Khalid Abdulla, Andrew Wirth, et al.
ICIAfS 2014
Knowledge-based techniques have much to offer security practitioners. After brief overviews of these techniques, we review applications described in the literature and suggest others. Applications in other domains that offer insights for security are also described. Requirements for knowledge system tools are discussed in the light of the suggested applications. © 1988.
Khalid Abdulla, Andrew Wirth, et al.
ICIAfS 2014
Rafae Bhatti, Elisa Bertino, et al.
Communications of the ACM
Israel Cidon, Leonidas Georgiadis, et al.
IEEE/ACM Transactions on Networking
Joel L. Wolf, Mark S. Squillante, et al.
IEEE Transactions on Knowledge and Data Engineering