Brockmans, S., Volz, R., Eberhart, A., and L
¨
offler, P.
(2004). Visual modeling of OWL DL ontologies us-
ing UML. In International Semantic Web Confer-
ence, pages 198–213. Springer. doi:10.1007/978-3-
540-30475-3 15.
Choi, C. and Choi, J. (2019). Ontology-based se-
curity context reasoning for power IoT-cloud se-
curity service. IEEE Access, 7:110510–110517.
doi:10.1109/ACCESS.2019.2933859.
Daffron, J., Ruffle, S., Coburn, A., Copic, J.,
Quantrill, K., Strong, K., and Leverett, E.
(2019). Shen attack: Cyber risk in asia pa-
cific ports. https://www.lloyds.com/
∼
/media/
files/news-and-insight/risk-insight/2019/shen-
attack/cyrim shenattack finalreport.pdf.
Edwards, C. (2009). Resilient nation. Demos. https://www.
continuitycentral.com/ResilientNation.pdf.
Ekelhart, A., Fenz, S., Klemen, M. D., and Weippl, E. R.
(2006). Security ontology: Simulating threats to cor-
porate assets. In International Conference on Infor-
mation Systems Security, pages 249–259. Springer.
doi:10.1007/11961635 17.
Elfers, C. (2014). Event Correlation Using Conditional
Exponential Models with Tolerant Pattern Matching
Applied to Incident Detection. Shaker. https://www.
shaker.de/shop/978-3-8440-3168-3.
Fenz, S., Goluch, G., Ekelhart, A., Riedl, B., and Weippl,
E. (2007). Information security fortification by on-
tological mapping of the iso/iec 27001 standard. In
13th Pacific Rim International Symposium on De-
pendable Computing (PRDC 2007), pages 381–388.
IEEE. doi:10.1109/PRDC.2007.29.
Fuentes, F. and Kar, D. C. (2005). Ethereal vs. tcpdump: a
comparative study on packet sniffing tools for educa-
tional purpose. Journal of Computing Sciences in Col-
leges, 20(4):169–176. https://dl.acm.org/doi/10.5555/
1047846.1047873.
He, Y., Chen, W., Yang, M., and Peng, W. (2004).
Ontology based cooperative intrusion detection sys-
tem. In IFIP International Conference on Network
and Parallel Computing, pages 419–426. Springer.
doi:10.1007/978-3-540-30141-7 59.
HermiT (2013). HermiT OWL Reasoner. http://www.
hermit-reasoner.com.
Hitzler, P., Kr
¨
otzsch, M., Rudolph, S., and Sure, Y.
(2008). Semantic Web: Grundlagen. Springer.
doi:10.1007/978-3-540-33994-6.
Hopcraft, R. and Martin, K. M. (2018). Effective maritime
cybersecurity regulation–the case for a cyber code.
Journal of the Indian Ocean Region, 14(3):354–366.
doi:10.1080/19480881.2018.1519056.
Hosseini, S., Barker, K., and Ramirez-Marquez, J. E.
(2016). A review of definitions and measures of
system resilience. Reliability Engineering & System
Safety, 145:47–61. doi:10.1016/j.ress.2015.08.006.
ICS (2020). Shipping and world trade. https://www.ics-
shipping.org/shipping-facts/shipping-and-world-
trade.
LA (2019). Port of Los Angeles issues request
for proposal for new cyber resilience cen-
ter. https://www.portoflosangeles.org/references/
news 072419 rfp cyber resilience center.
Musen, M. A. (2015). The Prot
´
eg
´
e project: A look
back and a look forward. AI Matters, 1(4):4–12.
doi:10.1145/2757001.2757003.
Narayanan, S. N., Ganesan, A., Joshi, K., Oates, T., Joshi,
A., and Finin, T. (2018). Early detection of cy-
bersecurity threats using collaborative cognition. In
2018 IEEE 4th International Conference on Collabo-
ration and Internet Computing (CIC), pages 354–363.
doi:10.1109/CIC.2018.00054.
Petrenko, S. A. and Makoveichuk, K. A. (2017). Ontology
of cyber security of self-recovering smart grid. In Se-
cure Information Technologies (BIT 2017), pages 98–
106. http://ceur-ws.org/Vol-2081/paper21.pdf.
Pinkston, J., Undercoffer, J., Joshi, A., and Finin, T. (2003).
A target-centric ontology for intrusion detection. In
Workshop on Ontologies in Distributed Systems, held
at The 18th International Joint Conference on Ar-
tificial Intelligence. https://ebiquity.umbc.edu/get/a/
publication/626.pdf.
Rotterdam (2016). Port of Rotterdam appoints port cyber
resilience officer. https://www.portofrotterdam.
com/en/news-and-press-releases/port-of-rotterdam-
appoints-port-cyber-resilience-officer.
Senarak, C. (2020). Port cybersecurity and threat: A
structural model for prevention and policy develop-
ment. The Asian Journal of Shipping and Logistics.
doi:10.1016/j.ajsl.2020.05.001.
Sep
´
ulveda Estay, D. A. (2020). CyberShip Project: Cyber
resilience for the shipping industry - Final Project Re-
port. DTU Orbit. https://orbit.dtu.dk/files/216595381/
200630 Report WP 5.pdf.
Staab, S. and Studer, R. (2009). Handbook on Ontologies.
Springer. doi:10.1007/978-3-540-92673-3.
Syed, Z., Padia, A., Finin, T., Mathews, L., and Joshi,
A. (2016). UCO: A unified cybersecurity ontology.
In Proceedings of the AAAI Workshop on Artificial
Intelligence for Cyber Security. AAAI Press. http:
//ebiquity.umbc.edu/get/a/publication/781.pdf.
V
¨
alja, M., Heiding, F., Franke, U., and Lagerstr
¨
om,
R. (2020). Automating threat modeling us-
ing an ontology framework: Validated with data
from critical infrastructures. Cybersecurity, 3(19).
doi:10.1186/s42400-020-00060-8.
Visser, J. (2020). An OODA-driven SOC Strat-
egy using: SIEM, SOAR and EDR. http:
//correlatedsecurity.com/an-ooda-driven-soc-
strategy-using-siem-soar-edr.
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
466