Table of Contents
1Scope
2References
3Definitions
4Abbreviationsandacronyms
5Conventions
6Frameworktoidentifyandlocatethesource
ofcybersecurityinformation
7Typesandlevelofdetailsofdiscovered
cybersecurityinformation
8Cybersecurityinformationidentifier
9Typesofdiscoverymechanisms
10Methodsavailableforaccessto
discoveredinformation
AppendixI-Cybersecurityoperational
informationontology
AppendixII-Specificationsdescribing
databasesandknowledgebases
AppendixIII-Anillustratedimplementation
ofRDF-baseddiscovery
Bibliography Abstract
Specifies a framework for discovering cybersecurity information and the mechanism that enables this.