Secure Knowledge Management最新文献

筛选
英文 中文
A framework for syntactic and semantic quality evaluation of ontologies 本体的句法和语义质量评价框架
Secure Knowledge Management Pub Date : 2021-12-16 DOI: 10.1007/978-3-030-97532-6_5
Vivek Iyer, L. Sanagavarapu, R. Reddy
{"title":"A framework for syntactic and semantic quality evaluation of ontologies","authors":"Vivek Iyer, L. Sanagavarapu, R. Reddy","doi":"10.1007/978-3-030-97532-6_5","DOIUrl":"https://doi.org/10.1007/978-3-030-97532-6_5","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127040720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence 基于关系的结构化网络威胁情报安全共享访问控制研究
Secure Knowledge Management Pub Date : 2019-12-21 DOI: 10.1007/978-981-15-3817-9_2
Md. Farhan Haque, R. Krishnan
{"title":"Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence","authors":"Md. Farhan Haque, R. Krishnan","doi":"10.1007/978-981-15-3817-9_2","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_2","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122476608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UnderTracker: Binary Hardening Through Execution Flow Verification UnderTracker:通过执行流验证的二进制强化
Secure Knowledge Management Pub Date : 2019-12-21 DOI: 10.1007/978-981-15-3817-9_1
R. Shrivastava, C. Hota, Govind Mittal, Z. Akhtar
{"title":"UnderTracker: Binary Hardening Through Execution Flow Verification","authors":"R. Shrivastava, C. Hota, Govind Mittal, Z. Akhtar","doi":"10.1007/978-981-15-3817-9_1","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_1","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"255 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131730778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Effect of Threat and Proximity on Cyber-Rumor Sharing 威胁和接近对网络谣言分享的影响
Secure Knowledge Management Pub Date : 2019-12-21 DOI: 10.1007/978-981-15-3817-9_11
Rohit Valecha, Tejaswi Volety, K. Kwon, H. Rao
{"title":"The Effect of Threat and Proximity on Cyber-Rumor Sharing","authors":"Rohit Valecha, Tejaswi Volety, K. Kwon, H. Rao","doi":"10.1007/978-981-15-3817-9_11","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_11","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134510475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indian New Currency Denomination Identification System with Audio Feedback Using Convolution Neural Networks for Visually Challenged and Elderly People 使用卷积神经网络的音频反馈印度新货币面额识别系统,用于视障人士和老年人
Secure Knowledge Management Pub Date : 2019-12-21 DOI: 10.1007/978-981-15-3817-9_5
Padma Vasavi Kalluru
{"title":"Indian New Currency Denomination Identification System with Audio Feedback Using Convolution Neural Networks for Visually Challenged and Elderly People","authors":"Padma Vasavi Kalluru","doi":"10.1007/978-981-15-3817-9_5","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_5","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123241156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Ransomware Detection Techniques 勒索软件检测技术综述
Secure Knowledge Management Pub Date : 2019-12-21 DOI: 10.1007/978-981-15-3817-9_4
C. V. Bijitha, Rohit Sukumaran, Hiran V. Nath
{"title":"A Survey on Ransomware Detection Techniques","authors":"C. V. Bijitha, Rohit Sukumaran, Hiran V. Nath","doi":"10.1007/978-981-15-3817-9_4","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_4","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115357861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis 关于RBAC在ABAC策略挖掘中的可行性的形式化分析
Secure Knowledge Management Pub Date : 2019-12-21 DOI: 10.1007/978-981-15-3817-9_9
Shuvra Chakraborty, R. Sandhu, R. Krishnan
{"title":"On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis","authors":"Shuvra Chakraborty, R. Sandhu, R. Krishnan","doi":"10.1007/978-981-15-3817-9_9","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_9","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133721340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Securing Trust in Online Social Networks 确保在线社交网络的信任
Secure Knowledge Management Pub Date : 2019-12-21 DOI: 10.1007/978-981-15-3817-9_12
Vishnu S. Pendyala
{"title":"Securing Trust in Online Social Networks","authors":"Vishnu S. Pendyala","doi":"10.1007/978-981-15-3817-9_12","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_12","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Security Analysis of Unified Access Control Policies 统一访问控制策略的安全性分析
Secure Knowledge Management Pub Date : 2019-12-21 DOI: 10.1007/978-981-15-3817-9_8
M. Singh, S. Sural, V. Atluri, Jaideep Vaidya
{"title":"Security Analysis of Unified Access Control Policies","authors":"M. Singh, S. Sural, V. Atluri, Jaideep Vaidya","doi":"10.1007/978-981-15-3817-9_8","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_8","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122291259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent Threats 霸天虎:对抗高级持续性威胁的隐马尔可夫模型方法
Secure Knowledge Management Pub Date : 2019-12-21 DOI: 10.1007/978-981-15-3817-9_3
Rudra Prasad Baksi, S. Upadhyaya
{"title":"Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent Threats","authors":"Rudra Prasad Baksi, S. Upadhyaya","doi":"10.1007/978-981-15-3817-9_3","DOIUrl":"https://doi.org/10.1007/978-981-15-3817-9_3","url":null,"abstract":"","PeriodicalId":373029,"journal":{"name":"Secure Knowledge Management","volume":"391 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133190410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信