Picture for Giampaolo Bella

Giampaolo Bella

A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology

Add code
Jun 30, 2023
Figure 1 for A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology
Figure 2 for A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology
Figure 3 for A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology
Figure 4 for A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology
Viaarxiv icon

An automated method for the ontological representation of security directives

Add code
Jun 30, 2023
Figure 1 for An automated method for the ontological representation of security directives
Figure 2 for An automated method for the ontological representation of security directives
Figure 3 for An automated method for the ontological representation of security directives
Figure 4 for An automated method for the ontological representation of security directives
Viaarxiv icon

Towards Grammatical Tagging for the Legal Language of Cybersecurity

Add code
Jun 29, 2023
Figure 1 for Towards Grammatical Tagging for the Legal Language of Cybersecurity
Figure 2 for Towards Grammatical Tagging for the Legal Language of Cybersecurity
Figure 3 for Towards Grammatical Tagging for the Legal Language of Cybersecurity
Figure 4 for Towards Grammatical Tagging for the Legal Language of Cybersecurity
Viaarxiv icon

The Ontology for Agents, Systems and Integration of Services: OASIS version 2

Add code
Jun 14, 2023
Figure 1 for The Ontology for Agents, Systems and Integration of Services: OASIS version 2
Figure 2 for The Ontology for Agents, Systems and Integration of Services: OASIS version 2
Figure 3 for The Ontology for Agents, Systems and Integration of Services: OASIS version 2
Figure 4 for The Ontology for Agents, Systems and Integration of Services: OASIS version 2
Viaarxiv icon

Secure Routine: A Routine-Based Algorithm for Drivers Identification

Add code
Dec 12, 2021
Figure 1 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Figure 2 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Figure 3 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Figure 4 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Viaarxiv icon

Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)

Add code
Sep 18, 2021
Figure 1 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Figure 2 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Figure 3 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Figure 4 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Viaarxiv icon

Soft Constraint Programming to Analysing Security Protocols

Add code
Dec 14, 2003
Figure 1 for Soft Constraint Programming to Analysing Security Protocols
Figure 2 for Soft Constraint Programming to Analysing Security Protocols
Figure 3 for Soft Constraint Programming to Analysing Security Protocols
Figure 4 for Soft Constraint Programming to Analysing Security Protocols
Viaarxiv icon