Alert button
Picture for Giampaolo Bella

Giampaolo Bella

Alert button

A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology

Add code
Bookmark button
Alert button
Jun 30, 2023
Giampaolo Bella, Gianpietro Castiglione, Daniele Francesco Santamaria

Figure 1 for A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology
Figure 2 for A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology
Figure 3 for A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology
Figure 4 for A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology
Viaarxiv icon

An automated method for the ontological representation of security directives

Add code
Bookmark button
Alert button
Jun 30, 2023
Giampaolo Bella, Gianpietro Castiglione, Daniele Francesco Santamaria

Figure 1 for An automated method for the ontological representation of security directives
Figure 2 for An automated method for the ontological representation of security directives
Figure 3 for An automated method for the ontological representation of security directives
Figure 4 for An automated method for the ontological representation of security directives
Viaarxiv icon

Towards Grammatical Tagging for the Legal Language of Cybersecurity

Add code
Bookmark button
Alert button
Jun 29, 2023
Gianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria

Figure 1 for Towards Grammatical Tagging for the Legal Language of Cybersecurity
Figure 2 for Towards Grammatical Tagging for the Legal Language of Cybersecurity
Figure 3 for Towards Grammatical Tagging for the Legal Language of Cybersecurity
Figure 4 for Towards Grammatical Tagging for the Legal Language of Cybersecurity
Viaarxiv icon

The Ontology for Agents, Systems and Integration of Services: OASIS version 2

Add code
Bookmark button
Alert button
Jun 14, 2023
Giampaolo Bella, Domenico Cantone, Carmelo Fabio Longo, Marianna Nicolosi-Asmundo, Daniele Francesco Santamaria

Figure 1 for The Ontology for Agents, Systems and Integration of Services: OASIS version 2
Figure 2 for The Ontology for Agents, Systems and Integration of Services: OASIS version 2
Figure 3 for The Ontology for Agents, Systems and Integration of Services: OASIS version 2
Figure 4 for The Ontology for Agents, Systems and Integration of Services: OASIS version 2
Viaarxiv icon

Secure Routine: A Routine-Based Algorithm for Drivers Identification

Add code
Bookmark button
Alert button
Dec 12, 2021
Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Giuseppe Patanè, Giampaolo Bella

Figure 1 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Figure 2 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Figure 3 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Figure 4 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Viaarxiv icon

Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)

Add code
Bookmark button
Alert button
Sep 18, 2021
Giampaolo Bella, Domenico Cantone, Cristiano Longo, Marianna Nicolosi-Asmundo, Daniele Francesco Santamaria

Figure 1 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Figure 2 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Figure 3 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Figure 4 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Viaarxiv icon

Soft Constraint Programming to Analysing Security Protocols

Add code
Bookmark button
Alert button
Dec 14, 2003
Giampaolo Bella, Stefano Bistarelli

Figure 1 for Soft Constraint Programming to Analysing Security Protocols
Figure 2 for Soft Constraint Programming to Analysing Security Protocols
Figure 3 for Soft Constraint Programming to Analysing Security Protocols
Figure 4 for Soft Constraint Programming to Analysing Security Protocols
Viaarxiv icon