A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment
暂无分享,去创建一个
Michael J. Witbrock | Douglas B. Lenat | Cynthia Matuszek | Blake Shepard | Erik Larson | Todd Hughes | David Crabbe | C. Bruce Fraser | Larry Lefkowitz | William Wechtenhiser | Zelal Güngördü | John Jantos | L. Lefkowitz | Cynthia Matuszek | D. Lenat | M. Witbrock | Blake Shepard | Erik Larson | Todd Hughes | Z. Güngördü | C. B. Fraser | William Wechtenhiser | David Crabbe | John Jantos
[1] Anupam Joshi,et al. Modeling Computer Attacks: An Ontology for Intrusion Detection , 2003, RAID.
[2] Hector Muñoz-Avila,et al. SHOP: Simple Hierarchical Ordered Planner , 1999, IJCAI.
[3] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[4] Wenliang Du,et al. Categorization of Software Errors that led to Security Breaches , 1998 .
[5] Igor V. Kotenko,et al. Attacks Against Computer Network: Formal Grammar-Based Framework and Simulation Tool , 2002, RAID.
[6] 斉藤 康己,et al. Douglas B. Lenat and R. V. Guha : Building Large Knowledge-Based Systems, Representation and Inference in the Cyc Project, Addison-Wesley (1990). , 1990 .
[7] Erland Jonsson,et al. How to systematically classify computer security intrusions , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[8] Howard E. Shrobe,et al. Computational vulnerability analysis for information survivability , 2002, AI Mag..
[9] Ramanathan V. Guha,et al. Building Large Knowledge-Based Systems: Representation and Inference in the Cyc Project , 1990 .
[10] Jeffrey Undercoffer,et al. Modeling Computer Attacks : A Target-Centric Ontology for Intrusion Detection , 2002 .
[11] William L. Fithen,et al. Formal modeling of vulnerability , 2004, Bell Labs Technical Journal.