Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

11 results
Document type : Conference papers
Image document

Conducting Ethical Research with a Game-Based Intervention for Groups at Risk of Social Exclusion

Ian Dunwell
11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.594-599, ⟨10.1007/978-3-642-33542-6_79⟩
Conference papers hal-01556183v1
Image document

Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications

Madeline Cheah , Hoang Nga Nguyen , Jeremy Bryans , Siraj A. Shaikh
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.113-129, ⟨10.1007/978-3-319-93524-9_7⟩
Conference papers hal-01875515v1
Image document

A Template-Based Method for the Generation of Attack Trees

Jeremy Bryans , Lin Shen Liew , Hoang Nga Nguyen , Giedre Sabaliauskaite , Siraj Shaikh , et al.
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.155-165, ⟨10.1007/978-3-030-41702-4_10⟩
Conference papers hal-03173899v1
Image document

Cybersecurity Readiness of E-tail Organisations: A Technical Perspective

Mahmood Hussain Shah , Raza Muhammad , Nisreen Ameen
19th Conference on e-Business, e-Services and e-Society (I3E), Apr 2020, Skukuza, South Africa. pp.153-160, ⟨10.1007/978-3-030-44999-5_13⟩
Conference papers hal-03222876v1
Image document

Detection of Diabetic Retinopathy and Maculopathy in Eye Fundus Images Using Deep Learning and Image Augmentation

Sarni Suhaila Rahim , Vasile Palade , Ibrahim Almakky , Andreas Holzinger
3rd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2019, Canterbury, United Kingdom. pp.114-127, ⟨10.1007/978-3-030-29726-8_8⟩
Conference papers hal-02520049v1
Image document

Design and Usability Evaluation of Adaptive e-learning Systems Based on Learner Knowledge and Learning Style

Mohammad Alshammari , Rachid Anane , Robert J. Hendley
15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.584-591, ⟨10.1007/978-3-319-22668-2_45⟩
Conference papers hal-01599889v1
Image document

Combining Third Party Components Securely in Automotive Systems

Madeline Cheah , Siraj A. Shaikh , Jeremy Bryans , Hoang Nga Nguyen
10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.262-269, ⟨10.1007/978-3-319-45931-8_18⟩
Conference papers hal-01639623v1
Image document

Towards interactive Machine Learning (iML): Applying Ant Colony Algorithms to Solve the Traveling Salesman Problem with the Human-in-the-Loop Approach

Andreas Holzinger , Markus Plass , Katharina Holzinger , Gloria Cerasela Crişan , Camelia-M. Pintea , et al.
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.81-95, ⟨10.1007/978-3-319-45507-5_6⟩
Conference papers hal-01635020v1
Image document

Cross-sector and cross-discipline project planning for serious interactive digital narratives

Nicole Basaraba
20th International Conference on Entertainment Computing (ICEC), Nov 2021, Coimbra, Portugal
Conference papers hal-04169881v1
Image document

Early Warning Systems for Cyber Defence

Harsha Kalutarage , Siraj Shaikh , Bu-Sung Lee , Chonho Lee , Yeo Chai Kiat
International Workshop on Open Problems in Network Security (iNetSec), Oct 2015, Zurich, Switzerland. pp.29-42, ⟨10.1007/978-3-319-39028-4_3⟩
Conference papers hal-01445791v1
Image document

A Combined CNN and LSTM Model for Arabic Sentiment Analysis

Abdulaziz M. Alayba , Vasile Palade , Matthew England , Rahat Iqbal
2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.179-191, ⟨10.1007/978-3-319-99740-7_12⟩
Conference papers hal-02060041v1