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Jino</surname>
            ,
            <given-names>A. P.</given-names>
          </string-name>
          <string-name>
            <surname>Lopes</surname>
          </string-name>
          ,
          <article-title>Ontology for malware behavior: A core model proposal</article-title>
          ,
          <source>in: IEEE 23rd International WETICE Conference</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>453</fpage>
          -
          <lpage>458</lpage>
          . doi:
          <volume>10</volume>
          .1109/WETICE.
          <year>2014</year>
          .
          <volume>72</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I. R.</given-names>
            <surname>Chowdhury</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bhowmik</surname>
          </string-name>
          ,
          <article-title>Capturing malware behaviour with ontology-based knowledge graphs</article-title>
          ,
          <source>in: IEEE Conference on Dependable and Secure Computing (DSC)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          . doi:
          <volume>10</volume>
          . 1109/DSC54232.
          <year>2022</year>
          .
          <volume>9888860</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>P.</given-names>
            <surname>Svec</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Balogh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Homola</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kluka</surname>
          </string-name>
          , T. Bisták,
          <article-title>Semantic data representation for explainable windows malware detection models</article-title>
          ,
          <source>arXiv preprint arXiv:2403.11669</source>
          (
          <year>2024</year>
          ). URL: https://arxiv. org/abs/2403.11669. doi:
          <volume>10</volume>
          .48550/arXiv.2403.11669.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Balogh</surname>
          </string-name>
          , T. Galko,
          <article-title>Integration of results from static and dynamic code analysis into an ontological model</article-title>
          ,
          <source>in: 12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS)</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>680</fpage>
          -
          <lpage>685</lpage>
          . doi:
          <volume>10</volume>
          .1109/IDAACS58523.
          <year>2023</year>
          .
          <volume>10348799</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>IBM</surname>
          </string-name>
          ,
          <article-title>Explainable ai (xai</article-title>
          ),
          <year>2024</year>
          . URL: https://www.ibm.com/watson/explainable-ai, accessed:
          <fpage>2025</fpage>
          - 07-16.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>