Abstract is missing.
- Scalable Semantically Driven Decision Trees for Crime DataShawn Johnson, George Karabatis. 2-9 [doi]
- Using Ontologies to Quantify Attack SurfacesMichael Atighetchi, Borislava I. Simidechieva, Fusun Yaman, Thomas C. Eskridge, Marco M. Carvalho, Nicholas Paltzer. 10-18 [doi]
- Developing an Ontology for Individual and Organizational Sociotechnical Indicators of Insider Threat RiskFrank L. Greitzer, Muhammad Imran, Justin Purl, Elise T. Axelrad, Yung Mei Leong, D. E. Becker, Kathryn B. Laskey, Paul J. Sticha. 19-27 [doi]
- An Extended Maritime Domain Awareness Probabilistic Ontology Derived from Human-aided Multi-Entity Bayesian Networks LearningCheol Young Park, Kathryn Blackmond Laskey, Paulo C. G. Costa. 28-36 [doi]
- PR-OWL Decision: Toward Reusable Ontology Language for Decision Making under UncertaintyShou Matsumoto, Kathryn B. Laskey, Paulo C. G. Costa. 37-45 [doi]
- Sharing Data under Genetic Privacy LawsMichael Reep, Bo Yu, Duminda Wijesekera, Paulo C. G. Costa. 46-54 [doi]
- Effects-Based Air Operations Planning Framework: A Knowledge-Based Simulation ApproachAndré N. Costa, Paulo C. G. Costa. 55-62 [doi]
- A Holistic Approach to Evaluate Cyber ThreatMarcio Monteiro, Thalysson Sarmento, Alexandre Barreto, Paulo C. G. Costa. 64-68 [doi]
- A Practical Approach to Data Modeling using CCORod Moten, Bill Barnhill. 69-73 [doi]
- Semantic Cyberthreat ModellingSiri Bromander, Audun Jøsang, Martin Eian. 74-78 [doi]