A SAT-based autonomous strategy for security vulnerability management, 2014 IEEE Network Operations and Management Symposium (NOMS), 2014. ,
DOI : 10.1109/NOMS.2014.6838309
Vulnerability Assessment in Autonomic Networks and Services: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.2, pp.988-1004, 2014. ,
DOI : 10.1109/SURV.2013.082713.00154
Towards machine-assisted formal procedures for the collection of digital evidence, 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp.32-35, 2011. ,
DOI : 10.1109/PST.2011.5971960
Autonomic Knowledge Discovery for Security Vulnerability Prevention in Self-governing Systems, 2015. ,
PACTOLE: A Methodology and a System for Semi-automatically Enriching an Ontology from a Collection of Texts, Proceedings of the 16th international conference on Conceptual Structures: Knowledge Visualization and Reasoning, pp.203-216, 2008. ,
DOI : 10.1007/978-3-540-70596-3_14
URL : https://hal.archives-ouvertes.fr/inria-00315530
A semantic approach to concept lattice-based information retrieval, Annals of Mathematics and Artificial Intelligence, vol.40, issue.1, pp.1-27, 2014. ,
DOI : 10.1007/s10472-014-9403-0
URL : https://hal.archives-ouvertes.fr/hal-01095859
A dichotomic search algorithm for mining and learning in domain-specific logics, Fundam. Inform, vol.66, issue.12, pp.1-32, 2005. ,
A Logical Generalization of Formal Concept Analysis, LNCS, vol.1867, pp.357-370, 2000. ,
Formal Concept Analysis: Mathematical Foundations, 1999. ,
Bridging the gap between software architecture rationale formalisms and actual architecture documents: An ontology-driven approach, Science of Computer Programming, vol.77, issue.1, pp.66-80, 2012. ,
DOI : 10.1016/j.scico.2010.06.009
Introduction to Information Retrieval, 2008. ,
DOI : 10.1017/CBO9780511809071
BR-Explorer: A sound and complete FCA-based retrieval algorithm (Poster), ICFCA, 2006. ,
URL : https://hal.archives-ouvertes.fr/inria-00103947
Mulval: A logic-based network security analyzer, Proceedings of the 14th Conference on USENIX Security Symposium SSYM'05, pp.8-8, 2005. ,
Formal concept analysis in knowledge processing: A survey on applications, Expert Systems with Applications, vol.40, issue.16, pp.6538-6560, 2013. ,
DOI : 10.1016/j.eswa.2013.05.009
Standardizing Cyber Threat Intelligence Information with the Structured Threat Information eXpression (STIX) Technical report, The MITRE Corporation, 2013. ,
A survey on how description logic ontologies benefit from formal concept analysis. CoRR, abs, 1107. ,
Handbook on Ontologies, 2009. ,
A conceptual-kdd approach and its application to cultural heritage, Concept Lattices and their Applications, pp.163-174, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-00880002
Formal Concept Analysis, Handbook on Ontologies, pp.177-199, 2009. ,
DOI : 10.1007/978-3-540-92673-3_8
URL : https://hal.archives-ouvertes.fr/inria-00100665
Inference and Ontologies, Cyber Defense and Situational Awareness, Advances in Information Security, 2014. ,
DOI : 10.1007/978-3-319-11391-3_9