Description of a Network Attack Ontology Presented Formally

Author:

van Heerden Renier,Leenen Louise,Irwin Barry

Publisher

Springer International Publishing

Reference80 articles.

1. Balepin, I., Maltsev, S., Rowe, J., & Levitt, K. (2003). Using specification-based intrusion detection for automated response. In Recent advances in intrusion detection (pp. 136–154).

2. Gruber, T. R. (1993). A translation approach to portable ontology specifications. Knowledge Acquisition, 5(2), 199–220.

3. Noy, N. F., & McGuinness, D. (2001). Ontology development 101: A guide to creating your first ontology. Technical report KSL-01-05, SMI-2001-0880, Stanford Knowledge Systems Laboratory and Stanford Medical Informatics Technical Report

4. Velasco, D., & Rodriguez, G. (2017). Ontologies for network security and future challenges. arXiv:abs/1704.02441.

5. Abioye, T. E., Arogundade, O. T., Misra, S., Akinwale, A. T., & Adeniran, O. J. (2020). Toward ontology-based risk management framework for software projects: An empirical study. Journal of Software: Evolution and Process, 32(12),

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3