as management, risk, or threats. In (LeClair et al.,
2019; LeClair et al., 2020), we find several ontology
modularization techniques. The dimensionalities in-
troduced in this paper could play a significant role in
support of methods such as the view traversal modu-
larization technique. ontology metrics of prot
´
eg
´
e edi-
tor are considered. Our future work aims at exploring
further enrichment of the current ontologies with con-
cepts and relationship extracted from other sources
such as ISO standards, wiki-data, and several other
corpuses. Our objective is to have the most current
and complete IS ontology.
We plan to use other ontology evaluation metrics
like precision, recall and f-measure to more evalu-
ate the performance of our ontology generation ap-
proach. Furthermore, we aim to use the proposed
ontology combined with DIS formalism (Marinache
et al., 2021) in analysing security-log data to learn
about the security situation surrounding the system
under consideration.
ACKNOWLEDGMENT
This study was funded by Natural Sciences and Engi-
neering Research Council of Canada –NSERC– (CA)
(RGPIN-2020-06859).
REFERENCES
Alanen, J., Linnosmaa, J., Malm, T., Papakonstantinou, N.,
Ahonen, T., Heikkil
¨
a, E., and Tiusanen, R. (2022).
Hybrid ontology for safety, security, and dependabil-
ity risk assessments and security threat analysis (sta)
method for industrial control systems. Reliability En-
gineering & System Safety, 220:108270.
Bikakis, N., Tsinaraki, C., Gioldasis, N., Stavrakantonakis,
I., and Christodoulakis, S. (2013). The xml and se-
mantic web worlds: technologies, interoperability and
integration: a survey of the state of the art. In Se-
mantic hyper/multimedia adaptation, pages 319–360.
Springer.
BRAY, T. (2000). Extensible markup language (xml) 1.0 ,
w3c rec-xml. http://www. w3. org/TR/REC-xml/.
Center, C. S. R. (2022). Glossary. https://csrc.nist.gov/
glossary/.
de Franco Rosa, F., Jino, M., and Bonacin, R. (2018). To-
wards an ontology of security assessment: A core
model proposal. In Information Technology-New Gen-
erations, pages 75–80. Springer.
Elnagar, S., Yoon, V., and Thomas, M. (2020). An auto-
matic ontology generation framework with an orga-
nizational perspective. In Proceedings of the 53rd
Hawaii International Conference on System Sciences.
Fenz, S. and Ekelhart, A. (2009). Formalizing information
security knowledge. In Proceedings of the 4th inter-
national Symposium on information, Computer, and
Communications Security, pages 183–194.
Harjito, B., Cahyani, D. E., and Doewes, A. (2018). An au-
tomatic approach for bilingual tuberculosis ontology
based on ontology design patterns (odps). TELKOM-
NIKA Telecommunication Computing Electronics and
Control, 16(1):282–289.
Herzog, A., Shahmehri, N., and Duma, C. (2007). An ontol-
ogy of information security. International Journal of
Information Security and Privacy (IJISP), 1(4):1–23.
ISO Central Secretary (2018). Information technology —
security techniques — information security manage-
ment systems — overview and vocabulary. Standard
ISO/IEC 27000:2018, ISO, Geneva, CH.
Jones, A. and Ashenden, D. (2005). Risk management for
computer security: Protecting your network and in-
formation assets. Elsevier.
Jouini, M., Ben Arfa Rabai, L., and Khedri, R. (2021).
A quantitative assessment of security risks based on
a multifaceted classification approach. International
Journal of Information Security, 20(4):493–510.
LeClair, A., Khedri, R., and Marinache, A. (2019). Toward
measuring knowledge loss due to ontology modular-
ization. In Dietz, J., Aveiro, D., and Filipe, J., ed-
itors, In Proceedings of the 11th International Joint
Conference on Knowledge Discovery, Knowledge En-
gineering and Knowledge Management (IC3K 2019),
volume 2 of IC3K, pages 174–184, Vienna, Austria.
SCITEPRESS Science and Technology Publications,
Lda.
LeClair, A., Khedri, R., and Marinache, A. (2020). Formal-
izing graphical modularization approaches for ontolo-
gies and the knowledge loss. In Knowledge Discov-
ery, Knowledge Engineering and Knowledge Manage-
ment, volume 1297 of Communications in Computer
and Information Science series, chapter 18, pages 1–
25. Springer.
LeClair, A., Marinache, A., Ghalayini, H. E., MacCaull, W.,
and Khedri, R. (2022). A review on ontology modu-
larization techniques - a multi-dimensional perspec-
tive. Transactions on Knowledge and Data Engineer-
ing, pages 1–28.
Li, T. and Chen, Z. (2020). An ontology-based learning ap-
proach for automatically classifying security require-
ments. Journal of Systems and Software, page 110566.
Lozano, J., Carbonera, J., Abel, M., and Pimenta, M.
(2014). Ontology view extraction: an approach based
on ontological meta-properties. In 26th International
Conference on Tools with Artificial Intelligence, pages
122–129. IEEE.
Marinache, A., Khedri, R., Leclair, A., and MacCaull, W.
(2021). DIS: A data-centred knowledge representa-
tion formalism. In IEEE International Conference on
Reconciling Data Analytics, Automation, Privacy, and
Security (RDAAPS), pages 1–8, Hamilton, Ontario,
Canada. IEEE Computer Society.
Martins, B. F., Serrano, L., Reyes, J. F., Panach, J. I., Pastor,
O., and Rochwerger, B. (2020). Conceptual character-
ization of cybersecurity ontologies. In IFIP Working
An OWL Multi-Dimensional Information Security Ontology
379