-
2
-
-
77149168757
-
An ontology-based approach to react to network attacks
-
Cuppens-Boulahia, N., Cuppens, F., Lopez, J., Vasquez, E., Guerra, J. and Debar, H. (2009) 'An ontology-based approach to react to network attacks', International Journal of Information and Computer Security, Vol. 3, Nos. 3-4, pp.280-305.
-
(2009)
International Journal of Information and Computer Security
, vol.3
, Issue.3-4
, pp. 280-305
-
-
Cuppens-Boulahia, N.1
Cuppens, F.2
Lopez, J.3
Vasquez, E.4
Guerra, J.5
Debar, H.6
-
5
-
-
33750028273
-
Reasoning with rules and ontologies
-
Reasoning Web - Second International Summer School 2006, Tutorial Lectures
-
Eiter, T., Ianni, G., Polleres, A., Schindlauer, R. and Tompis, H. (2006) 'Reasoning with rules and ontologies', in Reasoning Web 2006, pp.93-127. (Pubitemid 44568361)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4126
, pp. 93-127
-
-
Eiter, T.1
Ianni, G.2
Polleres, A.3
Schindlauer, R.4
Tompits, H.5
-
9
-
-
84864696228
-
An ontology-based model for SIEM environments
-
Gonzalez Granadillo, G., Ben Mustapha, Y., Hachem, N. and Debar, H. (2011) 'An ontology-based model for SIEM environments', 7th International Conference on Global Security Safety and Sustainability.
-
(2011)
7th International Conference on Global Security Safety and Sustainability
-
-
Gonzalez Granadillo, G.1
Ben Mustapha, Y.2
Hachem, N.3
Debar, H.4
-
10
-
-
79960771968
-
Botnets: Lifecycle and taxonomy
-
Hachem, N., Ben Mustapha, Y., Gonzalez Granadillo, G. and Debar, H. (2011) 'Botnets: lifecycle and taxonomy', 6th Conference on Network Architecture and Information Systems Security.
-
(2011)
6th Conference on Network Architecture and Information Systems Security
-
-
Hachem, N.1
Ben Mustapha, Y.2
Gonzalez Granadillo, G.3
Debar, H.4
-
11
-
-
85001799494
-
An ontology of information security
-
Herzog, A. Shahmehri, N. and Duma, C. (2007) 'An ontology of information security', International Journal of Information Security and Privacy, Vol. 1, No. 4, pp.1-23.
-
(2007)
International Journal of Information Security and Privacy
, vol.1
, Issue.4
, pp. 1-23
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
12
-
-
21544448034
-
-
The University Of Manchester, 1.1 Ed
-
Horridge, M., Jupp,S., Moulton, G., Rector, A., Stevens, R. and Wroe, C. (2007) 'A practical guide to building OWL ontologies using Protégé 4 and CO-ODE tools', The University Of Manchester, 1.1 Ed.
-
(2007)
A Practical Guide to Building OWL Ontologies Using Protégé 4 and CO-ODE Tools
-
-
Jupps, H.M.1
Moulton, G.2
Rector, A.3
Stevens, R.4
Wroe, C.5
-
13
-
-
84864670635
-
A semantic web approach to share alerts among security information management systems
-
(IBWAS'09)
-
Lopez, J., Villagra, V., Holdago, P., de Frutos, E. and Sanz, I. (2009) 'A semantic web approach to share alerts among security information management systems', Proc. Iberic Web Application Security Conference (IBWAS'09).
-
(2009)
Proc. Iberic Web Application Security Conference
-
-
Lopez, J.1
Villagra, V.2
Holdago, P.3
De Frutos, E.4
Sanz, I.5
-
14
-
-
84864700045
-
-
McGraw Hill, Florida, USA
-
Miller, D., Harris, S., Harper, A., Van Dyke, S. and Blask, C. (2010) Security Information and Event Management (SIEM) Implementation, McGraw Hill, Florida, USA.
-
(2010)
Security Information and Event Management (SIEM) Implementation
-
-
Miller, D.1
Harris, S.2
Harper, A.3
Van Dyke, S.4
Blask, C.5
-
15
-
-
67349242974
-
M4D4: A logical framework to support alert correlation in intrusion detection
-
Morin, B., Me, L., Debar, H. and Ducasse, M. (2009) 'M4D4: a logical framework to support alert correlation in intrusion detection', Information Fusion Internationale, Vol. 10, No. 4, pp.285-299.
-
(2009)
Information Fusion Internationale
, vol.10
, Issue.4
, pp. 285-299
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducasse, M.4
-
16
-
-
84864672214
-
Ontologies and information systems: A literature survey
-
Defence Science and Technology Organisation DSTO-TN-1002
-
Nguyen, V. (2011) 'Ontologies and information systems: a literature survey', Command, Control, Communications and Intelligence Division, Defence Science and Technology Organisation DSTO-TN-1002.
-
(2011)
Command, Control, Communications and Intelligence Division
-
-
Nguyen, V.1
-
17
-
-
70349162348
-
Ontology based application level intrusion detection system by using Bayesian filter
-
Razzaq, A., Hur, A., Ahmed, H. and Haider, N. (2009) 'Ontology based application level intrusion detection system by using Bayesian filter', 2nd International Conference on Computer, Control and Communication, pp.1-6.
-
(2009)
2nd International Conference on Computer, Control and Communication
, pp. 1-6
-
-
Razzaq, A.1
Hur, A.2
Ahmed, H.3
Haider, N.4
-
18
-
-
84864652300
-
-
Security in a Box, 'How to install COMODO firewall', available at https://security.ngoinabox.org/en/comodo installation.
-
How to Install COMODO Firewall
-
-
-
19
-
-
26944484588
-
Modeling computer attacks: An ontology for intrusion detection
-
Undercoffer, J., Joshi, A. and Pinkston, J. (2003) 'Modeling computer attacks: an ontology for intrusion detection', 6th International Symposium on Recent Advances in Intrusion Detection, pp.113-135.
-
(2003)
6th International Symposium on Recent Advances in Intrusion Detection
, pp. 113-135
-
-
Undercoffer, J.1
Joshi, A.2
Pinkston, J.3
-
21
-
-
57649173613
-
-
W3C Recommendation, W3C Recommendation'.
-
W3C Recommendation (2008) 'SPARQL query language for RDF. W3C Recommendation'.
-
(2008)
SPARQL Query Language for RDF.
-
-
-
22
-
-
71549160513
-
-
W3C Recommendation, W3C Recommendation'.
-
W3C Recommendation (2009) 'OWL 2 web ontology language. W3C Recommendation'.
-
(2009)
OWL 2 Web Ontology Language
-
-
-
23
-
-
35448942062
-
Ontology query languages for semantic web: A performance evaluation
-
thesis, University of Georgia
-
Zhang, Z. (2005) 'Ontology query languages for semantic web: a performance evaluation', Master thesis, University of Georgia.
-
(2005)
Master
-
-
Zhang, Z.1
|