![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Wouters Carlo Dillon Tharam Rahayu Wenny Chang Elizabeth
Publisher: Inderscience Publishers
ISSN: 1741-1106
Source: International Journal of Web and Grid Services, Vol.1, Iss.1, 2005-08, pp. : 113-135
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Using an Ontology for Network Attack Planning
International Journal of Cyber Warfare and Terrorism (IJCWT), Vol. 6, Iss. 3, 2016-07 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/o.png)
![](/images/ico/ico5.png)
一种基于本体约束的知识抽取方法 An Approach of Knowledge Extraction Restrained by Ontology
Computer Science and Application, Vol. 01, Iss. 03, 2011-12 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)