Table of contents
Ontology‐based activity recognition in intelligent pervasive environments
Liming Chen, Chris NugentThis paper aims to serve two main purposes. In the first instance it aims to it provide an overview addressing the state‐of‐the‐art in the area of activity recognition, in…
A structural, content‐similarity measure for detecting spam documents on the web
Maria Soledad Pera, Yiu‐Kai NgThe web provides its users with abundant information. Unfortunately, when a web search is performed, both users and search engines must deal with an annoying problem: the presence…
Schema‐level access control policies for XML documents
Tomasz Müldner, Gregory Leighton, Jan Krzysztof MiziołekThe purpose of this paper is to consider the secure publishing of XML documents, where a single copy of an XML document is disseminated and a stated role‐based access control…
Maintaining web application: an ontology‐based reverse engineering approach
Sidi Mohamed Benslimane, Mimoun Malki, Djelloul BouchihaWeb applications are subject to continuous changes and rapid evolution triggered by increasing competition, especially in commercial domains such as electronic commerce…
Automation of post‐exploitation
Mohammad Tabatabai Irani, Edgar R. WeipplThe purpose of this paper is to describe the improvements achieved in automating post‐exploit activities
ISSN:
1744-0084e-ISSN:
1744-0092ISSN-L:
1744-0084Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditors:
- Prof. Honghao Gao
- Prof. Li Kuang