M. Barrère, R. Badonnel, and O. Festor, A SAT-based autonomous strategy for security vulnerability management, 2014 IEEE Network Operations and Management Symposium (NOMS), 2014.
DOI : 10.1109/NOMS.2014.6838309

M. Barrère, R. Badonnel, and O. Festor, Vulnerability Assessment in Autonomic Networks and Services: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.2, pp.988-1004, 2014.
DOI : 10.1109/SURV.2013.082713.00154

M. Barrère, G. Betarte, and M. Rodríguez, Towards machine-assisted formal procedures for the collection of digital evidence, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.32-35, 2011.
DOI : 10.1109/PST.2011.5971960

M. Barrère, Autonomic Knowledge Discovery for Security Vulnerability Prevention in Self-governing Systems, 2015.

R. Bendaoud, Y. Toussaint, and A. Napoli, PACTOLE: A Methodology and a System for Semi-automatically Enriching an Ontology from a Collection of Texts, Proceedings of the 16th international conference on Conceptual Structures: Knowledge Visualization and Reasoning, pp.203-216, 2008.
DOI : 10.1007/978-3-540-70596-3_14

URL : https://hal.archives-ouvertes.fr/inria-00315530

V. Codocedo, I. Lykourentzou, and A. Napoli, A semantic approach to concept lattice-based information retrieval, Annals of Mathematics and Artificial Intelligence, vol.40, issue.1, pp.1-27, 2014.
DOI : 10.1007/s10472-014-9403-0

URL : https://hal.archives-ouvertes.fr/hal-01095859

S. Ferré and R. D. King, A dichotomic search algorithm for mining and learning in domain-specific logics, Fundam. Inform, vol.66, issue.12, pp.1-32, 2005.

S. Ferré and O. Ridoux, A Logical Generalization of Formal Concept Analysis, LNCS, vol.1867, pp.357-370, 2000.

B. Ganter and R. Wille, Formal Concept Analysis: Mathematical Foundations, 1999.

C. López, V. Codocedo, H. Astudillo, and L. M. Cysneiros, Bridging the gap between software architecture rationale formalisms and actual architecture documents: An ontology-driven approach, Science of Computer Programming, vol.77, issue.1, pp.66-80, 2012.
DOI : 10.1016/j.scico.2010.06.009

C. D. Manning, P. Raghavan, and H. Schtze, Introduction to Information Retrieval, 2008.
DOI : 10.1017/CBO9780511809071

N. Messai, M. Devignes, A. Napoli, and M. Sma¨?lsma¨?l-tabbone, BR-Explorer: A sound and complete FCA-based retrieval algorithm (Poster), ICFCA, 2006.
URL : https://hal.archives-ouvertes.fr/inria-00103947

X. Ou, S. Govindavajhala, and A. W. Appel, Mulval: A logic-based network security analyzer, Proceedings of the 14th Conference on USENIX Security Symposium SSYM'05, pp.8-8, 2005.

J. Poelmans, D. I. Ignatov, S. O. Kuznetsov, and G. Dedene, Formal concept analysis in knowledge processing: A survey on applications, Expert Systems with Applications, vol.40, issue.16, pp.6538-6560, 2013.
DOI : 10.1016/j.eswa.2013.05.009

S. Barnum, Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX) Technical report, The MITRE Corporation, 2013.

B. Sertkaya, A survey on how description logic ontologies benefit from formal concept analysis. CoRR, abs, 1107.

S. Staab and R. Studer, Handbook on Ontologies, 2009.

R. Stanley, H. Astudillo, V. Codocedo, and A. Napoli, A conceptual-kdd approach and its application to cultural heritage, Concept Lattices and their Applications, pp.163-174, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00880002

G. Stumme, Formal Concept Analysis, Handbook on Ontologies, pp.177-199, 2009.
DOI : 10.1007/978-3-540-92673-3_8

URL : https://hal.archives-ouvertes.fr/inria-00100665

B. E. Ulicny, J. J. Moskal, M. M. Kokar, K. Abe, and J. K. Smith, Inference and Ontologies, Cyber Defense and Situational Awareness, Advances in Information Security, 2014.
DOI : 10.1007/978-3-319-11391-3_9