共 50 条
[31]
Constructing Enterprise Information Network Security Risk Management Mechanism by Ontology
[J].
JOURNAL OF APPLIED SCIENCE AND ENGINEERING,
2010, 13 (01)
:79-87
[33]
An UML to OWL based approach for extracting Moodle's Ontology for Social Network Analysis
[J].
SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2018),
2019, 148
:313-322
[35]
Environmental Metrics for Software Security Based on a Vulnerability Ontology
[J].
2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS,
2009,
:159-168
[37]
A Security Ontology for Security Requirements Elicitation
[J].
ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015),
2015, 8978
:157-175
[38]
An Ontology Based Approach to Data Surveillance
[J].
PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY,
2008,
:169-174
[40]
Ontology-Driven Cyber-Security Threat Assessment Based on Sentiment Analysis of Network Activity Data
[J].
2014 INTERNATIONAL CONFERENCE ON CLOUD AND AUTONOMIC COMPUTING (ICCAC 2014),
2014,
:5-14