Matching Cybersecurity Ontologies on Internet of Everything through Coevolutionary Multiobjective Evolutionary Algorithm

Since Internet of Everything (IoE) makes all the connections that come online more relevant and valuable, they are subject to numerous security and privacy concerns. Cybersecurity ontology is a shared knowledge model for tackling the security information heterogeneity issue on IoE, which has been wi...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 2022; pp. 1 - 13
Main Authors Xue, Xingsi, Tan, Wenbin
Format Journal Article
LanguageEnglish
Published London Hindawi 10.08.2022
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1939-0114
1939-0122
1939-0122
DOI10.1155/2022/3572404

Cover

Abstract Since Internet of Everything (IoE) makes all the connections that come online more relevant and valuable, they are subject to numerous security and privacy concerns. Cybersecurity ontology is a shared knowledge model for tackling the security information heterogeneity issue on IoE, which has been widely used in the IoE domain. However, the existing CSOs are developed and maintained independently, yielding the CSO heterogeneity problem. To address this issue, we need to use the similarity measure (SM) to calculate two entities’ similarity value in two CSOs and, on this basis, determine the entity correspondences, i.e., CSO alignment. Usually, it is necessary to integrate various SMs to enhance the result’s correctness, but how to combine and tune these SMs to improve the alignment’s quality is still a challenge. To face this challenge, this work first models CSO matching problem as a Constrained Multiobjective Optimization Problem (CMOOP) and then proposes a Coevolutionary Multiobjective Evolutionary Algorithm (CE-MOEA) to effectively address it. In particular, CE-MOEA uses the multiobjective evolutionary paradigm to avoid the solutions’ bias improvement and introduces the coevolutionary mechanism to trade off Pareto Front’s (PF’s) diversity and convergence. The experiment uses Ontology Alignment Evaluation Initiative’s (OAEI’s) bibliographic track and conference track and five real CSO matching tasks to test CE-MOEA’s performance. Comparisons between OAEI’s participants and EA- and MOEA-based matching techniques show that CE-MOEA is able to effectively address various heterogeneous ontology matching problems and determine high-quality CSO alignments.
AbstractList Since Internet of Everything (IoE) makes all the connections that come online more relevant and valuable, they are subject to numerous security and privacy concerns. Cybersecurity ontology is a shared knowledge model for tackling the security information heterogeneity issue on IoE, which has been widely used in the IoE domain. However, the existing CSOs are developed and maintained independently, yielding the CSO heterogeneity problem. To address this issue, we need to use the similarity measure (SM) to calculate two entities’ similarity value in two CSOs and, on this basis, determine the entity correspondences, i.e., CSO alignment. Usually, it is necessary to integrate various SMs to enhance the result’s correctness, but how to combine and tune these SMs to improve the alignment’s quality is still a challenge. To face this challenge, this work first models CSO matching problem as a Constrained Multiobjective Optimization Problem (CMOOP) and then proposes a Coevolutionary Multiobjective Evolutionary Algorithm (CE-MOEA) to effectively address it. In particular, CE-MOEA uses the multiobjective evolutionary paradigm to avoid the solutions’ bias improvement and introduces the coevolutionary mechanism to trade off Pareto Front’s (PF’s) diversity and convergence. The experiment uses Ontology Alignment Evaluation Initiative’s (OAEI’s) bibliographic track and conference track and five real CSO matching tasks to test CE-MOEA’s performance. Comparisons between OAEI’s participants and EA- and MOEA-based matching techniques show that CE-MOEA is able to effectively address various heterogeneous ontology matching problems and determine high-quality CSO alignments.
Author Tan, Wenbin
Xue, Xingsi
Author_xml – sequence: 1
  givenname: Xingsi
  orcidid: 0000-0002-3008-8782
  surname: Xue
  fullname: Xue, Xingsi
  organization: Fujian Provincial Key Laboratory of Big Data Mining and ApplicationsFujian University of TechnologyFuzhouFujianChinafjut.edu.cn
– sequence: 2
  givenname: Wenbin
  surname: Tan
  fullname: Tan, Wenbin
  organization: School of Electrical and Power EngineeringTaiyuan University of TechnologyTaiyuanShanxiChinatyut.edu.cn
BookMark eNqFkE9Lw0AQxRepYFu9-QECHjV2_yTd5FhK1UKLFz2HzWaSbEl362bTmm9vaoqIoJ5mYH5v5s0boYE2GhC6JviekDCcUEzphIWcBjg4Q0MSs9jHhNLBV0-CCzSq6w3GUxLwYIje18LJUunCm7cp2BpkY5VrvWftTGUKBbVntLfUDqwG55ncW-zBtu5T4kprmqL05gb2pmqcMlrY1ls3VdemG5BO7aETfJvNqsJ0B8rtJTrPRVXD1amO0evD4mX-5K-eH5fz2cqXjHHnx6mAiMVcpLnMcgycZCSTINI4YwJImNOQ4igLGGYymJIox9MMGJaRSIXMeczGyO_3Nnon2oOoqmRn1bbzkhCcHGNLjrElp9g6_qbnd9a8NVC7ZGMaqzuLCeU44GFEOe8o2lPSmrq2kCdSOXF80lmhqt9W3_0Q_ePktse7rDNxUH_TH09snPA
CitedBy_id crossref_primary_10_1002_itl2_498
crossref_primary_10_4018_JGIM_329961
Cites_doi 10.1016/j.isatra.2022.05.034
10.4018/978-1-61520-893-7.ch015
10.1109/tevc.2018.2855411
10.1155/2021/4856265
10.1109/4235.996017
10.1109/tkde.2015.2475755
10.1109/tevc.2019.2896967
10.1145/1854099.1854121
10.1145/219717.219748
10.1109/jiot.2021.3092185
10.1109/CEC.2007.4424853
10.1109/TII.2021.3097131
10.1007/s00500-013-1165-9
10.1016/s0166-3615(99)00046-9
10.1016/j.swevo.2011.03.001
10.1109/COMPSACW.2013.124
10.1007/978-3-030-03359-0_4
10.5815/ijcnis.2019.10.04
10.1016/j.swevo.2018.08.017
10.1109/CEC.2014.6900544
10.1016/j.ins.2010.08.013
10.1109/IPDPSW.2017.26
10.1016/j.swevo.2019.03.007
10.1016/j.asoc.2021.107343
10.1002/int.20517
10.1016/s0165-0114(98)00061-x
10.1016/j.datak.2008.06.003
10.1109/mdm15561.2009
10.1016/j.seta.2022.102442
10.1109/tkde.2011.253
10.1016/j.amc.2006.07.105
10.1109/tevc.2007.892759
10.1109/tcyb.2018.2819208
10.1109/tevc.2020.3004012
10.1177/0165551514550142
10.1016/j.artint.2015.03.001
10.1007/s11227-013-0980-1
10.4018/jisp.2007100101
10.1145/3519298
10.1016/j.istr.2004.11.002
10.1111/exsy.12936
10.1007/s12204-013-1439-5
10.1109/access.2020.3047875
10.1007/978-3-319-93025-1_4
10.1049/trit.2019.0014
10.1016/j.ins.2013.06.052
ContentType Journal Article
Copyright Copyright © 2022 Xingsi Xue and Wenbin Tan.
Copyright © 2022 Xingsi Xue and Wenbin Tan. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
Copyright_xml – notice: Copyright © 2022 Xingsi Xue and Wenbin Tan.
– notice: Copyright © 2022 Xingsi Xue and Wenbin Tan. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ADTOC
UNPAY
DOI 10.1155/2022/3572404
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Unpaywall for CDI: Periodical Content
Unpaywall
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList
CrossRef
Technology Research Database
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: UNPAY
  name: Unpaywall
  url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1939-0122
Editor Tian, Youliang
Editor_xml – sequence: 1
  givenname: Youliang
  surname: Tian
  fullname: Tian, Youliang
EndPage 13
ExternalDocumentID 10.1155/2022/3572404
10_1155_2022_3572404
GrantInformation_xml – fundername: Fujian University of Technology
  grantid: GY-Z17162
– fundername: National Natural Science Foundation of China
  grantid: 62172095
– fundername: Natural Science Foundation of Fujian Province
  grantid: 2020J01875; 2019J01771
GroupedDBID .4S
.DC
05W
0R~
123
1OC
3SF
4.4
52U
5DZ
66C
8-1
8UM
AAESR
AAFWJ
AAJEY
AAONW
ACGFO
ADBBV
ADIZJ
AENEX
AFBPY
AFKRA
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ARAPS
ARCSS
ATUGU
AZVAB
BCNDV
BENPR
BGLVJ
BHBCM
BNHUX
BOGZA
BRXPI
CCPQU
CS3
DR2
DU5
EBS
EIS
F1Z
G-S
GROUPED_DOAJ
HCIFZ
HZ~
IAO
ICD
ITC
IX1
K7-
LITHE
MY.
MY~
NNB
O9-
OIG
OK1
P2P
PIMPY
RHU
RHW
RHX
TH9
TUS
W99
WBKPD
XV2
24P
AAMMB
AAYXX
ACCMX
ADMLS
AEFGJ
AGXDD
AIDQK
AIDYY
CITATION
H13
PUEGO
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
31~
AAEVG
AANHP
AAZKR
ACBWZ
ACRPL
ACXQS
ACYXJ
ADNMO
ADTOC
AEIMD
AGQPQ
AMBMR
ASPBG
AVWKF
AZFZN
BDRZF
EJD
FEDTE
GODZA
HVGLF
LH4
LW6
ROL
SUPJJ
UNPAY
ID FETCH-LOGICAL-c337t-9bae8397abfcdf0e71d1dceab9d3ae15f25208d4303c4618f06de30c8abacf793
IEDL.DBID RHX
ISSN 1939-0114
1939-0122
IngestDate Sun Oct 26 04:02:44 EDT 2025
Fri Jul 25 20:52:34 EDT 2025
Wed Oct 01 02:26:10 EDT 2025
Thu Apr 24 23:07:42 EDT 2025
Sun Jun 02 18:53:17 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
cc-by
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c337t-9bae8397abfcdf0e71d1dceab9d3ae15f25208d4303c4618f06de30c8abacf793
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-3008-8782
OpenAccessLink https://dx.doi.org/10.1155/2022/3572404
PQID 2704758277
PQPubID 1046363
PageCount 13
ParticipantIDs unpaywall_primary_10_1155_2022_3572404
proquest_journals_2704758277
crossref_citationtrail_10_1155_2022_3572404
crossref_primary_10_1155_2022_3572404
hindawi_primary_10_1155_2022_3572404
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-08-10
PublicationDateYYYYMMDD 2022-08-10
PublicationDate_xml – month: 08
  year: 2022
  text: 2022-08-10
  day: 10
PublicationDecade 2020
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Security and communication networks
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References 44
45
46
47
C. J. Van Rijsberge (6) 1975
49
I. Vladimir (48) 1966; 10
W. Eddine Djeddi (56) 2015
50
51
52
53
10
S. Mirjalili (3) 2019
13
14
15
16
17
18
19
1
2
J. Martinez-Gil (11)
4
5
7
L. Youseff (43) 2008
8
9
E. Jiménez-Ruiz (55) 2017
20
21
22
23
V. Singh (33) 2019
24
25
26
27
28
29
P. Van Heerden (38) 2012
A.-L. Ginsca (12)
30
31
32
34
35
36
37
39
F. Massacci (41) 2011
40
42
B. Lima (54) 2020
References_xml – ident: 19
  doi: 10.1016/j.isatra.2022.05.034
– ident: 13
  doi: 10.4018/978-1-61520-893-7.ch015
– ident: 25
  doi: 10.1109/tevc.2018.2855411
– ident: 17
  doi: 10.1155/2021/4856265
– ident: 21
  doi: 10.1109/4235.996017
– ident: 7
  doi: 10.1109/tkde.2015.2475755
– start-page: 154
  volume-title: Proceedings of 19th International Semantic Web Conference
  year: 2020
  ident: 54
  article-title: OAEI 2020 results for AML and AMLC
– ident: 32
  doi: 10.1109/tevc.2019.2896967
– ident: 42
  doi: 10.1145/1854099.1854121
– ident: 49
  doi: 10.1145/219717.219748
– ident: 53
  doi: 10.1109/jiot.2021.3092185
– ident: 29
  doi: 10.1109/CEC.2007.4424853
– ident: 1
  doi: 10.1109/TII.2021.3097131
– ident: 20
  doi: 10.1007/s00500-013-1165-9
– ident: 27
  doi: 10.1016/s0166-3615(99)00046-9
– ident: 24
  doi: 10.1016/j.swevo.2011.03.001
– ident: 40
  doi: 10.1109/COMPSACW.2013.124
– start-page: 81
  volume-title: Cloud Computing for Geospatial Big Data Analytics
  year: 2019
  ident: 33
  article-title: Cloud security ontology (cso)
  doi: 10.1007/978-3-030-03359-0_4
– ident: 45
  doi: 10.5815/ijcnis.2019.10.04
– ident: 26
  doi: 10.1016/j.swevo.2018.08.017
– ident: 18
  doi: 10.1109/CEC.2014.6900544
– ident: 35
  doi: 10.1016/j.ins.2010.08.013
– ident: 30
  doi: 10.1109/IPDPSW.2017.26
– volume: 10
  start-page: 707
  year: 1966
  ident: 48
  article-title: Binary codes capable of correcting deletions, insertions, and reversals
  publication-title: Soviet Physics - Doklady
– start-page: 311
  volume-title: Proceedings of the 7th International Conference on Information-Warfare & Security (ICIW 2012)
  year: 2012
  ident: 38
  article-title: Classifying network attack scenarios using an ontology
– ident: 16
  doi: 10.1016/j.swevo.2019.03.007
– ident: 50
  doi: 10.1016/j.asoc.2021.107343
– ident: 10
  doi: 10.1002/int.20517
– start-page: 1
  ident: 11
  article-title: Optimizing ontology alignments by using genetic algorithms
– ident: 51
  doi: 10.1016/s0165-0114(98)00061-x
– ident: 52
  doi: 10.1016/j.datak.2008.06.003
– ident: 44
  doi: 10.1109/mdm15561.2009
– ident: 34
  doi: 10.1016/j.seta.2022.102442
– ident: 9
  doi: 10.1109/tkde.2011.253
– ident: 28
  doi: 10.1016/j.amc.2006.07.105
– ident: 22
  doi: 10.1109/tevc.2007.892759
– ident: 31
  doi: 10.1109/tcyb.2018.2819208
– start-page: 216
  volume-title: Proceedings of 14th International Semantic Web Conference
  year: 2015
  ident: 56
  article-title: Xmap: results for oaei 2015
– ident: 8
  doi: 10.1109/tevc.2020.3004012
– ident: 37
  doi: 10.1177/0165551514550142
– start-page: 622
  volume-title: International Conference on Advanced Information Systems Engineering
  year: 2011
  ident: 41
  article-title: An extended ontology for security requirements
– ident: 14
  doi: 10.1016/j.artint.2015.03.001
– ident: 46
  doi: 10.1007/s11227-013-0980-1
– volume-title: Information Retrieval
  year: 1975
  ident: 6
– ident: 47
  doi: 10.4018/jisp.2007100101
– start-page: 1
  volume-title: Grid Computing Environments Workshop
  year: 2008
  ident: 43
  article-title: Toward a unified ontology of cloud computing
– ident: 36
  doi: 10.1145/3519298
– start-page: 118
  ident: 12
  article-title: Using a genetic algorithm for optimizing the similarity aggregation step in the process of ontology alignment
– ident: 2
  doi: 10.1016/j.istr.2004.11.002
– ident: 23
  doi: 10.1111/exsy.12936
– start-page: 1
  volume-title: Proceedings of 16th International Semantic Web Conference
  year: 2017
  ident: 55
  article-title: Logmap family participation in the oaei 2017
– ident: 39
  doi: 10.1007/s12204-013-1439-5
– ident: 15
  doi: 10.1109/access.2020.3047875
– start-page: 43
  volume-title: Evolutionary Algorithms and Neural Networks
  year: 2019
  ident: 3
  article-title: Genetic algorithm
  doi: 10.1007/978-3-319-93025-1_4
– ident: 5
  doi: 10.1049/trit.2019.0014
– ident: 4
  doi: 10.1016/j.ins.2013.06.052
SSID ssj0061474
Score 2.2539778
Snippet Since Internet of Everything (IoE) makes all the connections that come online more relevant and valuable, they are subject to numerous security and privacy...
SourceID unpaywall
proquest
crossref
hindawi
SourceType Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 1
SubjectTerms Alignment
Cooperation
Cybersecurity
Efficiency
Evolutionary algorithms
Genetic algorithms
Heterogeneity
Internet
Matching
Multiple objective analysis
Objectives
Ontology
Optimization
Pareto optimization
Similarity
Similarity measures
SummonAdditionalLinks – databaseName: Unpaywall
  dbid: UNPAY
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwED-NTgh4YONjomNDfhi8oHSJY8eteKqqTRPSNh6oNCSkyJ8MVpJqTRndX885cbYWaYB4S5Szk_gud_dz7N8B7DkrBIZVTz4Y24hhAIzUwCJUYbFJpU0Nz_zm5OOT7GjM3p_xszV41-6FMZ4ivpRm1jv3mPTqa-2tw7jO9me68HCd7qdcYCxivalx92A945iId2B9fPJh-Kn5j-xXASXs9pjSdtk75ytdrASk--GuK_nmg3kxlYsrOZkshZ7DDfjcPnSz4uSiN69UT1__xuf4n2-1CY9DSkqGjQ09gTVbPIVHS0SFz-DnMXpsP1dFRguFCWMoekdOi7r8LaJtUhakmV20FSkdOcBPZFHVTUIpIDIq7Y9g6PJyQeqtv6X61nhcbLB0bTj5UuINzr8_h_HhwcfRURRqNkQ6TUUVDZS0mHMJqZw2LrYiMYnRVqqBV33CHeU07huGkVOzLOm7ODM2jXVfKqkdOost6BRlYV8AERm2dVRSlinGNZOed0gh_GQ2S5lzXXjbKi7XgdDc19WY5DWw4Tz3Y5qHMe3C6xvpaUPkcYfcXtDRX8R2WgPJWz3mVMQM8RcVogtvbozmj_1s_6vgS3joT6OajXcHOtXl3O5iPlSpV8HufwFiPgdc
  priority: 102
  providerName: Unpaywall
Title Matching Cybersecurity Ontologies on Internet of Everything through Coevolutionary Multiobjective Evolutionary Algorithm
URI https://dx.doi.org/10.1155/2022/3572404
https://www.proquest.com/docview/2704758277
https://downloads.hindawi.com/journals/scn/2022/3572404.pdf
UnpaywallVersion publishedVersion
Volume 2022
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  issn: 1939-0122
  databaseCode: ADMLS
  dateStart: 20110501
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1939-0122
  databaseCode: DR2
  dateStart: 20070101
  customDbUrl:
  isFulltext: true
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0061474
  providerName: Wiley-Blackwell
– providerCode: PRVWIB
  databaseName: Wiley Online Library Open Access
  customDbUrl:
  eissn: 1939-0122
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0061474
  issn: 1939-0122
  databaseCode: 24P
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://authorservices.wiley.com/open-science/open-access/browse-journals.html
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1bT8IwFG4EY9QH4zWiSPqAvpjFXboVHgmBEBPQEEnwaWm3VjS4ERji_r2nWzGg8fK4rGdNdtp-52tPv4NQVQpKAVaV-KApDAIAaPC6AKpCzNBhwgldT11O7va8zoDcDt2hFkmafT_CB7RT9Ny-cVwK2EMKqFDzVOZWvzNcLrgAMFQfHqvUH4ss89u_2K4hz9ZIUd7F81pguT2PJixdsPF4BWPa-2hPB4e4kXvzAG2I6BDtrkgGHqH3LqydatcIN1MOoZsuP4fvoqwQLfBeHEc43-cTCY4lbsFgTZPMRBflwc1YvOkhx6Ypzi7hxvwlX_vAYOVdY_wUQwej12M0aLcemh1DV08wAsehiVHnTED0QxmXQShNQa3QCgPBeF05wXKl7dpmLSSAYQHxrJo0vVA4ZlBjnAUSpu0JKkZxJE4Rph7YSpvZxOPEDQhTCkAciCARnkOkLKHr5Z_1Ay0tripcjP2MYriur_zgaz-U0OVn60kuqfFDu6p20h_NyksP-nr-zXybmgSYkE1pCV19evXX75z9r7tztKMejUwVt4yKyXQuLiAuSXgFIvK-XcnGZgVtDnr3jccPpBrd4g
linkProvider Hindawi Publishing
linkToUnpaywall http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3db9MwED-NTgh4YONjomNDfhi8oHSJY8eteKqqTRPSNh6oNCSkyJ8MVpJqTRndX885cbYWaYB4S5Szk_gud_dz7N8B7DkrBIZVTz4Y24hhAIzUwCJUYbFJpU0Nz_zm5OOT7GjM3p_xszV41-6FMZ4ivpRm1jv3mPTqa-2tw7jO9me68HCd7qdcYCxivalx92A945iId2B9fPJh-Kn5j-xXASXs9pjSdtk75ytdrASk--GuK_nmg3kxlYsrOZkshZ7DDfjcPnSz4uSiN69UT1__xuf4n2-1CY9DSkqGjQ09gTVbPIVHS0SFz-DnMXpsP1dFRguFCWMoekdOi7r8LaJtUhakmV20FSkdOcBPZFHVTUIpIDIq7Y9g6PJyQeqtv6X61nhcbLB0bTj5UuINzr8_h_HhwcfRURRqNkQ6TUUVDZS0mHMJqZw2LrYiMYnRVqqBV33CHeU07huGkVOzLOm7ODM2jXVfKqkdOost6BRlYV8AERm2dVRSlinGNZOed0gh_GQ2S5lzXXjbKi7XgdDc19WY5DWw4Tz3Y5qHMe3C6xvpaUPkcYfcXtDRX8R2WgPJWz3mVMQM8RcVogtvbozmj_1s_6vgS3joT6OajXcHOtXl3O5iPlSpV8HufwFiPgdc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Matching+Cybersecurity+Ontologies+on+Internet+of+Everything+through+Coevolutionary+Multiobjective+Evolutionary+Algorithm&rft.jtitle=Security+and+communication+networks&rft.au=Xue%2C+Xingsi&rft.au=Tan%2C+Wenbin&rft.date=2022-08-10&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1939-0114&rft.eissn=1939-0122&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F3572404&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1939-0114&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1939-0114&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1939-0114&client=summon