A Novel Ontology Construction and Reasoning Approach Based on the Case Investigation
暂无分享,去创建一个
Han Zhong | Hongzhou Zhang | Ziyang Yuan | Jianqian Zhang | Ziyang Yuan | Han Zhong | Hongzhou Zhang | Jianqian Zhang
[1] Jugal Kalita,et al. A data reduction scheme for active authentication of legitimate smartphone owner using informative apps ranking , 2019 .
[2] Wanlei Zhou,et al. E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT , 2019, IEEE Internet of Things Journal.
[3] Henryk Krawczyk,et al. Ontology Oriented Threat Detection System (OOTDS) , 2009, 2009 Fourth International Conference on Dependability of Computer Systems.
[4] Mohamad Khalil,et al. Towards a Legal Rule-Based System Grounded on the Integration of Criminal Domain Ontology and Rules , 2017, KES.
[5] Sukhjit Singh Sehra,et al. Analyzing and Displaying of Crime Hotspots using Fuzzy Mapping Method , 2014 .
[6] Naixue Xiong,et al. TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things , 2019, IEEE Access.
[7] Li Ma,et al. Research on Construction and SWRL Reasoning of Ontology of Maize Diseases , 2012, CCTA.
[8] Christopher M. Gifford,et al. Fuzzy association rule mining for community crime pattern discovery , 2010, ISI-KDD '10.
[9] Rose F. Gamble,et al. Developing a platform to evaluate and assess the security of wearable devices , 2019, Digit. Commun. Networks.
[10] Jie Ma,et al. Semantic Information Extraction of Video Based on Ontology and Inference , 2007, International Conference on Semantic Computing (ICSC 2007).
[11] Yisheng Dong,et al. Formal Approach and Automated Tool for Translating ER Schemata into OWL Ontologies , 2004, PAKDD.
[12] Ian Horrocks,et al. The Even More Irresistible SROIQ , 2006, KR.
[13] Liu Qiao,et al. Semantical Symbol Mapping Embedding Learning Algorithm for Knowledge Graph , 2018 .
[14] Marko Grobelnik,et al. A SURVEY OF ONTOLOGY EVALUATION TECHNIQUES , 2005 .
[15] Ravi Shankar,et al. Modeling brain and behavior of a terrorist through fuzzy logic and ontology , 2013, 2013 IEEE International Conference on Industrial Engineering and Engineering Management.
[16] Lao Songyang. Video Semantic Content Analysis Based on Ontology , 2009 .
[17] Chen Jian-yun. Video Semantic Content Analysis Using Extensions to OWL , 2010 .
[18] Timothy W. Finin,et al. CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[19] Riichiro Mizoguchi,et al. Distributed reasoning with ontologies and rules in order-sorted logic programming , 2009, J. Web Semant..
[20] Latif Ullah Khan,et al. Visible light communication: Applications, architecture, standardization and research challenges , 2017, Digit. Commun. Networks.
[21] Hyuk-Chul Kwon,et al. Cyber Forensics Ontology for Cyber Criminal Investigation , 2009, e-Forensics.
[22] Yao Zhang,et al. A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks , 2018, J. Netw. Comput. Appl..
[23] Raymond Y. K. Lau,et al. A Probabilistic Generative Model for Mining Cybercriminal Networks from Online Social Media , 2014, IEEE Computational Intelligence Magazine.