Sciweavers

445 search results - page 6 / 89
» Anomalies in ontologies with rules
Sort
View
CSREASAM
2006
13 years 8 months ago
Firewall Rules Analysis
- In this paper, we propose a method to analyze the firewall policy or rule-set using Relational Algebra and Raining 2D-Box Model. It can discover all the anomalies in the firewall...
Thawatchai Chomsiri, Chotipat Pornavalai
AUSDM
2007
Springer
84views Data Mining» more  AUSDM 2007»
14 years 27 days ago
Detecting Anomalous Longitudinal Associations Through Higher Order Mining
The detection of unusual or anomalous data is an important function in automated data analysis or data mining. However, the diversity of anomaly detection algorithms shows that it...
Ping Liang, John F. Roddick
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
14 years 6 months ago
Data Modelling versus Ontology Engineering
Ontologies in current computer science parlance are computer based resources that represent agreed domain semantics. Unlike data models, the fundamental asset of ontologies is the...
Peter Spyns, Robert Meersman, Mustafa Jarrar
DSOM
2006
Springer
13 years 10 months ago
Ontology-Based Policy Refinement Using SWRL Rules for Management Information Definitions in OWL
Abstract. The goal of ontology-based management is to improve the manageability of network resources through the application of formal ontologies. Prior research work has studied t...
Antonio Guerrero, Víctor A. Villagrá...
IAW
2003
IEEE
14 years 2 hour ago
An Evolutionary Approach to Generate Fuzzy Anomaly Signatures
Abstract— This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the princ...
Fabio A. González, Jonatan Gómez, Ma...