Using ontologies to perform threat analysis and develop defensive strategies for mobile security
Year of publication: |
March 2017
|
---|---|
Authors: | Wang, Ping ; Chao, Kuo-Ming ; Lo, Chi-Chun ; Wang, Yu-Shih |
Published in: |
Information technology and management. - New York, NY [u.a.] : Springer, ISSN 1385-951X, ZDB-ID 2212813-X. - Vol. 18.2017, 1, p. 1-25
|
Subject: | Threat risk analysis | Mobile virus | Ontology | Behavior analysis | Code analysis | Ontologie | Datensicherheit | Data security | Risikomanagement | Risk management | Mobilkommunikation | Mobile communications |
-
Weber, Leonie, (2021)
-
Cybersecurity vulnerability management : a conceptual ontology and cyber intelligence alert system
Syed, Romilla, (2020)
-
Mobile users' strategies for managing phishing attacks
El-din, Rasha Salah, (2014)
- More ...
-
An evidence-based scheme for web service selection
Wang, Ping, (2011)
-
An evidence-based scheme for web service selection
Wang, Ping, (2011)
-
A Novel Real-Time Speech Summarizer System for the Learning of Sustainability
Wang, Hsiu-Wen, (2015)
- More ...