Hybrid Information Technology Using Computational Intelligence-Security Intelligence: Web Contents Security System for Semantic Web
In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 4252--819 (2006)
Abstract | This article has no associated abstract. (fix it) |
Keywords | No keywords specified (fix it) |
Categories | (categorize this paper) |
Buy the book |
Find it on Amazon.com
|
Options |
![]() ![]() ![]() ![]() |
Download options
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Explanation and Trust: What to Tell the User in Security and AI? [REVIEW]Wolter Pieters - 2011 - Ethics and Information Technology 13 (1):53-64.
Integration of Intelligence Data Through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In Proceedings of the Conference on Semantic Technology in Intelligence, Defense and Security (STIDS). CEUR, Vol. 808.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Where Computer Security Meets National Security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Dynamics of Crimes Against the Security of Electronic Data and Information Systems and its Influence on the Development of Electronic Business in Lithuania.Tatjana Bilevičienė & Eglė Bilevičiūtė - 2011 - Jurisprudencija: Mokslo darbu žurnalas 18 (2):689-702.
Three Philosophical Lessons for the Analysis of Criminal and Military Intelligence.Christopher Mole - 2012 - Intelligence and National Security 27 (4):441-58.
Online Security: What’s in a Name? [REVIEW]Anat Biletzki - 2013 - Philosophy and Technology 26 (4):397-410.
Special Session on Computational Intelligence Approaches and Methods for Security Engineering-A Study on the Improvement of Military Logistics System Using RFID.Mingyun Kang, Minseong Ju, Taihoon Kim, Geuk Leek & Kyung Sung - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 1098-1102.
Breaking the Cyber-Security Dilemma: Aligning Security Needs and Removing Vulnerabilities.Myriam Dunn Cavelty - 2014 - Science and Engineering Ethics 20 (3):701-715.
Reasoning About Information Assurance Policy with Uncertainty Using the Semantic Web.Stephen F. Bush - forthcoming - Annual Symposium on Information Assurance:1--7.
Collaborative and Experience-Consistent Schemes of System Modelling in Computational Intelligence.Witold Pedrycz - 2009 - In L. Magnani (ed.), Computational Intelligence. pp. 697--723.
Privacy, Secrecy and Security.Paul B. Thompson - 2001 - Ethics and Information Technology 3 (1):13-19.
Foreword: Neurotechnology in National Security, Intelligence and Defense.Michael Swetnam - 2011 - Synesis: A Journal of Science, Technology, Ethics, and Policy 2 (2):T1 - T2.
Analytics
Added to PP index
2014-01-28
Total views
0
Recent downloads (6 months)
0
2014-01-28
Total views
0
Recent downloads (6 months)
0
How can I increase my downloads?
Downloads
Sorry, there are not enough data points to plot this chart.
Sorry, there are not enough data points to plot this chart.