A Knowledge-Based Approach to Network Security: Applying Cyc in the Domain of Network Risk Assessment . The Seventeenth Innovative Applications of Artificial Intelligence Conference.. 2005.
Knowledge Begets Knowledge: Steps towards Assisted Knowledge Acquisition in Cyc . Papers from the 2005 AAAI Spring Symposium on Knowledge Collection from Volunteer Contributors. :pp.99-105.. 2005.