A Generalized Associative Petri Net for Reasoning
暂无分享,去创建一个
N.E. Fenton | M. Neil | J. Galan Caballero | N. Fenton | M. Neil | Dong-Her Shih | Hsiu-Sen Chiang | J. Galan Caballero | Binshan Lin
[1] Carl G. Looney. Fuzzy Petri Nets and Applications , 1994 .
[2] Jin-Fu Chang,et al. Knowledge Representation Using Fuzzy Petri Nets , 1990, IEEE Trans. Knowl. Data Eng..
[3] Hsiu-Sen Chiang,et al. E-mail viruses: how organizations can protect their e-mails , 2004, Online Inf. Rev..
[4] Asunción Gómez-Pérez,et al. Methodologies, tools and languages for building ontologies: Where is their meeting point? , 2003, Data Knowl. Eng..
[5] Donald Michie,et al. Machine learning of rules and trees , 1995 .
[6] Tadao Murata,et al. Petri nets: Properties, analysis and applications , 1989, Proc. IEEE.
[7] Jose Manuel Corera,et al. Building and Reusing Ontologies for Electrical Network Applications , 1996, ECAI.
[8] rey O. Kephart,et al. Automatic Extraction of Computer Virus SignaturesJe , 2006 .
[9] David C. Yen,et al. Classification methods in the detection of new malicious emails , 2005, Inf. Sci..
[10] Xiaoou Li,et al. Dynamic knowledge inference and learning under adaptive fuzzy Petri net framework , 2000, IEEE Trans. Syst. Man Cybern. Part C.
[11] Riichiro Mizoguchi. Tutorial on Ontological Engineering: Part 1: Introduction to Ontological Engineering. , 2003 .
[12] Karl N. Levitt,et al. MCF: a malicious code filter , 1995, Comput. Secur..
[13] Carlos Flavián,et al. Consumer trust, perceived security and privacy policy: Three basic elements of loyalty to a web site , 2006, Ind. Manag. Data Syst..
[14] B. C. Vickery,et al. Ontologies , 1997, J. Inf. Sci..
[15] Sangkyun Kim,et al. Enterprise security architecture in business convergence environments , 2005, Ind. Manag. Data Syst..
[16] Daniel S. Yeung,et al. A multilevel weighted fuzzy reasoning algorithm for expert systems , 1998, IEEE Trans. Syst. Man Cybern. Part A.
[17] Austin Tate,et al. Guest Editors' Introduction: Ontologies , 1999 .
[18] Michael Gruninger,et al. Methodology for the Design and Evaluation of Ontologies , 1995, IJCAI 1995.
[19] Gary McGraw,et al. Attacking Malicious Code: A Report to the Infosec Research Council , 2000, IEEE Software.
[20] Douglas B. Lenat,et al. CYC: a large-scale investment in knowledge infrastructure , 1995, CACM.
[21] Vijayan Sugumaran,et al. Ontologies for conceptual modeling: their creation, use, and management , 2002, Data Knowl. Eng..
[22] Rakesh Agarwal,et al. Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.
[23] Zoubida Kedad,et al. Dealing with Semantic Heterogeneity During Data Integration , 1999, ER.
[24] Ramanathan V. Guha,et al. Building Large Knowledge-Based Systems: Representation and Inference in the Cyc Project , 1990 .
[25] Hsiu-Sen Chiang,et al. Internet security: malicious e-mails detection and protection , 2004, Ind. Manag. Data Syst..
[26] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[27] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[28] Martin L. King,et al. Towards a Methodology for Building Ontologies , 1995 .
[29] Karl N. Levitt,et al. Automated assistance for detecting malicious code , 1993 .
[30] Xiaoou Li,et al. Adaptive fuzzy petri nets for dynamic knowledge representation and inference , 2000 .
[31] Riichiro Mizoguchi,et al. Part 1: Introduction to ontological engineering , 2003, New Generation Computing.
[32] Tomasz Imielinski,et al. Database Mining: A Performance Perspective , 1993, IEEE Trans. Knowl. Data Eng..
[33] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[34] Witold Pedrycz,et al. A generalized fuzzy Petri net model , 1994, IEEE Trans. Fuzzy Syst..
[35] W. Pedrycz,et al. OR/AND neuron in modeling fuzzy set connectives , 1994, IEEE Trans. Fuzzy Syst..
[36] C. G. Looney,et al. Logical controls via Boolean rule matrix transformations , 1987, IEEE Transactions on Systems, Man, and Cybernetics.
[37] Kathleen Dahlgren,et al. A linguistic ontology , 1995, Int. J. Hum. Comput. Stud..