Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
We present a framework for logic-based matchmaking on ALN ABoxes stored in a relational database. The proposed approach allows both non-standard reasoning and subsumption check be ...
Eufemia Tinelli, Francesco M. Donini, Michele Ruta...
In this paper, we report on two user-centric evaluation studies of COPLINK, a suite of criminal data mining and knowledge management applications developed at the University of Ari...
Chienting Lin, Paul J. Hu, Hsinchun Chen, Jennifer...
Social software is used widely in organizational knowledge management and professional learning. The PROLEARN network of excellence appreciates the trend of lowering the barriers ...
Ralf Klamma, Mohamed Amine Chatti, Erik Duval, Seb...
In Telecommunication Management Network (TMN), the interworking of manager and agent requires the sharing of management information defined as Shared Management Knowledge (SMK) in...