{"title":"A framework for syntactic and semantic quality evaluation of ontologies","authors":"Vivek Iyer, L. Sanagavarapu, R. Reddy","doi":"10.1007/978-3-030-97532-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_5","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127040720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence","authors":"Md. Farhan Haque, R. Krishnan","doi":"10.1007/978-981-15-3817-9_2","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_2","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122476608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effect of Threat and Proximity on Cyber-Rumor Sharing","authors":"Rohit Valecha, Tejaswi Volety, K. Kwon, H. Rao","doi":"10.1007/978-981-15-3817-9_11","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_11","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indian New Currency Denomination Identification System with Audio Feedback Using Convolution Neural Networks for Visually Challenged and Elderly People","authors":"Padma Vasavi Kalluru","doi":"10.1007/978-981-15-3817-9_5","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_5","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123241156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis","authors":"Shuvra Chakraborty, R. Sandhu, R. Krishnan","doi":"10.1007/978-981-15-3817-9_9","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_9","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133721340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Securing Trust in Online Social Networks","authors":"Vishnu S. Pendyala","doi":"10.1007/978-981-15-3817-9_12","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_12","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Analysis of Unified Access Control Policies","authors":"M. Singh, S. Sural, V. Atluri, Jaideep Vaidya","doi":"10.1007/978-981-15-3817-9_8","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_8","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122291259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent Threats","authors":"Rudra Prasad Baksi, S. Upadhyaya","doi":"10.1007/978-981-15-3817-9_3","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_3","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"391 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133190410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}