P. Zeng, Z. Li, and .. , Herranz, and Zhiping Shi Identification of Co-regulated Gene Network by Using Path Consistency Algorithm Based on, Gene Ontology, vol.269, p.278

H. Wang, C. Wang, L. Liu, C. Du, J. Lu et al., Information Security Case Retrieval for Network Security Emergency Response Based on Description Logic, p.284

F. Jiang, T. Gu, and .. , Liang Chang, and Zhoubo Xu On the Prevention of Invalid Route Injection Attack, p.294

M. Li, Q. Jing, Z. Yao, J. Liu, and A. , Formal Model for Attack Mutation Using Dynamic Description Logics, p.303

Z. Wang, J. Guo, J. Shi, H. He, Y. Zhang et al., Hui Peng, and Guanhua Tian Efficient Integrity Protection for, p.312