Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/aaai/ShepardMFWCGJHLWLL05
%A Shepard, Blake
%A Matuszek, Cynthia
%A Fraser, C. Bruce
%A Wechtenhiser, William
%A Crabbe, David
%A Güngördü, Zelal
%A Jantos, John
%A Hughes, Todd
%A Lefkowitz, Larry
%A Witbrock, Michael
%A Lenat, Douglas B.
%A Larson, Erik
%B AAAI
%D 2005
%E Veloso, Manuela M.
%E Kambhampati, Subbarao
%I AAAI Press / The MIT Press
%K dblp
%P 1563-1568
%T A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment.
%U http://dblp.uni-trier.de/db/conf/aaai/aaai2005.html#ShepardMFWCGJHLWLL05
%@ 1-57735-236-X
@inproceedings{conf/aaai/ShepardMFWCGJHLWLL05,
added-at = {2023-07-18T00:00:00.000+0200},
author = {Shepard, Blake and Matuszek, Cynthia and Fraser, C. Bruce and Wechtenhiser, William and Crabbe, David and Güngördü, Zelal and Jantos, John and Hughes, Todd and Lefkowitz, Larry and Witbrock, Michael and Lenat, Douglas B. and Larson, Erik},
biburl = {https://www.bibsonomy.org/bibtex/2990cae2b9305674c07e69469068395dd/dblp},
booktitle = {AAAI},
crossref = {conf/aaai/2005},
editor = {Veloso, Manuela M. and Kambhampati, Subbarao},
interhash = {6d1702bbf90979cc695c37dfd7cd524f},
intrahash = {990cae2b9305674c07e69469068395dd},
isbn = {1-57735-236-X},
keywords = {dblp},
pages = {1563-1568},
publisher = {AAAI Press / The MIT Press},
timestamp = {2024-04-10T17:38:25.000+0200},
title = {A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment.},
url = {http://dblp.uni-trier.de/db/conf/aaai/aaai2005.html#ShepardMFWCGJHLWLL05},
year = 2005
}