David A. Selby
IBM J. Res. Dev
Knowledge-based techniques have much to offer security practitioners. After brief overviews of these techniques, we review applications described in the literature and suggest others. Applications in other domains that offer insights for security are also described. Requirements for knowledge system tools are discussed in the light of the suggested applications. © 1988.
David A. Selby
IBM J. Res. Dev
Xinyi Su, Guangyu He, et al.
Dianli Xitong Zidonghua/Automation of Electric Power Systems
Chidanand Apté, Fred Damerau, et al.
ACM Transactions on Information Systems (TOIS)
Maurice Hanan, Peter K. Wolff, et al.
DAC 1976