-
1
-
-
84908660354
-
-
DARPA
-
DARPA, "Integrated Cyber Analysis System (ICAS) Homepage," 2014. Available: http://www. darpa. mil/Our-Work/I2O/Programs/Integrated-Cyber-Anal ysis-System-%28ICAS%29. aspx.
-
(2014)
Integrated Cyber Analysis System (ICAS) Homepage
-
-
-
2
-
-
84912540389
-
Semantic Query: Solving the Needs of a Net-Centric Data Sharing
-
23-May
-
M. Fisher and M. Dean, "Semantic Query: Solving the Needs of a Net-Centric Data Sharing. " Semantic Technology Conference, 23-May-2007.
-
(2007)
Semantic Technology Conference
-
-
Fisher, M.1
Dean, M.2
-
3
-
-
4344567256
-
OWL web ontology language overview
-
2004-03
-
D. L. McGuinness, F. Van Harmelen, and others, "OWL web ontology language overview," W3C Recomm., vol. 10, no. 2004-03, p. 10, 2004.
-
(2004)
W3C Recomm.
, vol.10
, pp. 10
-
-
McGuinness, D.L.1
Van Harmelen, F.2
-
5
-
-
0003945978
-
-
Addison-Wesley Longman Publishing Co., Inc.
-
W. Stallings, SNMP, SNMPv2, SNMPv3, and RMON 1 and 2. Addison-Wesley Longman Publishing Co., Inc., 1998.
-
(1998)
SNMP, SNMPv2, SNMPv3, and RMON 1 and 2
-
-
Stallings, W.1
-
8
-
-
84883383222
-
APT1: Exposing one of China's cyber espionage units
-
M. I. Center, "APT1: Exposing one of China's cyber espionage units," Mandiant, Tech. Rep, 2013.
-
(2013)
Mandiant, Tech. Rep
-
-
Center, M.I.1
-
9
-
-
84912523449
-
-
Cisco Unified IP Phone Local Kernel System Call Input Validation Vulnerability Cisco Mar.
-
Cisco, "Cisco Unified IP Phone Local Kernel System Call Input Validation Vulnerability," Cisco Security Advisory Advisory ID: cisco-sa-20130109-uipphone, Mar. 2013.
-
(2013)
Cisco Security Advisory Advisory ID: Cisco-sa-20130109-uipphone
-
-
-
10
-
-
84875974092
-
DNS tunneling for network penetration
-
Springer
-
D. Raman, B. De Sutter, B. Coppens, S. Volckaert, K. De Bosschere, P. Danhieux, and E. Van Buggenhout, "DNS tunneling for network penetration," in Information Security and Cryptology-ICISC 2012, Springer, 2013, pp. 65-77.
-
(2013)
Information Security and Cryptology-ICISC 2012
, pp. 65-77
-
-
Raman, D.1
De Sutter, B.2
Coppens, B.3
Volckaert, S.4
De Bosschere, K.5
Danhieux, P.6
Van Buggenhout, E.7
-
12
-
-
0025489261
-
Federated database systems for managing distributed, heterogeneous, and autonomous databases
-
A. P. Sheth and J. A. Larson, "Federated database systems for managing distributed, heterogeneous, and autonomous databases," ACM Comput. Surv. CSUR, vol. 22, no. 3, pp. 183-236, 1990.
-
(1990)
ACM Comput. Surv. CSUR
, vol.22
, Issue.3
, pp. 183-236
-
-
Sheth, A.P.1
Larson, J.A.2
-
14
-
-
84866503884
-
Use of OWL and swrl for semantic relational database translation
-
Washington, DC
-
M. Fisher, M. Dean, and G. Joiner, "Use of OWL and SWRL for Semantic Relational Database Translation," in Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, Washington, DC, 2008.
-
(2008)
Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions
-
-
Fisher, M.1
Dean, M.2
Joiner, G.3
-
15
-
-
84912540387
-
-
Revelytix Homepage
-
"Revelytix Homepage. " [Online]. Available: http://www. revelytix. com.
-
-
-
-
18
-
-
84912540385
-
-
OWL Time Ontology
-
"OWL Time Ontology. " [Online]. Available: http://www. w3. org/TR/owl-time.
-
-
-
-
19
-
-
84912540384
-
-
Basic Formal Ontology (BFO) Homepage
-
"Basic Formal Ontology (BFO) Homepage. " [Online]. Available: http://www. ifomis. org/bfo.
-
-
-
-
20
-
-
84897683915
-
-
DISA
-
DISA, "The Host Based Security System," 2012. [Online]. Available: http://www. disa. mil/Services/Information-Assurance/HBS/HBSS.
-
(2012)
The Host Based Security System
-
-
-
21
-
-
10444251156
-
A taxonomy of grid monitoring systems
-
S. Zanikolas and R. Sakellariou, "A taxonomy of grid monitoring systems," Future Gener. Comput. Syst., vol. 21, no. 1, pp. 163-188, 2005.
-
(2005)
Future Gener. Comput. Syst.
, vol.21
, Issue.1
, pp. 163-188
-
-
Zanikolas, S.1
Sakellariou, R.2
-
22
-
-
3342966061
-
The ganglia distributed monitoring system: Design, implementation, and experience
-
M. L. Massie, B. N. Chun, and D. E. Culler, "The ganglia distributed monitoring system: design, implementation, and experience," Parallel Comput., vol. 30, no. 7, pp. 817-840, 2004.
-
(2004)
Parallel Comput.
, vol.30
, Issue.7
, pp. 817-840
-
-
Massie, M.L.1
Chun, B.N.2
Culler, D.E.3
-
27
-
-
84893537780
-
Safe configuration of TLS connections
-
M. Atighetchi, N. Soule, P. Pal, J. Loyall, A. Sinclair, and R. Grant, "Safe configuration of TLS connections," in Communications and Network Security (CNS), 2013 IEEE Conference on, 2013, pp. 415-422.
-
(2013)
Communications and Network Security (CNS), 2013 IEEE Conference on
, pp. 415-422
-
-
Atighetchi, M.1
Soule, N.2
Pal, P.3
Loyall, J.4
Sinclair, A.5
Grant, R.6
-
28
-
-
17644419220
-
SWRL: A semantic web rule language combining OWL and RuleML
-
I. Horrocks, P. F. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, M. Dean, and others, "SWRL: A semantic web rule language combining OWL and RuleML," W3C Memb. Submiss., vol. 21, p. 79, 2004.
-
(2004)
W3C Memb. Submiss.
, vol.21
, pp. 79
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
|