Matching Cybersecurity Ontologies on Internet of Everything through Coevolutionary Multiobjective Evolutionary Algorithm
Since Internet of Everything (IoE) makes all the connections that come online more relevant and valuable, they are subject to numerous security and privacy concerns. Cybersecurity ontology is a shared knowledge model for tackling the security information heterogeneity issue on IoE, which has been wi...
Saved in:
| Published in | Security and communication networks Vol. 2022; pp. 1 - 13 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
London
Hindawi
10.08.2022
John Wiley & Sons, Inc |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1939-0114 1939-0122 1939-0122 |
| DOI | 10.1155/2022/3572404 |
Cover
| Abstract | Since Internet of Everything (IoE) makes all the connections that come online more relevant and valuable, they are subject to numerous security and privacy concerns. Cybersecurity ontology is a shared knowledge model for tackling the security information heterogeneity issue on IoE, which has been widely used in the IoE domain. However, the existing CSOs are developed and maintained independently, yielding the CSO heterogeneity problem. To address this issue, we need to use the similarity measure (SM) to calculate two entities’ similarity value in two CSOs and, on this basis, determine the entity correspondences, i.e., CSO alignment. Usually, it is necessary to integrate various SMs to enhance the result’s correctness, but how to combine and tune these SMs to improve the alignment’s quality is still a challenge. To face this challenge, this work first models CSO matching problem as a Constrained Multiobjective Optimization Problem (CMOOP) and then proposes a Coevolutionary Multiobjective Evolutionary Algorithm (CE-MOEA) to effectively address it. In particular, CE-MOEA uses the multiobjective evolutionary paradigm to avoid the solutions’ bias improvement and introduces the coevolutionary mechanism to trade off Pareto Front’s (PF’s) diversity and convergence. The experiment uses Ontology Alignment Evaluation Initiative’s (OAEI’s) bibliographic track and conference track and five real CSO matching tasks to test CE-MOEA’s performance. Comparisons between OAEI’s participants and EA- and MOEA-based matching techniques show that CE-MOEA is able to effectively address various heterogeneous ontology matching problems and determine high-quality CSO alignments. |
|---|---|
| AbstractList | Since Internet of Everything (IoE) makes all the connections that come online more relevant and valuable, they are subject to numerous security and privacy concerns. Cybersecurity ontology is a shared knowledge model for tackling the security information heterogeneity issue on IoE, which has been widely used in the IoE domain. However, the existing CSOs are developed and maintained independently, yielding the CSO heterogeneity problem. To address this issue, we need to use the similarity measure (SM) to calculate two entities’ similarity value in two CSOs and, on this basis, determine the entity correspondences, i.e., CSO alignment. Usually, it is necessary to integrate various SMs to enhance the result’s correctness, but how to combine and tune these SMs to improve the alignment’s quality is still a challenge. To face this challenge, this work first models CSO matching problem as a Constrained Multiobjective Optimization Problem (CMOOP) and then proposes a Coevolutionary Multiobjective Evolutionary Algorithm (CE-MOEA) to effectively address it. In particular, CE-MOEA uses the multiobjective evolutionary paradigm to avoid the solutions’ bias improvement and introduces the coevolutionary mechanism to trade off Pareto Front’s (PF’s) diversity and convergence. The experiment uses Ontology Alignment Evaluation Initiative’s (OAEI’s) bibliographic track and conference track and five real CSO matching tasks to test CE-MOEA’s performance. Comparisons between OAEI’s participants and EA- and MOEA-based matching techniques show that CE-MOEA is able to effectively address various heterogeneous ontology matching problems and determine high-quality CSO alignments. |
| Author | Tan, Wenbin Xue, Xingsi |
| Author_xml | – sequence: 1 givenname: Xingsi orcidid: 0000-0002-3008-8782 surname: Xue fullname: Xue, Xingsi organization: Fujian Provincial Key Laboratory of Big Data Mining and ApplicationsFujian University of TechnologyFuzhouFujianChinafjut.edu.cn – sequence: 2 givenname: Wenbin surname: Tan fullname: Tan, Wenbin organization: School of Electrical and Power EngineeringTaiyuan University of TechnologyTaiyuanShanxiChinatyut.edu.cn |
| BookMark | eNqFkE9Lw0AQxRepYFu9-QECHjV2_yTd5FhK1UKLFz2HzWaSbEl362bTmm9vaoqIoJ5mYH5v5s0boYE2GhC6JviekDCcUEzphIWcBjg4Q0MSs9jHhNLBV0-CCzSq6w3GUxLwYIje18LJUunCm7cp2BpkY5VrvWftTGUKBbVntLfUDqwG55ncW-zBtu5T4kprmqL05gb2pmqcMlrY1ls3VdemG5BO7aETfJvNqsJ0B8rtJTrPRVXD1amO0evD4mX-5K-eH5fz2cqXjHHnx6mAiMVcpLnMcgycZCSTINI4YwJImNOQ4igLGGYymJIox9MMGJaRSIXMeczGyO_3Nnon2oOoqmRn1bbzkhCcHGNLjrElp9g6_qbnd9a8NVC7ZGMaqzuLCeU44GFEOe8o2lPSmrq2kCdSOXF80lmhqt9W3_0Q_ePktse7rDNxUH_TH09snPA |
| CitedBy_id | crossref_primary_10_1002_itl2_498 crossref_primary_10_4018_JGIM_329961 |
| Cites_doi | 10.1016/j.isatra.2022.05.034 10.4018/978-1-61520-893-7.ch015 10.1109/tevc.2018.2855411 10.1155/2021/4856265 10.1109/4235.996017 10.1109/tkde.2015.2475755 10.1109/tevc.2019.2896967 10.1145/1854099.1854121 10.1145/219717.219748 10.1109/jiot.2021.3092185 10.1109/CEC.2007.4424853 10.1109/TII.2021.3097131 10.1007/s00500-013-1165-9 10.1016/s0166-3615(99)00046-9 10.1016/j.swevo.2011.03.001 10.1109/COMPSACW.2013.124 10.1007/978-3-030-03359-0_4 10.5815/ijcnis.2019.10.04 10.1016/j.swevo.2018.08.017 10.1109/CEC.2014.6900544 10.1016/j.ins.2010.08.013 10.1109/IPDPSW.2017.26 10.1016/j.swevo.2019.03.007 10.1016/j.asoc.2021.107343 10.1002/int.20517 10.1016/s0165-0114(98)00061-x 10.1016/j.datak.2008.06.003 10.1109/mdm15561.2009 10.1016/j.seta.2022.102442 10.1109/tkde.2011.253 10.1016/j.amc.2006.07.105 10.1109/tevc.2007.892759 10.1109/tcyb.2018.2819208 10.1109/tevc.2020.3004012 10.1177/0165551514550142 10.1016/j.artint.2015.03.001 10.1007/s11227-013-0980-1 10.4018/jisp.2007100101 10.1145/3519298 10.1016/j.istr.2004.11.002 10.1111/exsy.12936 10.1007/s12204-013-1439-5 10.1109/access.2020.3047875 10.1007/978-3-319-93025-1_4 10.1049/trit.2019.0014 10.1016/j.ins.2013.06.052 |
| ContentType | Journal Article |
| Copyright | Copyright © 2022 Xingsi Xue and Wenbin Tan. Copyright © 2022 Xingsi Xue and Wenbin Tan. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| Copyright_xml | – notice: Copyright © 2022 Xingsi Xue and Wenbin Tan. – notice: Copyright © 2022 Xingsi Xue and Wenbin Tan. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0 |
| DBID | RHU RHW RHX AAYXX CITATION 7SC 7SP 8FD JQ2 L7M L~C L~D ADTOC UNPAY |
| DOI | 10.1155/2022/3572404 |
| DatabaseName | Hindawi Publishing Complete Hindawi Publishing Subscription Journals Hindawi Publishing Open Access CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | CrossRef Technology Research Database |
| Database_xml | – sequence: 1 dbid: RHX name: Hindawi Publishing Open Access url: http://www.hindawi.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1939-0122 |
| Editor | Tian, Youliang |
| Editor_xml | – sequence: 1 givenname: Youliang surname: Tian fullname: Tian, Youliang |
| EndPage | 13 |
| ExternalDocumentID | 10.1155/2022/3572404 10_1155_2022_3572404 |
| GrantInformation_xml | – fundername: Fujian University of Technology grantid: GY-Z17162 – fundername: National Natural Science Foundation of China grantid: 62172095 – fundername: Natural Science Foundation of Fujian Province grantid: 2020J01875; 2019J01771 |
| GroupedDBID | .4S .DC 05W 0R~ 123 1OC 3SF 4.4 52U 5DZ 66C 8-1 8UM AAESR AAFWJ AAJEY AAONW ACGFO ADBBV ADIZJ AENEX AFBPY AFKRA AJXKR ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATUGU AZVAB BCNDV BENPR BGLVJ BHBCM BNHUX BOGZA BRXPI CCPQU CS3 DR2 DU5 EBS EIS F1Z G-S GROUPED_DOAJ HCIFZ HZ~ IAO ICD ITC IX1 K7- LITHE MY. MY~ NNB O9- OIG OK1 P2P PIMPY RHU RHW RHX TH9 TUS W99 WBKPD XV2 24P AAMMB AAYXX ACCMX ADMLS AEFGJ AGXDD AIDQK AIDYY CITATION H13 PUEGO 7SC 7SP 8FD JQ2 L7M L~C L~D 31~ AAEVG AANHP AAZKR ACBWZ ACRPL ACXQS ACYXJ ADNMO ADTOC AEIMD AGQPQ AMBMR ASPBG AVWKF AZFZN BDRZF EJD FEDTE GODZA HVGLF LH4 LW6 ROL SUPJJ UNPAY |
| ID | FETCH-LOGICAL-c337t-9bae8397abfcdf0e71d1dceab9d3ae15f25208d4303c4618f06de30c8abacf793 |
| IEDL.DBID | RHX |
| ISSN | 1939-0114 1939-0122 |
| IngestDate | Sun Oct 26 04:02:44 EDT 2025 Fri Jul 25 20:52:34 EDT 2025 Wed Oct 01 02:26:10 EDT 2025 Thu Apr 24 23:07:42 EDT 2025 Sun Jun 02 18:53:17 EDT 2024 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | English |
| License | This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. https://creativecommons.org/licenses/by/4.0 cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c337t-9bae8397abfcdf0e71d1dceab9d3ae15f25208d4303c4618f06de30c8abacf793 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-3008-8782 |
| OpenAccessLink | https://dx.doi.org/10.1155/2022/3572404 |
| PQID | 2704758277 |
| PQPubID | 1046363 |
| PageCount | 13 |
| ParticipantIDs | unpaywall_primary_10_1155_2022_3572404 proquest_journals_2704758277 crossref_citationtrail_10_1155_2022_3572404 crossref_primary_10_1155_2022_3572404 hindawi_primary_10_1155_2022_3572404 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2022-08-10 |
| PublicationDateYYYYMMDD | 2022-08-10 |
| PublicationDate_xml | – month: 08 year: 2022 text: 2022-08-10 day: 10 |
| PublicationDecade | 2020 |
| PublicationPlace | London |
| PublicationPlace_xml | – name: London |
| PublicationTitle | Security and communication networks |
| PublicationYear | 2022 |
| Publisher | Hindawi John Wiley & Sons, Inc |
| Publisher_xml | – name: Hindawi – name: John Wiley & Sons, Inc |
| References | 44 45 46 47 C. J. Van Rijsberge (6) 1975 49 I. Vladimir (48) 1966; 10 W. Eddine Djeddi (56) 2015 50 51 52 53 10 S. Mirjalili (3) 2019 13 14 15 16 17 18 19 1 2 J. Martinez-Gil (11) 4 5 7 L. Youseff (43) 2008 8 9 E. Jiménez-Ruiz (55) 2017 20 21 22 23 V. Singh (33) 2019 24 25 26 27 28 29 P. Van Heerden (38) 2012 A.-L. Ginsca (12) 30 31 32 34 35 36 37 39 F. Massacci (41) 2011 40 42 B. Lima (54) 2020 |
| References_xml | – ident: 19 doi: 10.1016/j.isatra.2022.05.034 – ident: 13 doi: 10.4018/978-1-61520-893-7.ch015 – ident: 25 doi: 10.1109/tevc.2018.2855411 – ident: 17 doi: 10.1155/2021/4856265 – ident: 21 doi: 10.1109/4235.996017 – ident: 7 doi: 10.1109/tkde.2015.2475755 – start-page: 154 volume-title: Proceedings of 19th International Semantic Web Conference year: 2020 ident: 54 article-title: OAEI 2020 results for AML and AMLC – ident: 32 doi: 10.1109/tevc.2019.2896967 – ident: 42 doi: 10.1145/1854099.1854121 – ident: 49 doi: 10.1145/219717.219748 – ident: 53 doi: 10.1109/jiot.2021.3092185 – ident: 29 doi: 10.1109/CEC.2007.4424853 – ident: 1 doi: 10.1109/TII.2021.3097131 – ident: 20 doi: 10.1007/s00500-013-1165-9 – ident: 27 doi: 10.1016/s0166-3615(99)00046-9 – ident: 24 doi: 10.1016/j.swevo.2011.03.001 – ident: 40 doi: 10.1109/COMPSACW.2013.124 – start-page: 81 volume-title: Cloud Computing for Geospatial Big Data Analytics year: 2019 ident: 33 article-title: Cloud security ontology (cso) doi: 10.1007/978-3-030-03359-0_4 – ident: 45 doi: 10.5815/ijcnis.2019.10.04 – ident: 26 doi: 10.1016/j.swevo.2018.08.017 – ident: 18 doi: 10.1109/CEC.2014.6900544 – ident: 35 doi: 10.1016/j.ins.2010.08.013 – ident: 30 doi: 10.1109/IPDPSW.2017.26 – volume: 10 start-page: 707 year: 1966 ident: 48 article-title: Binary codes capable of correcting deletions, insertions, and reversals publication-title: Soviet Physics - Doklady – start-page: 311 volume-title: Proceedings of the 7th International Conference on Information-Warfare & Security (ICIW 2012) year: 2012 ident: 38 article-title: Classifying network attack scenarios using an ontology – ident: 16 doi: 10.1016/j.swevo.2019.03.007 – ident: 50 doi: 10.1016/j.asoc.2021.107343 – ident: 10 doi: 10.1002/int.20517 – start-page: 1 ident: 11 article-title: Optimizing ontology alignments by using genetic algorithms – ident: 51 doi: 10.1016/s0165-0114(98)00061-x – ident: 52 doi: 10.1016/j.datak.2008.06.003 – ident: 44 doi: 10.1109/mdm15561.2009 – ident: 34 doi: 10.1016/j.seta.2022.102442 – ident: 9 doi: 10.1109/tkde.2011.253 – ident: 28 doi: 10.1016/j.amc.2006.07.105 – ident: 22 doi: 10.1109/tevc.2007.892759 – ident: 31 doi: 10.1109/tcyb.2018.2819208 – start-page: 216 volume-title: Proceedings of 14th International Semantic Web Conference year: 2015 ident: 56 article-title: Xmap: results for oaei 2015 – ident: 8 doi: 10.1109/tevc.2020.3004012 – ident: 37 doi: 10.1177/0165551514550142 – start-page: 622 volume-title: International Conference on Advanced Information Systems Engineering year: 2011 ident: 41 article-title: An extended ontology for security requirements – ident: 14 doi: 10.1016/j.artint.2015.03.001 – ident: 46 doi: 10.1007/s11227-013-0980-1 – volume-title: Information Retrieval year: 1975 ident: 6 – ident: 47 doi: 10.4018/jisp.2007100101 – start-page: 1 volume-title: Grid Computing Environments Workshop year: 2008 ident: 43 article-title: Toward a unified ontology of cloud computing – ident: 36 doi: 10.1145/3519298 – start-page: 118 ident: 12 article-title: Using a genetic algorithm for optimizing the similarity aggregation step in the process of ontology alignment – ident: 2 doi: 10.1016/j.istr.2004.11.002 – ident: 23 doi: 10.1111/exsy.12936 – start-page: 1 volume-title: Proceedings of 16th International Semantic Web Conference year: 2017 ident: 55 article-title: Logmap family participation in the oaei 2017 – ident: 39 doi: 10.1007/s12204-013-1439-5 – ident: 15 doi: 10.1109/access.2020.3047875 – start-page: 43 volume-title: Evolutionary Algorithms and Neural Networks year: 2019 ident: 3 article-title: Genetic algorithm doi: 10.1007/978-3-319-93025-1_4 – ident: 5 doi: 10.1049/trit.2019.0014 – ident: 4 doi: 10.1016/j.ins.2013.06.052 |
| SSID | ssj0061474 |
| Score | 2.2539778 |
| Snippet | Since Internet of Everything (IoE) makes all the connections that come online more relevant and valuable, they are subject to numerous security and privacy... |
| SourceID | unpaywall proquest crossref hindawi |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1 |
| SubjectTerms | Alignment Cooperation Cybersecurity Efficiency Evolutionary algorithms Genetic algorithms Heterogeneity Internet Matching Multiple objective analysis Objectives Ontology Optimization Pareto optimization Similarity Similarity measures |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwED-NTgh4YONjomNDfhi8oHSJY8eteKqqTRPSNh6oNCSkyJ8MVpJqTRndX885cbYWaYB4S5Szk_gud_dz7N8B7DkrBIZVTz4Y24hhAIzUwCJUYbFJpU0Nz_zm5OOT7GjM3p_xszV41-6FMZ4ivpRm1jv3mPTqa-2tw7jO9me68HCd7qdcYCxivalx92A945iId2B9fPJh-Kn5j-xXASXs9pjSdtk75ytdrASk--GuK_nmg3kxlYsrOZkshZ7DDfjcPnSz4uSiN69UT1__xuf4n2-1CY9DSkqGjQ09gTVbPIVHS0SFz-DnMXpsP1dFRguFCWMoekdOi7r8LaJtUhakmV20FSkdOcBPZFHVTUIpIDIq7Y9g6PJyQeqtv6X61nhcbLB0bTj5UuINzr8_h_HhwcfRURRqNkQ6TUUVDZS0mHMJqZw2LrYiMYnRVqqBV33CHeU07huGkVOzLOm7ODM2jXVfKqkdOost6BRlYV8AERm2dVRSlinGNZOed0gh_GQ2S5lzXXjbKi7XgdDc19WY5DWw4Tz3Y5qHMe3C6xvpaUPkcYfcXtDRX8R2WgPJWz3mVMQM8RcVogtvbozmj_1s_6vgS3joT6OajXcHOtXl3O5iPlSpV8HufwFiPgdc priority: 102 providerName: Unpaywall |
| Title | Matching Cybersecurity Ontologies on Internet of Everything through Coevolutionary Multiobjective Evolutionary Algorithm |
| URI | https://dx.doi.org/10.1155/2022/3572404 https://www.proquest.com/docview/2704758277 https://downloads.hindawi.com/journals/scn/2022/3572404.pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 2022 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 issn: 1939-0122 databaseCode: ADMLS dateStart: 20110501 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVWIB databaseName: Wiley Online Library - Core collection (SURFmarket) issn: 1939-0122 databaseCode: DR2 dateStart: 20070101 customDbUrl: isFulltext: true eissn: 1939-0122 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0061474 providerName: Wiley-Blackwell – providerCode: PRVWIB databaseName: Wiley Online Library Open Access customDbUrl: eissn: 1939-0122 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0061474 issn: 1939-0122 databaseCode: 24P dateStart: 20170101 isFulltext: true titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html providerName: Wiley-Blackwell |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bT8IwFG4EY9QH4zWiSPqAvpjFXboVHgmBEBPQEEnwaWm3VjS4ERji_r2nWzGg8fK4rGdNdtp-52tPv4NQVQpKAVaV-KApDAIAaPC6AKpCzNBhwgldT11O7va8zoDcDt2hFkmafT_CB7RT9Ny-cVwK2EMKqFDzVOZWvzNcLrgAMFQfHqvUH4ss89u_2K4hz9ZIUd7F81pguT2PJixdsPF4BWPa-2hPB4e4kXvzAG2I6BDtrkgGHqH3LqydatcIN1MOoZsuP4fvoqwQLfBeHEc43-cTCY4lbsFgTZPMRBflwc1YvOkhx6Ypzi7hxvwlX_vAYOVdY_wUQwej12M0aLcemh1DV08wAsehiVHnTED0QxmXQShNQa3QCgPBeF05wXKl7dpmLSSAYQHxrJo0vVA4ZlBjnAUSpu0JKkZxJE4Rph7YSpvZxOPEDQhTCkAciCARnkOkLKHr5Z_1Ay0tripcjP2MYriur_zgaz-U0OVn60kuqfFDu6p20h_NyksP-nr-zXybmgSYkE1pCV19evXX75z9r7tztKMejUwVt4yKyXQuLiAuSXgFIvK-XcnGZgVtDnr3jccPpBrd4g |
| linkProvider | Hindawi Publishing |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwED-NTgh4YONjomNDfhi8oHSJY8eteKqqTRPSNh6oNCSkyJ8MVpJqTRndX885cbYWaYB4S5Szk_gud_dz7N8B7DkrBIZVTz4Y24hhAIzUwCJUYbFJpU0Nz_zm5OOT7GjM3p_xszV41-6FMZ4ivpRm1jv3mPTqa-2tw7jO9me68HCd7qdcYCxivalx92A945iId2B9fPJh-Kn5j-xXASXs9pjSdtk75ytdrASk--GuK_nmg3kxlYsrOZkshZ7DDfjcPnSz4uSiN69UT1__xuf4n2-1CY9DSkqGjQ09gTVbPIVHS0SFz-DnMXpsP1dFRguFCWMoekdOi7r8LaJtUhakmV20FSkdOcBPZFHVTUIpIDIq7Y9g6PJyQeqtv6X61nhcbLB0bTj5UuINzr8_h_HhwcfRURRqNkQ6TUUVDZS0mHMJqZw2LrYiMYnRVqqBV33CHeU07huGkVOzLOm7ODM2jXVfKqkdOost6BRlYV8AERm2dVRSlinGNZOed0gh_GQ2S5lzXXjbKi7XgdDc19WY5DWw4Tz3Y5qHMe3C6xvpaUPkcYfcXtDRX8R2WgPJWz3mVMQM8RcVogtvbozmj_1s_6vgS3joT6OajXcHOtXl3O5iPlSpV8HufwFiPgdc |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Matching+Cybersecurity+Ontologies+on+Internet+of+Everything+through+Coevolutionary+Multiobjective+Evolutionary+Algorithm&rft.jtitle=Security+and+communication+networks&rft.au=Xue%2C+Xingsi&rft.au=Tan%2C+Wenbin&rft.date=2022-08-10&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F3572404&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon |