Picture for Giampaolo Bella

Giampaolo Bella

An automated method for the ontological representation of security directives

Add code
Jun 30, 2023
Viaarxiv icon

A behaviouristic approach to representing processes and procedures in the OASIS 2 ontology

Add code
Jun 30, 2023
Viaarxiv icon

Towards Grammatical Tagging for the Legal Language of Cybersecurity

Add code
Jun 29, 2023
Viaarxiv icon

The Ontology for Agents, Systems and Integration of Services: OASIS version 2

Add code
Jun 14, 2023
Viaarxiv icon

Secure Routine: A Routine-Based Algorithm for Drivers Identification

Add code
Dec 12, 2021
Figure 1 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Figure 2 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Figure 3 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Figure 4 for Secure Routine: A Routine-Based Algorithm for Drivers Identification
Viaarxiv icon

Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)

Add code
Sep 18, 2021
Figure 1 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Figure 2 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Figure 3 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Figure 4 for Blockchains through ontologies: the case study of the Ethereum ERC721 standard in OASIS (Extended Version)
Viaarxiv icon

Soft Constraint Programming to Analysing Security Protocols

Add code
Dec 14, 2003
Figure 1 for Soft Constraint Programming to Analysing Security Protocols
Figure 2 for Soft Constraint Programming to Analysing Security Protocols
Figure 3 for Soft Constraint Programming to Analysing Security Protocols
Figure 4 for Soft Constraint Programming to Analysing Security Protocols
Viaarxiv icon