Sciweavers

3096 search results - page 1 / 620
» Ontology: Use and Abuse
Sort
View
AMR
2007
Springer
167views Multimedia» more  AMR 2007»
13 years 10 months ago
Ontology: Use and Abuse
This paper is a critical analysis of the use of ontology as an instrument to specify the semantics of a document. The paper argue that not only is a logic of the type used in ontol...
Simone Santini
CEAS
2006
Springer
13 years 8 months ago
Using Early Results from the 'spamHINTS' Project to Estimate an ISP Abuse Team's Task
ISPs operate "abuse" teams to deal with reports of inappropriate email being sent by their customers. Currently, the majority of this work is dealing with insecure syste...
Richard Clayton
ACSAC
1999
IEEE
13 years 8 months ago
Using Abuse Case Models for Security Requirements Analysis
The relationships between the work products of a security engineering process can be hard to understand, even for persons with a strong technical background but little knowledge o...
John P. McDermott, Chris Fox
RAID
2004
Springer
13 years 10 months ago
On the Design and Use of Internet Sinks for Network Abuse Monitoring
Abstract. Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with ...
Vinod Yegneswaran, Paul Barford, David Plonka
SOFTWARE
2008
13 years 4 months ago
Using and Abusing XML
Diomidis Spinellis