<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ontology-based model for security management in IoT systems⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksiy Kovalenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Natalia Karevina</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Mathematical Machines and Systems Problems NAS of Ukraine</institution>
          ,
          <addr-line>42 Academic Hlushkov ave., 03187 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National University of Life and Environmental Sciences of Ukraine</institution>
          ,
          <addr-line>15 Heroyiv Oborony str., 03041 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <fpage>342</fpage>
      <lpage>348</lpage>
      <abstract>
        <p>The development and implementation of Internet of Things (IoT) systems in modern conditions determines the special importance of addressing security issues and the sustainable functioning of such systems. The convergence of various technologies in IoT systems necessitates the collection, systematization and use of information on these technologies in problem-oriented knowledge bases for further use in security management processes in IoT systems. The use of an “ontological approach” provides conceptual connections between information assets of the system for identification, analysis and security management in systems. The implementation of the ontological approach is carried out on the basis of a generalized architectural description of IoT systems, taking into account the specifics of the subject area of use. The paper proposes a framework of a subject-oriented ontology to support security management of IoT systems.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;knowledge-based security management</kwd>
        <kwd>ontology</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>Internet of Things</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The IoT is becoming an increasingly important factor in ensuring sustainable development in
various areas of human activity. When building IoT systems, the concept of a computer network of
physical objects (“things”) with built-in technologies for interaction with each other and the
external environment is implemented [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1–3</xref>
        ]. The implementation of such networks allows
influencing economic and social processes without human participation in performing individual
actions and operations. IoT technologies provide dynamic adaptation to the context of the target
system, collecting through the exchange and processing of data of the subject area, changing the
processes of activity and the way of our life as a whole. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. IoT terms and definitions are presented
in the ISO/IEC 20924 standard. This standard defines IoT as “an infrastructure of interconnected
objects, people, systems and information resources together with intelligent services, allowing
them to process information from the physical and virtual world and react” [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        ITU-T Y.2060 recommendation notes that “from the perspective of technical standardization, the
IoT can be viewed as a global infrastructure for the information society, enabling advanced services
by interconnecting (physical and virtual) things based on existing and evolving interoperable
information and communication technologies (ICT)” [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. IoT is a cyber-converged system [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] that
includes things, communication tools, target applications, and data analysis tools that support
unique identification of each object. The growing scale and complexity of IoT systems, on the one
hand, and security threats, on the other, require the development of security management tools
taking into account the specifics of the domain of use. In 2017 was founded IoT Security Experts
Group (IoTSEC) as an information exchange platform that brings together experts to ensure the
security and resilience of the entire IoT ecosystem.
IoT security organization issues are addressed in a large number of publications in this field of
research and engineering from different perspectives. In particular, general issues of IoT security
are discussed in [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. IoT security with the focus on the impact of emerging technologies outlined
in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Issues of forming security requirements for IoT components examines in [
        <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
        ]. Security
measures review for IoT is presented in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. A special place in research on ensuring IoT security is
occupied by works focused on the use of formalized knowledge and ontologies [
        <xref ref-type="bibr" rid="ref13 ref14 ref15 ref16 ref17">13–17</xref>
        ].
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] presents a general ontological model for security services based on the convergence of
threats, vulnerabilities and risks of information assets. However, the model does not take into
account the specifics of Internet of Things systems.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] introduced cybersecurity as one of the most important aspects of the full implementation of
the IoT. Although the proposed approach does not take into account the aspects of risks and
vulnerabilities.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] offers a basic ontology for the process of identifying and analyzing information systems
security requirements. Although the impact of vulnerabilities is not specified and the specifics of
the IoT are not presented.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] proposes the integration of vulnerabilities, weaknesses, methods, tactics, and attack models
into a holistic set of relationships, but does not consider risks and intrusion models for the IoT.
      </p>
      <p>Therefore, it is necessary to develop an ontological security model for the IoT that takes into
account various security aspects and the relationships between the architectural components of the
IoT.</p>
      <p>The aim of this study is to develop an ontological model for IoT security management, taking
into account threats, risks and intrusion patterns of IoT resources. The proposed approach is based
on the architectural decomposition of IoT resources and the relationships between IoT
components. The developed model for security management in IoT systems is based on the
semantic interrelation between IoT domains and their influence on system functioning. The core
idea is to converge different aspects of systems’ safety into a single knowledge model with
consideration of components and interrelations of IoT architecture.</p>
    </sec>
    <sec id="sec-2">
      <title>2. IoT Components</title>
      <p>Various sets (cases) of information, communication, and organizational technologies are used for
the implementation of the IoT processes, which are necessary to solve the IoT tasks in the target
subject area. The variety of components, the changeability of the problems of the system and the
requirements for their solution require the task of quick adaptation of the system to solve current
problems. The use of standard IoT design technologies may be unacceptable due to limited
resources and the need for operational integration (convergence) of the requested IoT within the
framework of a specific implementation (configuration) of the IoT ecosystem to solve current tasks.</p>
      <p>The IoT ecosystem creates as set of independent constituent systems and technologies
integrated into the principles of convergence. IoT components may be classified as architectural,
process, and information.</p>
    </sec>
    <sec id="sec-3">
      <title>3. IoT Architecture</title>
      <p>The functional capabilities and properties of a separate IoT system configuration are determined by
its architecture. System architecture is defined as a conceptual model that defines the structure,
behavior and multiplicity of types (projections) of the system. Different types of system
architectures are used to represent cybermatic systems, which can include IoT: software,
organizational, technological, informational, process, etc. An architecture description is a formal
description and presentation of a system, organized in such a way as to support conclusions
(assumptions) about the structures and behavior of the system. The general description of the
system architecture consists of three types of descriptions: structural, functional and
organizational.
Software architecture is defined as the process of defining a structured solution that meets all
technical and operational requirements while optimizing common quality attributes such as
performance, security, and manageability. It involves a number of decisions based on a wide range
of factors, and each of these decisions can have a significant impact on the quality, performance,
maintainability, and overall success of the program.</p>
      <p>
        IoT reference architecture, proposed in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] is derived from a Conceptual Model and a set of
characteristics that define a Reference Model and one or more architectural views. Characteristics
of IoT systems are classified by three categories: architectures, trustworthiness, and functional. The
IoT reference model presented as convergence of two contexts: entity-based and domain-based. In
fact the IoT architecture include devices, communications, processing platforms, and use cases of
big data analytics.
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. IoT processes</title>
      <p>The main sense of IoT usage is decision-making on different layers of activity. Devices and objects
with built-in sensors are connected to the IoT platform, which integrates data from various devices
and applies analytics to share the most valuable information with applications created to meet
specific needs. Powerful IoT platforms can determine exactly which information is useful and
which can be safely ignored. The resulting information can be used to identify patterns, make
recommendations, and identify potential problems before they occur.</p>
      <p>As a constituent of decision-making processes IoT are implemented within the perceptual cycle
and include stages of empirical awareness of the environment (target area), building and applying
its model in the formation of rational behavior in the environment based on periodic updates of
awareness of the current environment. Awareness of the state of the environment and the
formation of rational behavior on its basis are carried out using the mechanisms of logical
inference, corresponding to the stages of the perceptual cycle. Such mechanisms of logical
inference in the cycle of situational interaction with the environment are abduction, induction,
deduction and case based reasoning (CBR).</p>
    </sec>
    <sec id="sec-5">
      <title>5. IoT Information</title>
      <p>
        The formal description of the subject area of the IoT, for which a problem-oriented IoT is created,
is a hierarchy of concepts (notions) and functional transformations that will be operated by users.
The formal description of the subject area should also contain a generalized description of the IoT
process model. The composition of IoT technologies should be carried out taking into account the
architecture of the IoT [
        <xref ref-type="bibr" rid="ref19 ref20 ref21 ref22">19–22</xref>
        ].
      </p>
      <p>Thus, the main task of the composition of components within the framework of the convergent
architecture of the IoT can be defined as establishing the correspondence between the formal
description of the application area and the means of information technologies:</p>
      <p>B : (O ,   ( D )→  ( K ,  ) L , M )
(1)
where B is the function of mapping model O of the subject area and model of requirements D to
the problem-oriented IoT on the set of technological means (alphabet) of the IoT K and the set of
control functions L of these technological means on the set M of admissible situations in the subject
area.</p>
      <p>The peculiarity of information technology is that its input and output is information that differs
only in category, purpose, structure and content. Based on the category and purpose of input and
output information of information technologies, it is possible to build their classification. In
particular, information technologies can be distinguished by purpose:

</p>
      <sec id="sec-5-1">
        <title>Registration and processing of primary signals Information structuring 344</title>
        <p>






</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Model of IoT Security</title>
      <p>
        The general approach to security management outlined in the standards is a risk-based approach.
Therefore, the main goal of security management is to minimize risks. The ISO/IEC 27005 standard
defines risk as “the impact of uncertainty on targets”, and note 6 to this definition states:
“information security risk is related to the potential opportunity for threats to exploit the
vulnerability of an information asset or information assets and, therefore, cause damage to the
organization”. Furthermore, in the standard context of ISO/IEC 27005, “vulnerabilities may be
associated with the properties of an asset that can be used in a manner or for a purpose other than
that intended when the asset was acquired or manufactured”. Simply put, a vulnerability is a
weakness in an asset or group of assets that can be exploited by one or more threats, but a threat
that does not have the corresponding vulnerability cannot cause a risk. And finally, “a risk
assessment determines the value of information assets, the relevant threats and vulnerabilities that
exist (or may exist), the controls in place and their impact on the identified risk, the potential
consequences and, finally, the priorities of new risks and classify them according to risk assessment
criteria established in the context of creation” [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ]. The diagram shown in Figure 1 represents the
dependencies between risks, threats, vulnerabilities, and information assets.
      </p>
      <p>
        Risk assessment is the basis of security management and the use of an adequate set of security
models. Information assets are parts of the IT architecture. Therefore, when evaluating information
assets, we consider these assets as an instance (variant) of the IT architecture. The model describes
risk factors related to threats, vulnerabilities and IT architecture [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>The convergent knowledge model of information security management is implemented based
on the knowledge models of risk components (Figure 1). The ontological model of knowledge of
the subject area allows describing the main concepts (propositions) of the subject area and defines
the relations between them. The process of building ontologies includes:


classes and their properties (classes, properties).
properties of each concept, which describes various functional capabilities and attributes of
the concept (clots (slots), sometimes called roles).
slot restrictions (also known as slot facets, sometimes called role restrictions). The ontology
together with many individual instances of classes make up the knowledge base.</p>
      <sec id="sec-6-1">
        <title>Model of information security management for IoT is presented as tuple</title>
        <p>T = ( A ,   P , I , R , C , F ) ,
(2)
where A is an IoT architecture model; P is a processes model in IoT system; I is an information
model of IoT system; R is a risks model of IoT system; C is a connectivity model; F is a model of
information interpretation in IoT system.</p>
        <p>A fragment of IoT security ontology is depicted in Figure 2. The notions of security and privacy
by default and security and privacy by design naturally emerge as being foundation cornerstones of
IoT security. Evidently, it is challenging to apply these concepts in several different environments
that will have particular characteristics. In IoT the cyber risk is context-dependent (i.e. based on the
application scenario) and in this respect the principles of security and privacy by design should be
applied with this consideration in mind. Following relevant initiatives from other, more mature IT
sectors can prove to be beneficial in adopting such principles for the IoT ecosystem.
Establishing correspondence between the formal description of the subject area and the means of
IoT allows applying a knowledge-oriented approach to the development of IoT. The proposed
approach ensures the formation of a repository and the convergence of IoT tools to solve the target
problems of IoT security management through the composition of the stages of ontological analysis
of requirements, functional decomposition, subject interpretation and physical implementation.
The use of the proposed model of the design process will allow providing a formalized synthesis of
IoT for the target subject area through the convergence of the necessary IoT components based on
knowledge models. Complex IoT systems have a multi-level structure, with the distribution of
system functions and services by levels in accordance with their purpose.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions</title>
      <p>The proposed ontological model of IoT security converge different aspects of safety in context of
components IoT architecture. The diversity, heterogeneity, complexity and spatial distribution of
IoT systems cause corresponding difficulties in building their security systems. The application of a
knowledge-oriented approach allows you to speed up the process of designing security tools for
IoT, taking into account the specifics of their field of application based on a generalized ontology.
The proposed framework defines the components of the IoT model as generalized classes that can
be detailed by specific scope concepts. Generalized ontological classes of architecture, processes,
information, and risks are used to represent the IoT ecosystem. Each of the generalized classes can
be specified by appropriate target subclasses and domain concepts. The developed framework can
be used when building a target IoT with appropriate security means.</p>
      <p>Declaration on Generative AI
While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <article-title>Management of Information Protection based on the Integrated Implementation of Decision Support Systems</article-title>
          , East.-
          <string-name>
            <surname>Eur</surname>
          </string-name>
          . J.
          <string-name>
            <surname>Enterp</surname>
          </string-name>
          . Technol., vol.
          <volume>5</volume>
          , no.
          <volume>9</volume>
          (
          <issue>89</issue>
          ),
          <year>2017</year>
          ,
          <fpage>36</fpage>
          -
          <lpage>41</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2017</year>
          .111081
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          , et al.,
          <article-title>Model and Methodology for the Formation of Adaptive Security Profiles for the Protection of Wireless Networks in the Face of Dynamic Cyber Threats</article-title>
          ,
          <source>in: Cyber Security and Data Protection</source>
          , vol.
          <volume>4042</volume>
          (
          <year>2025</year>
          )
          <fpage>17</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Kostiuk</surname>
          </string-name>
          , et al.,
          <source>Effectiveness of Information Security Control using Audit Logs, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3991</volume>
          ,
          <year>2025</year>
          ,
          <fpage>524</fpage>
          -
          <lpage>538</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>The</given-names>
            <surname>European Union Agency for Cybersecurity</surname>
          </string-name>
          ,
          <source>Baseline Security Recommendations for IoT</source>
          ,
          <year>2017</year>
          . https://www.enisa.europa.eu/publications/baseline-security
          <article-title>-recommendations-for-iot</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5] ISO/IEC 20924:
          <year>2024</year>
          .
          <article-title>Internet of Things (IoT) and</article-title>
          <string-name>
            <given-names>Digital</given-names>
            <surname>Twin-Vocabulary</surname>
          </string-name>
          ,
          <year>2024</year>
          . https://www.iso.org/standard/88799.html
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>ITU-T</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          <year>2060</year>
          :
          <article-title>Overview of the Internet of Things</article-title>
          ,
          <source>Technical Report</source>
          , International Telecommunication Union,
          <year>2012</year>
          . https://www.itu.int/rec/T-REC-Y.
          <year>2060</year>
          -201206-I
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kovalenko</surname>
          </string-name>
          ,
          <source>Knowledge Driven Cyber-Convergent Systems based on Situational Agents, in: 2022 IEEE 17th Int. Conf. on Computer Sciences and Information Technologies (CSIT)</source>
          ,
          <year>2022</year>
          ,
          <fpage>243</fpage>
          -
          <lpage>246</lpage>
          . doi:
          <volume>10</volume>
          .1109/CSIT56902.
          <year>2022</year>
          .10000762
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Alotaibi</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          <article-title>Survey on Industrial Internet of Things Security: Requirements, Attacks, AIBased Solutions,</article-title>
          and Edge Computing Opportunities, Sensors,
          <volume>23</volume>
          (
          <year>2023</year>
          )
          <article-title>7470</article-title>
          . https://doi.org/10.3390/s23177470
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Mullet</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Sondi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Ramat</surname>
          </string-name>
          ,
          <article-title>A Review of Cybersecurity Guidelines for Manufacturing Factories in Industry 4.0</article-title>
          , in: IEEE Access,
          <volume>9</volume>
          (
          <year>2021</year>
          )
          <fpage>23235</fpage>
          -
          <lpage>23263</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2021</year>
          .3056650
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Williams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. K.</given-names>
             
            <surname>Dutta</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
           Daoud,
          <string-name>
            <given-names>M.</given-names>
             
            <surname>Bayoumi</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          <article-title>Survey on Security in Internet of Things with a Focus on the Impact of Emerging Technologies</article-title>
          ,
          <source>Internet of Things</source>
          ,
          <volume>19</volume>
          (
          <year>2022</year>
          )
          <article-title>100564</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.iot.
          <year>2022</year>
          .100564
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>G.</given-names>
            <surname> Ogunniye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
             
            <surname>Kökciyan</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          <article-title>Survey on Understanding and Representing Privacy Requirements in the Internet-of-</article-title>
          <string-name>
            <surname>Things</surname>
          </string-name>
          ,
          <source>J. Artificial Intelligence Res</source>
          .
          <volume>76</volume>
          (
          <year>2023</year>
          )
          <fpage>163</fpage>
          -
          <lpage>192</lpage>
          . https://jair.org/index.php/jair/article/view/14000
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Souag</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mazo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Salinesi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          <article-title>Comyn-Wattiau, Using the AMAN-DA Method to Generate Security Requirements: A Case Study in the Maritime Domain</article-title>
          , Requirements Eng.
          <volume>23</volume>
          (
          <issue>4</issue>
          ) (
          <year>2018</year>
          )
          <fpage>557</fpage>
          -
          <lpage>580</lpage>
          . doi:
          <volume>10</volume>
          .1007/s00766-017-0279-5
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J. S.</given-names>
             
            <surname>Rueda-Rueda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M. T.</given-names>
            <surname>Portocarrero</surname>
          </string-name>
          ,
          <article-title>Framework-based Security Measures for Internet of Thing: A literature Review, Open Comput</article-title>
          . Sci.,
          <volume>11</volume>
          (
          <issue>1</issue>
          ) (
          <year>2021</year>
          )
          <fpage>346</fpage>
          -
          <lpage>354</lpage>
          . doi:
          <volume>10</volume>
          .1515/comp-2020
          <source>- 0220</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kovalenko</surname>
          </string-name>
          , T. Kovalenko,
          <article-title>Knowledge Model and Ontology for Security Services</article-title>
          ,
          <source>in: IEEE 1st Int. Conf. on System Analysis &amp; Intelligent Computing (SAIC)</source>
          ,
          <year>2018</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/SAIC.
          <year>2018</year>
          .8516875
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B. A.</given-names>
            <surname>Mozzaquatro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Melo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Agostinho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Jardim-Goncalves</surname>
          </string-name>
          ,
          <article-title>An Ontology-based Security Framework for Decision-Making in Industrial Systems</article-title>
          ,
          <source>in: 4th Int. Conf. on Model-Driven Engineering and Software Development (MODELSWARD)</source>
          ,
          <year>2016</year>
          ,
          <fpage>779</fpage>
          -
          <lpage>788</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Souag</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Salinesi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Mazo</surname>
          </string-name>
          ,
          <string-name>
            <surname>I.</surname>
          </string-name>
          <article-title>Comyn-Wattiau, A Security Ontology for Security Requirements Elicitation</article-title>
          ,
          <source>in: Engineering Secure Software and Systems (ESSoS)</source>
          ,
          <year>2015</year>
          ,
          <fpage>157</fpage>
          -
          <lpage>177</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -15618-7_
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>S.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , et al.,
          <article-title>Multi-Source Knowledge Reasoning for Data-Driven IoT Security</article-title>
          , Sensors,
          <volume>21</volume>
          (
          <year>2021</year>
          )
          <article-title>7579</article-title>
          . doi:
          <volume>10</volume>
          .3390/s21227579
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18] ISO/IEC 30141:
          <year>2024</year>
          <article-title>Internet of Things (IoT)-</article-title>
          Reference
          <string-name>
            <surname>Architecture</surname>
          </string-name>
          ,
          <year>2024</year>
          . https://www.iso.org/standard/88800.html
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V.</given-names>
            <surname>Dudykevych</surname>
          </string-name>
          , et al.,
          <article-title>Platform for the Security of Cyber-Physical Systems and the IoT in the Intellectualization of Society, in: Cybersecurity Providing in Information and Telecommunication Systems</article-title>
          , CPITS, vol.
          <volume>3654</volume>
          (
          <year>2024</year>
          )
          <fpage>449</fpage>
          -
          <lpage>457</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhurakovskyi</surname>
          </string-name>
          , et al.,
          <source>Secured Remote Update Protocol in IoT Data Exchange System, in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>67</fpage>
          -
          <lpage>76</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>O.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et al.,
          <article-title>Methods of the Objects Identification and Recognition Research in the Networks with the IoT Concept Support</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>277</fpage>
          -
          <lpage>282</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          , et al.,
          <article-title>Method for Increasing the Various Sources Data Consistency for IoT Sensors</article-title>
          ,
          <source>in: IEEE 9th Int. Conf. on Problems of Infocommunications, Science and Technology (PICST)</source>
          (
          <year>2023</year>
          )
          <fpage>522</fpage>
          -
          <lpage>526</lpage>
          . doi:
          <volume>10</volume>
          .1109/PICST57299.
          <year>2022</year>
          .10238518
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23] ISO/IEC 27005:
          <year>2022</year>
          . Information Security,
          <source>Cybersecurity and Privacy Protection-Guidance on Managing Information Security Risks</source>
          ,
          <year>2022</year>
          . https://www.iso.org/standard/80585.html
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>