-
1
-
-
0038443107
-
A new taxonomy of Web attacks suitable for efficient encoding
-
Álvarez, G., & Petrovic, S. (2003). A new taxonomy of Web attacks suitable for efficient encoding. Computers & Security, 22(5), 435–449.
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 435-449
-
-
Álvarez, G.1
Petrovic, S.2
-
3
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Department of Computer Engineering, Chalmers University of Technology
-
Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy (Tech. Rep. No. 99–15). Department of Computer Engineering, Chalmers University of Technology.
-
(2000)
Tech. Rep. No. 99–15
-
-
Axelsson, S.1
-
4
-
-
10044257236
-
-
Retrieved June 28, 2007, from http://www.w3.org/TR/owl-ref/
-
Bechhofer, S., van Harmelen, F., Hendler, J., Horrocks, I., McGuinness, D. L., Patel-Schneider, P. F., & Stein, L. A. (2004). OWL Web ontology language reference. Retrieved June 28, 2007, from http://www.w3.org/TR/owl-ref/
-
(2004)
OWL Web ontology language reference
-
-
Bechhofer, S.1
van Harmelen, F.2
Hendler, J.3
Horrocks, I.4
McGuinness, D.L.5
Patel-Schneider, P.F.6
Stein, L.A.7
-
7
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
Chakrabarti, A., & Manimaran, G. (2002). Internet infrastructure security: A taxonomy. IEEE Internet Computing, 16(6), 13–21.
-
(2002)
IEEE Internet Computing
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
8
-
-
84976766949
-
The entity-relationship model: Toward a unified view of data
-
Chen, P.P.-S. (1976). The entity-relationship model: Toward a unified view of data. ACM Transactions on Database Systems (TODS), 1(1), 9–36.
-
(1976)
ACM Transactions on Database Systems (TODS)
, vol.1
, Issue.1
, pp. 9-36
-
-
Chen, P.P.-S.1
-
9
-
-
0033293396
-
Towards a taxonomy of intrusiondetection systems
-
Debar, H., Dacier, M., & Wespi, A. (1999). Towards a taxonomy of intrusiondetection systems. Computer Networks, 31, 805–822.
-
(1999)
Computer Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
11
-
-
33646148762
-
Toward a security ontology
-
Donner, M. (2003). Toward a security ontology. IEEE Security and Privacy, 1(3), 6–7.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.3
, pp. 6-7
-
-
Donner, M.1
-
12
-
-
58149365542
-
Toward principles for the design of ontologies used for knowledge sharing
-
Gruber, T. R. (1995). Toward principles for the design of ontologies used for knowledge sharing. International Journal of Human-Computer Studies, 43(5–6), 907–928.
-
(1995)
International Journal of Human-Computer Studies
, vol.43
, Issue.5-6
, pp. 907-928
-
-
Gruber, T.R.1
-
15
-
-
17444423290
-
Sociotechnical architecture for online privacy
-
Jutla, D. N., & Bodorik, P. (2005). Sociotechnical architecture for online privacy. IEEE Security and Privacy, 3(2), 29–39.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 29-39
-
-
Jutla, D.N.1
Bodorik, P.2
-
16
-
-
33646699357
-
Security ontology for annotating resources
-
Springer-Verlag. Lecture Notes in Computer Science 3761
-
Kim, A., Luo, J., & Kang, M. (2005). Security ontology for annotating resources. In Proceedings of the On the Move to Meaningful Internet Systems: CoopIS, DOA, and ODBASE (pp. 1483–1499). Springer-Verlag. Lecture Notes in Computer Science 3761.
-
(2005)
In Proceedings of the On the Move to Meaningful Internet Systems: CoopIS, DOA, and ODBASE
, pp. 1483-1499
-
-
Kim, A.1
Luo, J.2
Kang, M.3
-
17
-
-
28944449676
-
Ontologies in bioinformatics and systems biology
-
In W. Dubitzky & F. Azuaje (Eds.) Springer-Verlag
-
Lambrix, P. (2004). Ontologies in bioinformatics and systems biology. In W. Dubitzky & F. Azuaje (Eds.), Artificial intelligence methods and tools for systems biology (pp. 129–146). Springer-Verlag.
-
(2004)
Artificial intelligence methods and tools for systems biology
, pp. 129-146
-
-
Lambrix, P.1
-
19
-
-
77954470646
-
Ontology alignment and merging
-
In A. Burger, D. Davidson, & R. Baldock (Eds.), Springer-Verlag.
-
Lambrix, P., & Tan, H. (2007). Ontology alignment and merging. In A. Burger, D. Davidson, & R. Baldock (Eds.), Anatomy ontologies for bioinformatics: Principles and practice. Springer-Verlag.
-
(2007)
Anatomy ontologies for bioinformatics: Principles and practice
-
-
Lambrix, P.1
Tan, H.2
-
20
-
-
84919968378
-
Biological ontologies
-
In C. J. Baker & K.-H. Cheung (Eds.) Springer-Verlag
-
Lambrix, P., Tan, H., Jakoniene, V., & Strömbäck, L. (2007). Biological ontologies. In C. J. Baker & K.-H. Cheung (Eds.), Semantic Web: Revolutionizing knowledge discovery in the life sciences (pp. 85–99). Springer-Verlag.
-
(2007)
Semantic Web: Revolutionizing knowledge discovery in the life sciences
, pp. 85-99
-
-
Lambrix, P.1
Tan, H.2
Jakoniene, V.3
Strömbäck, L.4
-
22
-
-
0026219884
-
Enabling technology for knowledge sharing
-
Neches, R., Fikes, R., Finin, T. W., Gruber, T. R., Patil, R., Senator, T. E., & Swartout, W. R. (1991). Enabling technology for knowledge sharing. AI Magazine, 12(3), 36–56.
-
(1991)
AI Magazine
, vol.12
, Issue.3
, pp. 36-56
-
-
Neches, R.1
Fikes, R.2
Finin, T.W.3
Gruber, T.R.4
Patil, R.5
Senator, T.E.6
Swartout, W.R.7
-
23
-
-
26444492656
-
Ontologybased policy specification and management
-
Springer-Verlag. Lecture Notes in Computer Science 3532
-
Nejdl, W., Olmedilla, D., Winslett, M., & Zhang, C. C. (2005). Ontologybased policy specification and management. In Proceedings of the 2nd European Semantic Web Conference (ESCW'05) (pp. 290–302). Springer-Verlag. Lecture Notes in Computer Science 3532.
-
(2005)
In Proceedings of the 2nd European Semantic Web Conference (ESCW'05)
, pp. 290-302
-
-
Nejdl, W.1
Olmedilla, D.2
Winslett, M.3
Zhang, C.C.4
-
26
-
-
70350684549
-
-
Oxford Reference Online). Author
-
Oxford University Press. (2004). A dictionary of computing (Oxford Reference Online). Author.
-
(2004)
A dictionary of computing
-
-
-
27
-
-
1642351286
-
-
Retrieved June 28, 2007, from http://www.w3.org/TR/ owl-absyn/
-
Patel-Schneider, P. F., Hayes, P., & Horrocks, I. (2004). OWL Web ontology language semantics and abstract syntax. Retrieved June 28, 2007, from http://www.w3.org/TR/ owl-absyn/
-
(2004)
OWL Web ontology language semantics and abstract syntax
-
-
Patel-Schneider, P.F.1
Hayes, P.2
Horrocks, I.3
-
30
-
-
22944436485
-
OWL pizzas: Practical experience of teaching OWL-DL: Common errors and common patterns
-
Springer-Verlag. Lecture Notes in Computer Science 3257
-
Rector, A., Drummond, N., Horridge, M., Rogers, J., Knublauch, H., Stevens, R., Wang, H., & Wroe, C. (2004). OWL pizzas: Practical experience of teaching OWL-DL: Common errors and common patterns. In Proceedings of the 14th International Conference of Engineering Knowledge in the Age of the SemanticWeb (EKAW'04) (pp. 63–81). Springer-Verlag. Lecture Notes in Computer Science 3257.
-
(2004)
In Proceedings of the 14th International Conference of Engineering Knowledge in the Age of the SemanticWeb (EKAW'04)
, pp. 63-81
-
-
Rector, A.1
Drummond, N.2
Horridge, M.3
Rogers, J.4
Knublauch, H.5
Stevens, R.6
Wang, H.7
Wroe, C.8
-
33
-
-
32844474610
-
Achieving privacy in trust negotiations with an ontology-based approach
-
Squicciarini, A. C., Bertino, E., Ferrari, E., & Ray, I. (2006). Achieving privacy in trust negotiations with an ontology-based approach. IEEE Transactions on Dependable and Secure Computing, 3(1), 13–30.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 13-30
-
-
Squicciarini, A.C.1
Bertino, E.2
Ferrari, E.3
Ray, I.4
-
35
-
-
0034332545
-
Ontology-based knowledge representation for bioinformatics
-
Stevens, R., Goble, C. A., & Bechhofer, S. (2000). Ontology-based knowledge representation for bioinformatics. Briefings in Bioinformatics, 1(4), 398–414.
-
(2000)
Briefings in Bioinformatics
, vol.1
, Issue.4
, pp. 398-414
-
-
Stevens, R.1
Goble, C.A.2
Bechhofer, S.3
-
37
-
-
33744502660
-
An ontology-based e-learning system for network security
-
IEEE
-
Takahashi, Y., Abiko, T., Negishi, E., Itabashi, G., Kato, Y., Takahashi, K., & Shiratori, N. (2005). An ontology-based e-learning system for network security. Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05), 1, 197–202. IEEE.
-
(2005)
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05)
, vol.1
, pp. 197-202
-
-
Takahashi, Y.1
Abiko, T.2
Negishi, E.3
Itabashi, G.4
Kato, Y.5
Takahashi, K.6
Shiratori, N.7
-
38
-
-
33646150432
-
An ontology-based approach to information systems security management
-
In Gorodetsky, V., Kotenko, I., & Skormin, V. (Eds.) Springer-Verlag. Lecture Notes in Computer Science 3685
-
Tsoumas, B., Dritsas, S., & Gritzalis, D. (2005). An ontology-based approach to information systems security management. In Gorodetsky, V., Kotenko, I., & Skormin, V. (Eds.), Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS'05) (pp. 151–164). Springer-Verlag. Lecture Notes in Computer Science 3685.
-
(2005)
Computer Network Security: Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS'05)
, pp. 151-164
-
-
Tsoumas, B.1
Dritsas, S.2
Gritzalis, D.3
-
39
-
-
2942530528
-
Using DAML+OIL to classify intrusive behaviors
-
Undercoffer, J., Joshi, A., Finin, T., & Pinkston, J. (2004). Using DAML+OIL to classify intrusive behaviors. The Knowledge Engineering Review, pp. 221–241.
-
(2004)
The Knowledge Engineering Review
, pp. 221-241
-
-
Undercoffer, J.1
Joshi, A.2
Finin, T.3
Pinkston, J.4
-
40
-
-
0038819499
-
A taxonomy for information security technologies
-
Venter, H. S., & Eloff, J. H. P. (2003). A taxonomy for information security technologies. Computers & Security, 22(4), 299–307.
-
(2003)
Computers & Security
, vol.22
, Issue.4
, pp. 299-307
-
-
Venter, H.S.1
Eloff, J.H.P.2
-
41
-
-
1942521938
-
Taxonomy of security considerations and software quality
-
Wang, H., & Wang, C. (2003). Taxonomy of security considerations and software quality. Communications of the ACM, 46(6), 75–78.
-
(2003)
Communications of the ACM
, vol.46
, Issue.6
, pp. 75-78
-
-
Wang, H.1
Wang, C.2
-
44
-
-
49049117728
-
Modeling and visualizing security properties of code using dependence graphs
-
Retrieved June 28, 2007, from http: //www.idt.mdh.se/serps-05/SERPS05.pdf
-
Wilander, J. (2005). Modeling and visualizing security properties of code using dependence graphs. In Proceedings of the 5th Conference on Software Engineering Research and Practice in Sweden (pp. 65–74). Retrieved June 28, 2007, from http: //www.idt.mdh.se/serps-05/SERPS05.pdf
-
(2005)
In Proceedings of the 5th Conference on Software Engineering Research and Practice in Sweden
, pp. 65-74
-
-
Wilander, J.1
|