Sciweavers

3096 search results - page 24 / 620
» Ontology: Use and Abuse
Sort
View
CORIA
2008
13 years 10 months ago
Alignement des ontologies : Utilisation de WordNet et une nouvelle mesure structurelle
Semantic interoperability between heterogeneous sources of information is significant problems because of the number growing of sources of information available on the Web. The use...
Fellah Aissa
DSN
2003
IEEE
14 years 2 months ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
NCA
2003
IEEE
14 years 2 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
ISWC
2003
IEEE
14 years 2 months ago
Peer-to-Peer Policy Management System for Wearable Mobile Devices
Wearable computing devices are obviously made all the more powerful due to their ability to be innately mobile. With this in mind, spontaneous peer-to-peer networks may emerge amo...
Michael Massimi, Ursula Wolz
CSI
2008
113views more  CSI 2008»
13 years 9 months ago
A privacy aware and efficient security infrastructure for vehicular ad hoc networks
VANETs have the potential to dramatically increase road safety by giving drivers more time to react adequately to dangerous situations. To prevent abuse of VANETs, a security infra...
Klaus Plößl, Hannes Federrath