共 50 条
- [1] An Approach to Security Policy Configuration Using Semantic Threat Graphs [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 33 - 48
- [3] A PRACTICAL APPROACH TO SEMANTIC CONFIGURATION MANAGEMENT [J]. PROCEEDINGS OF THE ACM SIGSOFT 89: THIRD SYMPOSIUM ON SOFTWARE TESTING, ANALYSIS, AND VERIFICATION ( TAV 3 ), 1989, 14 : 103 - 113
- [4] A novel approach for security function graph configuration and deployment [J]. PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 457 - 463
- [5] A policy based approach to security for the Semantic Web [J]. SEMANTIC WEB - ISWC 2003, 2003, 2870 : 402 - 418
- [6] Threat-Oriented Security Framework: A Proactive Approach in Threat Management [J]. 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT-2012), 2012, 4 : 487 - 494
- [8] A webometric approach to policy analysis and management using exponential random graph models [J]. Quality & Quantity, 2015, 49 : 581 - 598
- [10] A Semantic Approach for Cyber Threat Prediction Using Machine Learning [J]. PROCEEDINGS OF THE 2019 3RD INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC 2019), 2019, : 435 - 438