-
4
-
-
33646164799
-
Ontology evaluation
-
Steen Staab, Rudi Studer, 1st ed. Springer [chapter 13]
-
Asuncion Gomez-Perez Ontology evaluation Steen Staab, Rudi Studer, Handbook on ontologies 1st ed. 2004 Springer 251 274 [chapter 13]
-
(2004)
Handbook on Ontologies
, pp. 251-274
-
-
Gomez-Perez, A.1
-
7
-
-
84871965286
-
-
Network Working Group Internet-Draft (Last visited Feb 11, 2014)
-
Belshe, Mike, Peon, and Roberto SPDY protocol 2012 Network Working Group Internet-Draft http://tools.ietf.org/html/draft-mbelshe-httpbis-spdy-00 (Last visited Feb 11, 2014)
-
(2012)
SPDY Protocol
-
-
Belshe1
Mike2
Peon3
Roberto4
-
12
-
-
77649256473
-
Building legal ontologies with methontology and WebODE
-
R. Benjamins, P. Casanovas, J. Breuker, A. Gangemi, Springer-Verlag LNAI No. 3369. ISBN: 3-540-25063-8
-
O. Corcho, M. Fernández, A. Gómez-Pérez, and A. López-Cima Building legal ontologies with methontology and WebODE R. Benjamins, P. Casanovas, J. Breuker, A. Gangemi, Law and the semantic web 2005 Springer-Verlag 142 157 LNAI No. 3369. ISBN: 3-540-25063-8
-
(2005)
Law and the Semantic Web
, pp. 142-157
-
-
Corcho, O.1
Fernández, M.2
Gómez-Pérez, A.3
López-Cima, A.4
-
15
-
-
0242371001
-
Security for DAML web services: Annotation and matchmaking
-
Springer
-
Grit Denker, Lalana Kagal, Tim Finin, Massimo Paolucci, and Katia Sycara Security for DAML web services: annotation and matchmaking The semantic web (ISWC 2003), LNCS 2870 2003 Springer
-
(2003)
The Semantic Web (ISWC 2003), LNCS 2870
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
Paolucci, M.4
Sycara, K.5
-
16
-
-
17044383806
-
Security in the Semantic Web using OWL
-
DOI 10.1016/j.istr.2004.11.002, PII S1363412704000032
-
Grit Denker, Lalana Kagal, and Tim Finin Security in the semantic web using OWL Journal of Information Security, Technical Report 10 1 2005 51 58 (Pubitemid 40497376)
-
(2005)
Information Security Technical Report
, vol.10
, Issue.1
, pp. 51-58
-
-
Denker, G.1
Kagal, L.2
Finin, T.3
-
19
-
-
50049109224
-
Information security fortification by ontological mapping of the ISO/IEC 27001 standard
-
IEEE
-
Stefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl, and Edgar Weippl Information security fortification by ontological mapping of the ISO/IEC 27001 standard 13th Pacific rim international symposium on dependable computing 2007 IEEE 381 388
-
(2007)
13th Pacific Rim International Symposium on Dependable Computing
, pp. 381-388
-
-
Fenz, S.1
Goluch, G.2
Ekelhart, A.3
Riedl, B.4
Weippl, E.5
-
20
-
-
66249109617
-
Ontological mapping of information security best-practice guidelines
-
W. Abramowicz, Springer-Verlag Berlin Heidelberg
-
Stefan Fenz, Thomas Pruckner, and Arman Manutscheri Ontological mapping of information security best-practice guidelines W. Abramowicz, BIS 2009, LNBIP 21 2009 Springer-Verlag Berlin Heidelberg 49 60
-
(2009)
BIS 2009, LNBIP 21
, pp. 49-60
-
-
Fenz, S.1
Pruckner, T.2
Manutscheri, A.3
-
26
-
-
22944445690
-
The integration of OntoClean in webODE
-
J. Angele, Y. Sure, Amsterdam, the Netherlands. Retrieved 23.10.06
-
Mariano Fernández-López, and Gómez-Pérez Asuncion The integration of OntoClean in webODE J. Angele, Y. Sure, Proceedings of CEUR workshop EKAW'02 workshop on evaluation of ontology-based tools (EON2002), Sigüenza, Spain 2006 38 52 Amsterdam, the Netherlands. Retrieved 23.10.06
-
(2006)
Proceedings of CEUR Workshop EKAW'02 Workshop on Evaluation of Ontology-based Tools (EON2002), Sigüenza, Spain
, pp. 38-52
-
-
Fernández-López, M.1
Asuncion, G.-P.2
-
27
-
-
0003415244
-
-
RFC 2616
-
Roy Fielding, Jim Gettys, Jeffrey Mogul, Henrik Frystyk, Larry Masinter, Paul Leach, and Tim Berners-Lee Hypertext transfer protocol-HTTP/1.1 June, 1999 RFC 2616
-
(1999)
Hypertext Transfer protocol-HTTP/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
28
-
-
84903215392
-
Management of heterogeneous security access control configuration using an ontology engineering approach
-
ACM Chicago, Illinois, USA
-
William M. Fitzgerald, and Simon N. Foley Management of heterogeneous security access control configuration using an ontology engineering approach SafeConfig'10 October 4, 2010 ACM Chicago, Illinois, USA
-
(2010)
SafeConfig'10
-
-
Fitzgerald, W.M.1
Foley, S.N.2
-
29
-
-
84874231119
-
A theoretical framework for ontology evaluation and validation
-
Aldo Gangemi, Carola Catenacci, Massimiliano Ciaramita, and Jos Lehmann A theoretical framework for ontology evaluation and validation SWAP 166 2005
-
(2005)
SWAP
, vol.166
-
-
Gangemi, A.1
Catenacci, C.2
Ciaramita, M.3
Lehmann, J.4
-
33
-
-
0012257635
-
Evaluating ontological decisions with ontoclean
-
Guarino, N. and Welty, C.: Evaluating ontological decisions with OntoClean. Journal of Communications of the ACM, ACM Press, New York, NY, USA, Vol. 45, No. 2, pp. 61-65, 2002. (Pubitemid 135699725)
-
(2002)
Communications of the ACM
, vol.45
, Issue.2
, pp. 61-65
-
-
Guarino, N.1
Welty, C.2
-
35
-
-
0012257635
-
Evaluating ontological decisions with ontoclean
-
Nicola Guarino, and Christopher Welty Evaluating ontological decisions with OntoClean Journal of Communications of the ACM 45 2 2002 61 65 ACM (Pubitemid 135699725)
-
(2002)
Communications of the ACM
, vol.45
, Issue.2
, pp. 61-65
-
-
Guarino, N.1
Welty, C.2
-
38
-
-
0002620903
-
Identity, unity, and individuation: Towards a formal toolkit for ontological analysis
-
W. Horn, IOS Press Amsterdam
-
Nicola Guarino, and Chris Welty Identity, unity, and individuation: towards a formal toolkit for ontological analysis W. Horn, Proceedings of ECAI-2000: the European conference on artificial intelligence August, 2000 IOS Press Amsterdam 219 223
-
(2000)
Proceedings of ECAI-2000: The European Conference on Artificial Intelligence
, pp. 219-223
-
-
Guarino, N.1
Welty, C.2
-
40
-
-
0001875510
-
DAML+OIL: A description logic for the semantic web
-
Ian Horrocks DAML+OIL: a description logic for the semantic web IEEE Data Engineering Bulletin 25 1 2002 4 9
-
(2002)
IEEE Data Engineering Bulletin
, vol.25
, Issue.1
, pp. 4-9
-
-
Horrocks, I.1
-
41
-
-
17644419220
-
SWRL: A semantic web rule language combining OWL and RuleML
-
Ian Horrocks, Peter F. Patel-Schneider, Harold Boley, Said Tabet, Benjamin Grosof, and Mike Dean SWRL: a semantic web rule language combining OWL and RuleML Journal: W3C Member submission 21 2004 79
-
(2004)
Journal: W3C Member Submission
, vol.21
, pp. 79
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
-
46
-
-
0003415244
-
-
RFC 2616 (Last visited April 11, 2014)
-
Hypertext Transfer Protocol - HTTP/1.1 1999 RFC 2616 http://www.w3.org/ Protocols/rfc2616/rfc2616.html/ (Last visited April 11, 2014)
-
(1999)
Hypertext Transfer Protocol - HTTP/1.1
-
-
-
47
-
-
84903149500
-
IBM rational software
-
M. Ib, Oliver Hummel, Colin Atkinson, D. Hughes, P. Greenwood, and Reid Holmes et al. IBM rational software Journal: IEEE Software 11 5 1994 48 59
-
(1994)
Journal: IEEE Software
, vol.11
, Issue.5
, pp. 48-59
-
-
Ib, M.1
Hummel, O.2
Atkinson, C.3
Hughes, D.4
Greenwood, P.5
Holmes, R.6
-
48
-
-
84903147967
-
-
(Last visited April 12, 2014)
-
Information security vulnerabilities and exposures, intrusion detection (application security), new CVE-ID Format January 1, 2014 http://cve.mitre.org/ (Last visited April 12, 2014)
-
(2014)
Journal: IEEE Software
-
-
-
50
-
-
84903179972
-
-
Apache Software Foundation Web page at (Last visited Feb 28, 2014)
-
JMeter 2014 Apache Software Foundation Web page at http://jmeter.apache. Org (Last visited Feb 28, 2014)
-
(2014)
JMeter
-
-
-
53
-
-
79958812210
-
-
2nd ed. State University of New York at Stony Brook Harold Boley, National Research Council Canada W3C Working Group Note 5
-
Michael Kifer RIF overview 2nd ed. February 2013 State University of New York at Stony Brook Harold Boley, National Research Council Canada W3C Working Group Note 5
-
(2013)
RIF Overview
-
-
Kifer, M.1
-
57
-
-
0028514027
-
Taxonomy of computer program security flaws
-
Carl E. Landwehr, Alan R. Bull, John P. McDermott, and William S. Choi Taxonomy of computer program security flaws ACM Computing Surveys 26 3 September 1994 211 254
-
(1994)
ACM Computing Surveys
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
58
-
-
84953384559
-
Building problem domain ontology from security requirements in regulatory documents
-
ACM Press New York, NY
-
Seok-Won Lee, Robin Gandhi, Divya Muthurajan, Deepak Yavagal, and Gail-Joon Ahn Building problem domain ontology from security requirements in regulatory documents Proceedings of the 2006 international workshop on software engineering for secure systems (SESS '06), Shanghai, China May 20-21, 2006 ACM Press New York, NY 43 50
-
(2006)
Proceedings of the 2006 International Workshop on Software Engineering for Secure Systems (SESS '06), Shanghai, China
, pp. 43-50
-
-
Lee, S.-W.1
Gandhi, R.2
Muthurajan, D.3
Yavagal, D.4
Ahn, G.-J.5
-
62
-
-
84903192167
-
-
(Last visited Jan11, 2014)
-
OWASP web application security attacks 2014 https://www.owasp.org/index. php/Category:Attack/ (Last visited Jan11, 2014)
-
(2014)
OWASP Web Application Security Attacks
-
-
-
65
-
-
84885179737
-
Semantic security against web application attacks
-
Jan 2014
-
Abdul Razzaq, Khalid Latif, Hafiz F. Ahmad, Ali Hur, Zahid Anwar, and Peter C. Bloodsworth Semantic security against web application attacks Information Sciences 254 2014 19 38 Jan 2014
-
(2014)
Information Sciences
, vol.254
, pp. 19-38
-
-
Razzaq, A.1
Latif, K.2
Ahmad, H.F.3
Hur, A.4
Anwar, Z.5
Bloodsworth, P.C.6
-
68
-
-
0037984544
-
-
Internet Engineering Task Force RFC 3261
-
Jonathan Rosenberg, Henning Schulzrinne, Gonzalo Camarillo, Alan Johnston, Jon Peterson, and Robert Sparks et al. SIP: session initiation protocol 2002 Internet Engineering Task Force RFC 3261
-
(2002)
SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
-
70
-
-
0004329576
-
-
The Institute of Electrical and Electronics Engineers New York, USA IEEE Std, No. 1074-1997, ISBN:1-55937-993-6
-
D.J. Schultz IEEE standard for developing software life cycle processes 1997 The Institute of Electrical and Electronics Engineers New York, USA IEEE Std, No. 1074-1997, ISBN:1-55937-993-6
-
(1997)
IEEE Standard for Developing Software Life Cycle Processes
-
-
Schultz, D.J.1
-
72
-
-
84903203102
-
"modSecurity core rule set", an open source rule set for generic detection of attacks against web applications
-
Ofer Shezaf "ModSecurity core rule set", an open source rule set for generic detection of attacks against web applications OWASP AppSec Conference 2007
-
(2007)
OWASP AppSec Conference
-
-
Shezaf, O.1
-
73
-
-
84883440537
-
-
ACM 978-1-4503-0017-9, CSIIRW, Oak Ridge, Tennessee, USA
-
Anoop Singhal, and Duminda Wijesekera Ontologies for modeling enterprise level security metrics ACM 978-1-4503-0017-9, CSIIRW, Oak Ridge, Tennessee, USA April 21-23, 2010
-
(2010)
Ontologies for Modeling Enterprise Level Security Metrics
-
-
Singhal, A.1
Wijesekera, D.2
-
74
-
-
34249817069
-
Pellet: A practical OWL-DL reasoner
-
DOI 10.1016/j.websem.2007.03.004, PII S1570826807000169, Software Engineering and the Semantic Web
-
Evren Sirin, Bijan Parsia, Bernardo Cuenca Grau, Aditya Kalyanpur, and Yarden Katz Pellet: a practical owl-dl reasoner Journal: Web Semantics: Science, Services and Agents on the World Wide Web 5 2 2007 51 53 Elsevier (Pubitemid 46856283)
-
(2007)
Web Semantics
, vol.5
, Issue.2
, pp. 51-53
-
-
Sirin, E.1
Parsia, B.2
Grau, B.C.3
Kalyanpur, A.4
Katz, Y.5
-
75
-
-
84903156888
-
-
OWASP-DV-016 (Last visited Feb 28, 2014)
-
Testing for HTTP splitting/smuggling 2014 OWASP-DV-016 https://www.owasp.org/index.php/Testing-for-HTTP-Splitting/Smuggling (Last visited Feb 28, 2014)
-
(2014)
Testing for HTTP Splitting/smuggling
-
-
-
76
-
-
58149365542
-
Towards principles for the design of ontologies used for knowledge sharing
-
R. Gruber Thomas Towards principles for the design of ontologies used for knowledge sharing International Journal of Human-Computer Studies 43 5/6 1995 907 928
-
(1995)
International Journal of Human-Computer Studies
, vol.43
, Issue.5-6
, pp. 907-928
-
-
Thomas, R.G.1
-
77
-
-
0002018120
-
The firm as a distributed knowledge system: A constructionist approach
-
H. Tsoukas The firm as a distributed knowledge system: a constructionist approach Strategic Management Journal 17 1996 11 25
-
(1996)
Strategic Management Journal
, vol.17
, pp. 11-25
-
-
Tsoukas, H.1
-
83
-
-
84869141956
-
-
Report. Verizonenterprise.com.Verizon, Application Security Specific Highlights
-
Chris Wysopal 2012 data breach investigations report Report. Verizonenterprise.com.Verizon, Application Security Specific Highlights March 22, 2012 http://www.veracode.com/blog/2012/03/verizon-data-breach-investigative- report-2012-application-security-specific-highlights/
-
(2012)
2012 Data Breach Investigations Report
-
-
Wysopal, C.1
-
84
-
-
49049103440
-
Ontology-based software reliability modeling
-
Helsinki, Finland
-
J. Zhou, E. Niemelä, and A. Evesti Ontology-based software reliability modeling Proceedings of software and services variability management workshop - concepts, models and tools 2007 17 31 Helsinki, Finland
-
(2007)
Proceedings of Software and Services Variability Management Workshop - Concepts, Models and Tools
, pp. 17-31
-
-
Zhou, J.1
Niemelä, E.2
Evesti, A.3
|