Conference paper
Social networks and discovery in the enterprise (SaND)
Inbal Ronen, Elad Shahar, et al.
SIGIR 2009
Knowledge-based techniques have much to offer security practitioners. After brief overviews of these techniques, we review applications described in the literature and suggest others. Applications in other domains that offer insights for security are also described. Requirements for knowledge system tools are discussed in the light of the suggested applications. © 1988.
Inbal Ronen, Elad Shahar, et al.
SIGIR 2009
Apostol Natsev, Alexander Haubold, et al.
MMSP 2007
Sai Zeng, Angran Xiao, et al.
CAD Computer Aided Design
Yvonne Anne Pignolet, Stefan Schmid, et al.
Discrete Mathematics and Theoretical Computer Science