An Ontology Based Approach to Information Security
暂无分享,去创建一个
[1] N. F. Noy,et al. Ontology Development 101: A Guide to Creating Your First Ontology , 2001 .
[2] Luciana Andréia Fondazzi Martimiano,et al. Ontologies for information security management and governance , 2008, Inf. Manag. Comput. Secur..
[3] Jim Harper,et al. Effective Counterterrorism and the Limited Role of Predictive Data Mining , 2006 .
[4] Ralph R. Miller. Information management in the aftermath of 9/11 , 2002, CACM.
[5] David L. Buckeridge,et al. Knowledge-based bioterrorism surveillance , 2002, AMIA.
[6] E. Brouwer. Data Surveillance and Border Control in the EU. Balancing Efficiency and Legal Protection of Third Country Nationals , 2005 .
[7] Luciana Andréia Fondazzi Martimiano,et al. The Evaluation Process of a Computer Security Incident Ontology , 2006, WONTO.
[8] Sergei Nirenburg,et al. Ontology in information security: a useful theoretical foundation and methodological tool , 2001, NSPW '01.
[9] Terrence A. Maxwell,et al. Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.