共 23 条
[1]
ALMAMORY S, 2009, INTRUSION DETECTION, P419
[2]
Baader F, 2003, DESCRIPTION LOGIC HANDBOOK: THEORY, IMPLEMENTATION AND APPLICATIONS, P43
[3]
BALASUBRAMANIYA.J, 1998, ARCHITECTURE INTRUSI
[4]
Building legal ontologies with METHONTOLOGY and WebODE
[J].
LAW AND THE SEMANTIC WEB: LEGAL ONTOLOGIES, METHODOLOGIES, LEGAL INFORMATION RETRIEVAL, AND APPLICATIONS,
2005, 3369
:142-157
[5]
CUPPENS F, 2002, IEEE S SEC PRIV OAKL
[6]
An ontology-based approach to react to network attacks
[J].
CRISIS: 2008 THIRD INTERNATIONAL CONFERENCE ON RISKS AND SECURITY OF INTERNET AND SYSTEMS, PROCEEDINGS,
2008,
:27-+
[7]
DARPA, DARPA DARPA INTR DET
[8]
Denker G, 2003, LECT NOTES COMPUT SC, V2870, P335
[9]
Friedman-Hill E., 2009, Jess - The rule engine for the Java platform
[10]
Goldman R, 2009, INT LISP C 2009 ASS