-
1
-
-
0242456149
-
Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool
-
V. Raskin, C.F. Hempelmann, K.E. Triezenberg, Nirenburg, "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool," Proceedings of the 2001 Workshop on New Security Paradigms (NSPW2001), pp. 53-59, 2001.
-
(2001)
Proceedings of the 2001 Workshop on New Security Paradigms (NSPW2001)
, pp. 53-59
-
-
Raskin, V.1
Hempelmann, C.F.2
Triezenberg, K.E.3
Nirenburg4
-
2
-
-
2942524707
-
-
Available at:, October
-
DAMLJessKB Available at: http://edge.cs.drexel.edu/assemblies/software/ damljesskb/, October, 2002.
-
(2002)
DAMLJessKB
-
-
-
3
-
-
33847718803
-
-
DAML+OIL. Available at: http://www.daml.org/2000/12/daml+oil.daml
-
DAML+OIL. Available at: http://www.daml.org/2000/12/daml+oil.daml
-
-
-
-
4
-
-
0242371001
-
Security for DAML Web Services: Annotation and Matchmaking
-
The Semantic Web ISWC 2003, Springer, pp
-
G. Denker, L. Kagal, T. Finin, M. Paolucci, K. Sycara, "Security for DAML Web Services: Annotation and Matchmaking," The Semantic Web (ISWC 2003), LNCS 2870, Springer, pp. 335-350, 2003.
-
(2003)
LNCS
, vol.2870
, pp. 335-350
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
Paolucci, M.4
Sycara, K.5
-
6
-
-
0038428854
-
Results of the KDD'99 Classifier Learning
-
C. Elkan, "Results of the KDD'99 Classifier Learning," SIGKDD Explorations, ACM SIGMOD, Vol. 1, pp. 63-64, 2000.
-
(2000)
SIGKDD Explorations, ACM SIGMOD
, vol.1
, pp. 63-64
-
-
Elkan, C.1
-
8
-
-
33847744362
-
Automatically Generated DAML Markup for Semi-structured Documents
-
November
-
W. Krueger, J. Nilsson, T. Oates, T. Finin, "Automatically Generated DAML Markup for Semi-structured Documents," National Science Foundation Workshop on Next Generation Data Mining, Baltimore, November 2002.
-
(2002)
National Science Foundation Workshop on Next Generation Data Mining, Baltimore
-
-
Krueger, W.1
Nilsson, J.2
Oates, T.3
Finin, T.4
-
10
-
-
85172423269
-
JAM: Java Agents for Meta-Learning over Distributed Databases
-
S. Stolfo, A.L. Prodromidis, S. Tselepis, W. Lee, D.W. Fan, P.K. Chan, "JAM: Java Agents for Meta-Learning over Distributed Databases," Proceeding of KDD-97, pp. 74-81, 1997.
-
(1997)
Proceeding of KDD-97
, pp. 74-81
-
-
Stolfo, S.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.W.5
Chan, P.K.6
-
11
-
-
8344251916
-
Deterministic Memory-Efficient String matching algorithms for Intrusion Detection
-
N. Tuck, T. Sherwood, B. Calder, G. Varghese, "Deterministic Memory-Efficient String matching algorithms for Intrusion Detection," Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004), pp. 2628-2639, 2004.
-
(2004)
Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2004)
, pp. 2628-2639
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
12
-
-
33746416682
-
Target-Centric Ontology for Intrusion Detection
-
August
-
J. Undercoffer, J., Pinkston, A. Joshi, T. Finin, "Target-Centric Ontology for Intrusion Detection," IJCAI Workshop on Ontologies and Distributed Systems (IJCAI'03), August, 2003.
-
(2003)
IJCAI Workshop on Ontologies and Distributed Systems (IJCAI'03)
-
-
Undercoffer, J.1
Pinkston, J.2
Joshi, A.3
Finin, T.4
-
13
-
-
0003449831
-
Resource description framework: Model and SYNtax specification
-
World Wide Web Consortium, Cambridge
-
O. Lassila, R. Swick, Resource description framework: model and SYNtax specification, W3C Recommendation, World Wide Web Consortium, Cambridge, 1999.
-
(1999)
Recommendation
, vol.W3C
-
-
Lassila, O.1
Swick, R.2
-
14
-
-
33744917812
-
Lifetime-aware Intrusion Detection Under Safeguarding Constraints
-
A. Iranli, H. Fatemi, M. Pedram, "Lifetime-aware Intrusion Detection Under Safeguarding Constraints," Fourth International Symposium on Information Processing in Sensor Networks, 2005 ( IPSN 2005), pp. 189-194, 2005.
-
(2005)
Fourth International Symposium on Information Processing in Sensor Networks, 2005 ( IPSN 2005)
, pp. 189-194
-
-
Iranli, A.1
Fatemi, H.2
Pedram, M.3
|