-
1
-
-
84863520750
-
On-demand security architecture for cloud computing
-
Jianyong Chen, Yang Wang and Xiaomin Wang, On-Demand Security Architecture for Cloud Computing, Computer, Vol.45, No.7, 2012, pp.73-78.
-
(2012)
Computer
, vol.45
, Issue.7
, pp. 73-78
-
-
Chen, J.1
Wang, Y.2
Wang, X.3
-
2
-
-
79953657305
-
Understanding cloud computing vulnerabilities
-
Bernd Grobauer, Tobias Walloschek and Elmar Stöcker, Understanding Cloud Computing Vulnerabilities, IEEE Security & Privacy, Vol.9, No.2, 2011, pp.50-57.
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.2
, pp. 50-57
-
-
Grobauer, B.1
Walloschek, T.2
Stöcker, E.3
-
3
-
-
84862907810
-
Security challenges for the public cloud
-
Kui Ren, Cong Wang and Qian Wang, Security Challenges for the Public Cloud, IEEE Internet Computing, Vol.16, No.1, 2012, pp.69-73.
-
(2012)
IEEE Internet Computing
, vol.16
, Issue.1
, pp. 69-73
-
-
Ren, K.1
Wang, C.2
Wang, Q.3
-
7
-
-
84890392723
-
-
Stanford Center for Biomedical Informatics Research
-
Stanford Center for Biomedical Informatics Research, What is Protégé?, 2013, protege.stanford.edu/overview/
-
(2013)
What is Protégé?
-
-
-
8
-
-
16344386685
-
What is there to worry about? An introduction to the computer security problem
-
Marshall D. Abrams, Sushil Jajodia and Harold J. Podell (Eds.), IEEE Computer Society Press, Los Alamitos, CA
-
Donald L. Brinkley and Roger R. Schell, What Is There to Worry About? An Introduction to the Computer Security Problem. Marshall D. Abrams, Sushil Jajodia and Harold J. Podell (Eds.), Information Security: An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos, CA, 1995, pp.11-40.
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 11-40
-
-
Brinkley, D.L.1
Schell, R.R.2
-
9
-
-
3142684130
-
A taxonomy for attacks on mobile agent
-
Bratislava, Slovakia, July
-
Mo Chun Man and V. K. Wei, A Taxonomy for Attacks on Mobile Agent, Proceedings of IEEE Region 8 Eurocon' 2001 International Conference on Trends in Communications, Bratislava, Slovakia, July, 2001, pp.385-388.
-
(2001)
Proceedings Of IEEE Region 8 Eurocon'2001 International Conference on Trends in Communications
, pp. 385-388
-
-
Chun Man, M.1
Wei, V.K.2
-
10
-
-
0030701247
-
Information system attacks: A preliminary classification scheme
-
Fred Cohen, Information System Attacks: A Preliminary Classification Scheme, Computers & Security, Vol.16, No.1, 1997, pp.29-46.
-
(1997)
Computers & Security
, vol.16
, Issue.1
, pp. 29-46
-
-
Cohen, F.1
-
11
-
-
0030674941
-
Information system defenses: A preliminary classification scheme
-
Fred Cohen, Information System Defenses: A Preliminary Classification Scheme, Computers & Security, Vol.16, No.2, 1997, pp.94-114.
-
(1997)
Computers & Security
, vol.16
, Issue.2
, pp. 94-114
-
-
Cohen, F.1
-
12
-
-
0038443107
-
A new taxonomy of web attacks suitable for efficient encoding
-
Gonzalo Álvarez and Slobodan Petrović, A New Taxonomy of Web Attacks Suitable for Efficient Encoding, Computers & Security, Vol.22, No.5, 2003, pp.435-449.
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 435-449
-
-
Álvarez, G.1
Petrović, S.2
-
13
-
-
15944369564
-
Classification of computer attacks using a self-organizing map
-
West Point, NY, June
-
L. L. DeLooze, Classification of Computer Attacks Using a Self-Organizing Map, Proceedings of the Fifth Annual IEEE SMC, West Point, NY, June, 2004, pp.365-369.
-
(2004)
Proceedings Of The Fifth Annual IEEE SMC
, pp. 365-369
-
-
DeLooze, L.L.1
-
14
-
-
84890357557
-
Internet attacks and protection mechanisms
-
Chih-Ching Chang and Ying-Dar Lin, Internet Attacks and Protection Mechanisms, Network Magazine Taiwan, 2000, http://speed.cis.nctu.edu.tw/~ydlin/ miscpub/hack-antihack.pdf
-
(2000)
Network Magazine Taiwan
-
-
Chang, C.-C.1
Lin, Y.-D.2
-
16
-
-
84890326683
-
-
Taiwan Information & Communication Security Technology Center
-
Taiwan Information & Communication Security Technology Center, Security Bulletins, 2012, http://www.icst.org.tw/NewsRSS.aspx?RSSType= news&lang=en.
-
(2012)
Security Bulletins
-
-
-
17
-
-
35148839490
-
A translation approach to portable ontology specifications
-
Thomas R. Gruber, A Translation Approach to Portable Ontology Specifications, Knowledge Acquisition, Vol.5, No.2, 1993, pp.199-220.
-
(1993)
Knowledge Acquisition
, vol.5
, Issue.2
, pp. 199-220
-
-
Gruber, T.R.1
-
18
-
-
0004104380
-
-
Ph.D. Thesis, University of Twente, AE Enschede, the Netherlands
-
L. K. Alberts, YMIR: An Ontology for Engineering Design, Ph.D. Thesis, University of Twente, AE Enschede, the Netherlands, 1993.
-
(1993)
YMIR: An Ontology for Engineering Design
-
-
Alberts, L.K.1
-
19
-
-
0032732449
-
What are ontologies, and why do we need them?
-
B. Chandrasekaran, John R. Josephson and V. Richard Benjamins, What Are Ontologies, and Why Do We Need Them?, IEEE Intelligent Systems, Vol.14, No.1, 1999, pp.20-26.
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.1
, pp. 20-26
-
-
Chandrasekaran, B.1
Josephson, J.R.2
Richard Benjamins, V.3
-
20
-
-
0031079258
-
Understanding, building and using ontologies
-
Nicola Guarino, Understanding, Building and Using Ontologies, International Journal of Human-Computer Studies, Vol.46, No.2-3, 1997, pp.293-310.
-
(1997)
International Journal of Human-Computer Studies
, vol.46
, Issue.2-3
, pp. 293-310
-
-
Guarino, N.1
-
21
-
-
0031076483
-
Using explicit ontologies in kbs development
-
G. van Heijst, A. Th. Schreiber and B. J. Wielinga, Using Explicit Ontologies in KBS Development, International Journal of Human-Computer Studies, Vol.46, No.2-3, 1997, pp.183-292.
-
(1997)
International Journal Of Human-Computer Studies
, vol.46
, Issue.2-3
, pp. 183-292
-
-
Van Heijst, G.1
Schreiber, A.T.2
Wielinga, B.J.3
-
22
-
-
0039079935
-
Reusable and shareable knowledge bases: A european perspective
-
Tokyo Japan December
-
B. J. Wielinga and A. Th. Schreiber, Reusable and Shareable Knowledge Bases: A European Perspective, Proceedings of International Conference on Building and Sharing of Very Large-Scaled Knowledge Bases, Tokyo, Japan, December, 1993, pp.103-115.
-
(1993)
Proceedings Of International Conference On Building And Sharing Of Very Large-Scaled Knowledge Bases
, pp. 103-115
-
-
Wielinga, B.J.1
Schreiber, A.T.2
-
23
-
-
36649031620
-
A concept-level ontology construction method for automatic summarization
-
Hei-Chia Wang, Chia-Tzung Liu and Tian-Hsiang Huang, A Concept-Level Ontology Construction Method for Automatic Summarization, Journal of Internet Technology, Vol.8, No.4, 2007, pp.381-387.
-
(2007)
Journal of Internet Technology
, vol.8
, Issue.4
, pp. 381-387
-
-
Wang, H.-C.1
Liu, C.-T.2
Huang, T.-H.3
-
24
-
-
84863806403
-
A context awareness and prediction support system for efficient management of u-city
-
Jae-Hyuk Cho, A Context Awareness and Prediction Support System for Efficient Management of U-City, Journal of Internet Technology, Vol.13, No.3, 2012, pp.509-520.
-
(2012)
Journal of Internet Technology
, vol.13
, Issue.3
, pp. 509-520
-
-
Cho, J.-H.1
-
25
-
-
84890318030
-
-
Master's Thesis, Management College of National Defense University, Taipei, Taiwan
-
Wan-Shu Hung, An Ontology-based IT Security Model, Master's Thesis, Management College of National Defense University, Taipei, Taiwan, 2006.
-
(2006)
An Ontology-based IT Security Model
-
-
Hung, W.-S.1
-
26
-
-
78751515000
-
-
Master's Thesis, National Yunlin University of Science and Technology, Yunlin, Taiwan
-
Chien-Hung Lin, Using Formal Concept Analysis to Construct the Computer Virus Characteristics Domain Ontology, Master's Thesis, National Yunlin University of Science and Technology, Yunlin, Taiwan, 2006.
-
(2006)
Using Formal Concept Analysis to Construct the Computer Virus Characteristics Domain Ontology
-
-
Lin, C.-H.1
-
27
-
-
78650593518
-
An ontology-driven model for digital forensics investigations of computer incidents under the ubiquitous computing environments
-
Hai-Cheng Chu, Der-Jiunn Deng and Han-Chieh Chao, An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments, Wireless Personal Communications, Vol.56, No.1, 2011, pp.5-19.
-
(2011)
Wireless Personal Communications
, vol.56
, Issue.1
, pp. 5-19
-
-
Chu, H.-C.1
Deng, D.-J.2
Chao, H.-C.3
-
28
-
-
77950996667
-
Constructing enterprise information network security risk management mechanism by ontology
-
Fong-Hao Liu and Wei-Tsong Lee, Constructing Enterprise Information Network Security Risk Management Mechanism by Ontology, Tamkang Journal of Science and Engineering, Vol.13, No.1, 2010, pp.79-87.
-
(2010)
Tamkang Journal of Science and Engineering
, vol.13
, Issue.1
, pp. 79-87
-
-
Liu, F.-H.1
Lee, W.-T.2
|