Abstract—Network Intrusion Detection and Prevention Systems (NIDPSs) are vital in the fight against network intrusions. NIDPSs search for certain malicious content in network tr...
N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, H. Jo...
Although the privacy threats and countermeasures associated with location data are well known, there has not been a thorough experiment to assess the effectiveness of either. We ex...
Abstract. In this paper we give an overview of the int.ere.st for a social tagging, bookmarking, and sharing service. It is based on the SCOT ontology. The SCOT ontology can repres...
Hak Lae Kim, Sung-Kwon Yang, Seung-Jae Song, John ...
Ontologies have been proven invaluable tools both for the semantic web and for personal information management. In the context of a historical archive an ontology may provide mean...
Elena Torou, Akrivi Katifori, Costas Vassilakis, G...
The desire for definitive data and the semantic web drive for inference over heterogeneous data sources requires co-reference resolution to be performed on those data. In particul...