Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
One of the major concerns in the processes which involve human analysts is the existence of uncertainty/inconsistency. In this paper, we propose a model based on belief theory tha...
is the level of abstraction: a logical model ignores the constraints that the underlying database technology imposes and presents a simplified view. Sometimes physical database des...
visualization to abstract data sets like network intrusion detection, recommender systems, and database query results. Although display algorithms are a critical component in the v...
Brent M. Dennis, Sarat Kocherlakota, Amit P. Sawan...
Abstract. Perhaps the most fundamental notion underlying the desiderata for a successful Semantic Web is Semantic Interoperability. In this context, ontologies have been more and m...