咨询与建议

限定检索结果

文献类型

  • 1 篇 会议

馆藏范围

  • 1 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1 篇 工学
    • 1 篇 计算机科学与技术...

主题

  • 1 篇 cognition
  • 1 篇 access right man...
  • 1 篇 knowledge repres...
  • 1 篇 drugs
  • 1 篇 security of data
  • 1 篇 hospitals
  • 1 篇 health care
  • 1 篇 reasoning techni...
  • 1 篇 silicon
  • 1 篇 computers
  • 1 篇 answer set progr...
  • 1 篇 inference mechan...
  • 1 篇 organisational a...
  • 1 篇 security
  • 1 篇 organization it ...
  • 1 篇 ehealth scenario
  • 1 篇 organizational s...
  • 1 篇 systems analysis
  • 1 篇 security analysi...
  • 1 篇 computer aided t...

机构

  • 1 篇 tsinghua univ sc...
  • 1 篇 univ trento disi...

作者

  • 1 篇 paci federica
  • 1 篇 asnar yudistira
  • 1 篇 massacci fabio
  • 1 篇 li tong

语言

  • 1 篇 英文
检索条件"主题词=answer set programming logic rules"
1 条 记 录,以下是1-10 订阅
排序:
Computer Aided Threat Identification
Computer Aided Threat Identification
收藏 引用
13th IEEE International Conference on Commerce and Enterprise Computing (CEC)
作者: Asnar, Yudistira Li, Tong Massacci, Fabio Paci, Federica Univ Trento DISI Trento Italy Tsinghua Univ Sch Software Beijing Peoples R China
Recently, there has been an increase of reported security threats hitting organizations. Some of them are originated from the assignments to users of inappropriate permissions on organizational sensitive data. Thus it... 详细信息
来源: 评论