2014
DOI: 10.1007/s11265-014-0885-0
|View full text |Cite
|
Sign up to set email alerts
|

The Role of Context in Cognitive Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…After the data analysis and module download are completed, the next focus of the vulnerability target environment construction is on the modularization of virtualization technology. Docker virtualization technology can be used to modularly build a target environment for security vulnerability practice 13 , 14 . The target environment construction element information extraction stage needs to extract the vulnerability number, vulnerability verification information, vulnerability utilization information, vulnerability type, and software information affected by the vulnerability in the vulnerability entry information according to the target environment construction requirements, and divide them into essential elements and reference elements…”
Section: Design Of Network Security Software System Based On Big Data...mentioning
confidence: 99%
“…After the data analysis and module download are completed, the next focus of the vulnerability target environment construction is on the modularization of virtualization technology. Docker virtualization technology can be used to modularly build a target environment for security vulnerability practice 13 , 14 . The target environment construction element information extraction stage needs to extract the vulnerability number, vulnerability verification information, vulnerability utilization information, vulnerability type, and software information affected by the vulnerability in the vulnerability entry information according to the target environment construction requirements, and divide them into essential elements and reference elements…”
Section: Design Of Network Security Software System Based On Big Data...mentioning
confidence: 99%