-
1
-
-
38849131285
-
Near-term prospects for semantic technologies
-
V, January/February
-
V, "Near-Term Prospects for Semantic Technologies," IEEE Intelligent Systems, January/February 2008, pp. 76-88.
-
(2008)
IEEE Intelligent Systems
, pp. 76-88
-
-
-
2
-
-
70349462879
-
-
Tipton H. F. and Henry K. (Eds), Auerbach Publication, ISBN: 0-8493-8231-9
-
2 Guide to the CISSP CBK, Auerbach Publication, ISBN: 0-8493-8231-9, 2007.
-
(2007)
2 Guide to the CISSP CBK
-
-
-
6
-
-
70450121363
-
-
May 18-22, San Jose, California
-
2008 Semantic Technology Conference, May 18-22, 2008, San Jose, California, http://www.semantic-conference.com/.
-
(2008)
2008 Semantic Technology Conference
-
-
-
7
-
-
70450144142
-
-
September 20
-
Semantic Discovery, http://www.semantichacker.com. September 20, 2008.
-
(2008)
Semantic Discovery
-
-
-
8
-
-
70450166751
-
-
September 20
-
Semantic Journal, http://www.sandoval.ca:8080/SemanticWebJournal/ SemanticWebJournal.html. September 20, 2008.
-
(2008)
Semantic Journal
-
-
-
9
-
-
70450149199
-
-
ISAP, Information Security Automation Program, Version 1.0 Beta, revised on 5/22/2007
-
ISAP, Information Security Automation Program, Automating Vulnerability Management, Security Measurement, and Compliance, Version 1.0 Beta, revised on 5/22/2007.
-
Automating Vulnerability Management, Security Measurement, and Compliance
-
-
-
14
-
-
70450121362
-
FAA outage reveals odd computing practices
-
Associated Press, August 29
-
Associated Press, FAA Outage Reveals Odd Computing Practices, MIT Technology Review, August 29, 2008.
-
(2008)
MIT Technology Review
-
-
-
15
-
-
70450146950
-
-
NIST, Version 1.0 Beta, revised on May 22
-
NIST, Security Content Automation Protocol, Version 1.0 Beta, revised on May 22, 2007.
-
(2007)
Security Content Automation Protocol
-
-
-
16
-
-
70450144968
-
-
NIST, Information Security Automation Program, Version 1.0 Beta, revised on May 22
-
NIST, Information Security Automation Program, Automating Vulnerability Management, Security Measurement, and Compliance, Version 1.0 Beta, revised on May 22, 2007.
-
(2007)
Automating Vulnerability Management, Security Measurement, and Compliance
-
-
-
17
-
-
85052852832
-
Security log management
-
Syngress Publishing, Inc.
-
Babbin J. et al., Security Log Management, Identifying Patterns in the Chaos, Syngress Publishing, Inc. 2006.
-
(2006)
Identifying Patterns in the Chaos
-
-
Babbin, J.1
-
18
-
-
51049107864
-
-
Version 2.0, Forum of Incident Response and Security Teams (July)
-
Peter Mell, Karen Scarfone, and Sasha Romanosky, A Complete Guide to the Common Vulnerability Scoring System (CVSS), Version 2.0, Forum of Incident Response and Security Teams, http://www.first.org/cvss/cvss-guide.html (July 2007).
-
(2007)
A Complete Guide to the Common Vulnerability Scoring System (CVSS)
-
-
Mell, P.1
Scarfone, K.2
Romanosky, S.3
-
19
-
-
63049084996
-
Metrics for information security vulnerabilities
-
J. A. Wang, M. Xia, and F. Zhang, "Metrics for Information Security Vulnerabilities, Journal of Applied Global Research, Volume 1, No. 1, 2008, pp. 48-58.
-
(2008)
Journal of Applied Global Research
, vol.1
, Issue.1
, pp. 48-58
-
-
Wang, J.A.1
Xia, M.2
Zhang, F.3
-
20
-
-
33947219926
-
Information security models and metrics
-
ISBN: 1-59593-059-0. March, Kennesaw, GA
-
rd ACM Southeast Conference, Volume 2, pp. 178-184. ISBN: 1-59593-059-0. March 2005, Kennesaw, GA.
-
(2005)
rd ACM Southeast Conference
, vol.2
, pp. 178-184
-
-
Wang, J.A.1
-
21
-
-
78650760840
-
Temporal metrics for software vulnerabilities
-
May 12-14, Oak Ridge, TN, USA
-
J.A.Wang, Fengwei Zhang and Min Xia, "Temporal Metrics for Software Vulnerabilities," in Proceedings of CSIIRW'08, May 12-14, 2008, Oak Ridge, TN, USA.
-
(2008)
Proceedings of CSIIRW'08
-
-
Wang, J.A.1
Zhang, F.2
Xia, M.3
-
22
-
-
84869243600
-
-
Oracle Corporation, The Critical Patch Update, http://www.oracle.com/ technology/deploy/security/critical-patch-updates/cpuoct2006.html
-
The Critical Patch Update
-
-
-
28
-
-
58149365542
-
Towards principles for the design of ontologies used for knowledge sharing
-
T. Gruber. Towards Principles for the Design of Ontologies used for Knowledge Sharing. International Journal of Human-Computer Studies, 1995. 43(5/6): 907-928.
-
(1995)
International Journal of Human-computer Studies
, vol.43
, Issue.5-6
, pp. 907-928
-
-
Gruber, T.1
-
29
-
-
17044383806
-
Security in the semantic web using OWL. Security in the semantic web using OWL
-
G. Denker, L. Kagal, and T. Finin. Security in the Semantic Web using OWL. Security in the Semantic Web using OWL. Information Security Technical Report, 2005. 10(1): p. 51-58.
-
(2005)
Information Security Technical Report
, vol.10
, Issue.1
, pp. 51-58
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
-
36
-
-
0028514027
-
A taxonomy of computer program security flaws
-
C. Landwehr, A. Bull, J. McDermott, and W.Choi. A Taxonomy of Computer Program Security Flaws. Computing Surveys, 1994, 26(3): pp. 211-254.
-
(1994)
Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.1
Bull, A.2
McDermott, J.3
Choi, W.4
-
41
-
-
8344270973
-
An ontology for modelling security: The tropos approach
-
Springer Berlin/Heidelberg
-
Mouratidis, H., P. Giorgini, and G. Manson, An Ontology for Modelling Security: The Tropos Approach, in Knowledge-Based Intelligent Information and Engineering Systems. 2003, Springer Berlin/Heidelberg. p. 1387-1394.
-
(2003)
Knowledge-based Intelligent Information and Engineering Systems
, pp. 1387-1394
-
-
Mouratidis, H.1
Giorgini, P.2
Manson, G.3
-
44
-
-
0242371001
-
Security for DAML web services: Annotation and matchmaking
-
Springer Berlin/Heidelberg
-
Denker, G., et al., Security for DAML Web Services: Annotation and Matchmaking, in The SemanticWeb-ISWC 2003. 2003, Springer Berlin/Heidelberg. p. 335-350.
-
(2003)
The SemanticWeb-ISWC 2003
, pp. 335-350
-
-
Denker, G.1
-
48
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
A. Avizienis, J. -C. Laprie, B. Randell, and C. E. Landwehr. Basic Concepts and Taxonomy of Dependable and Secure Computing. IEEE Trans. Dependable Sec. Comput. Vol. 1, No. !. pp. 11-33, 2004.
-
(2004)
IEEE Trans. Dependable Sec. Comput.
, vol.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.E.4
-
51
-
-
70450156864
-
-
Web-Ontology (WebOnto) working Group, November
-
Web-Ontology (WebOnto) working Group. http://www.w3.org/2001/sw/WebOnt/, November, 2008.
-
(2008)
-
-
-
52
-
-
70450140702
-
-
November
-
Protégé. http://protege.stanford.edu/, November, 2008
-
(2008)
-
-
|