Filter your results
- 46
- 1
- 45
- 1
- 1
- 47
- 6
- 6
- 4
- 4
- 4
- 2
- 6
- 4
- 3
- 4
- 5
- 2
- 3
- 47
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 4
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Workshop on: Exploring the Challenges of Ethics, Privacy and Trust in Serious Gaming11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.584-585, ⟨10.1007/978-3-642-33542-6_77⟩
Conference papers
hal-01556150v1
|
||
|
Validation and Verification in Domain-Specific Modeling Method Engineering14th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2021, Riga, Latvia. pp.119-133, ⟨10.1007/978-3-030-91279-6_9⟩
Conference papers
hal-04323856v1
|
||
|
Using Attack-Defense Trees to Analyze Threats and Countermeasures in an ATM: A Case Study9th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2016, Skövde, Sweden. pp.326-334, ⟨10.1007/978-3-319-48393-1_24⟩
Conference papers
hal-01653513v1
|
||
|
Trust Management XSpringer, AICT-473, 2016, Trust Management X, 978-3-319-41353-2. ⟨10.1007/978-3-319-41354-9⟩
Books
hal-01438367v1
|
||
|
Towards Meta Model Provenance: A Goal-Driven Approach to Document the Provenance of Meta Models10th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2017, Leuven, Belgium. pp.49-64, ⟨10.1007/978-3-319-70241-4_4⟩
Conference papers
hal-01765255v1
|
||
|
Towards Extending the Validation Possibilities of ADOxx with Alloy13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.138-152, ⟨10.1007/978-3-030-63479-7_10⟩
Conference papers
hal-03434656v1
|
||
|
Towards Enterprise-Grade Tool Support for DEMO13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.90-105, ⟨10.1007/978-3-030-63479-7_7⟩
Conference papers
hal-03434641v1
|
||
|
The Impact of IPv6 on Video-to-Video and Mobile Video Communications8th International Conference on Artificial Intelligence Applications and Innovations (AIAI), Sep 2012, Halkidiki, Greece. pp.322-331, ⟨10.1007/978-3-642-33412-2_33⟩
Conference papers
hal-01523038v1
|
||
|
The Hubs: Design Insights for Walking Meeting Technology18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.610-629, ⟨10.1007/978-3-030-85610-6_35⟩
Conference papers
hal-04215504v1
|
||
|
The Fréchet/Manhattan Distance and the Trajectory Anonymisation Problem30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.19-34, ⟨10.1007/978-3-319-41483-6_2⟩
Conference papers
hal-01633679v1
|
||
|
Testbeds for the Implementation of 5G in the European Union: The Innovative Case of the 5G-DRIVE Project15th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2019, Hersonissos, Greece. pp.78-92, ⟨10.1007/978-3-030-19909-8_7⟩
Conference papers
hal-02363836v1
|
||
|
Strategic Noninterference30th IFIP International Information Security Conference (SEC), May 2015, Hamburg, Germany. pp.67-81, ⟨10.1007/978-3-319-18467-8_5⟩
Conference papers
hal-01345096v1
|
||
|
Security and Performance Implications of BGP Rerouting-Resistant Guard Selection Algorithms for Tor35th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), Sep 2020, Maribor, Slovenia. pp.219-233, ⟨10.1007/978-3-030-58201-2_15⟩
Conference papers
hal-03440868v1
|
||
|
Raya: A Tangible Exercise Buddy Reminding Oneself of the Commitment to Exercise18th IFIP Conference on Human-Computer Interaction (INTERACT), Aug 2021, Bari, Italy. pp.471-475, ⟨10.1007/978-3-030-85607-6_60⟩
Conference papers
hal-04291185v1
|
||
|
Pervasive Gaming as a Potential Solution to Traffic Congestion: New Challenges Regarding Ethics, Privacy and Trust11th International Confernece on Entertainment Computing (ICEC), Sep 2012, Bremen, Germany. pp.586-593, ⟨10.1007/978-3-642-33542-6_78⟩
Conference papers
hal-01556169v1
|
||
|
On Robustness of Trust Systems8th IFIP International Conference on Trust Management (IFIPTM), Jul 2014, Singapore, Singapore. pp.44-60, ⟨10.1007/978-3-662-43813-8_4⟩
Conference papers
hal-01381678v1
|
||
|
On Probabilistic Alternating Simulations6th IFIP TC 1/WG 2.2 International Conference on Theoretical Computer Science (TCS) / Held as Part of World Computer Congress (WCC), Sep 2010, Brisbane, Australia. pp.71-85, ⟨10.1007/978-3-642-15240-5_6⟩
Conference papers
hal-01054443v1
|
||
|
On Domain Modelling and Requisite Variety13th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling (PoEM 2020), Nov 2020, Riga, Latvia. pp.186-196, ⟨10.1007/978-3-030-63479-7_13⟩
Conference papers
hal-03434642v1
|
||
|
On Beta Models with Trust Chains7th Trust Management (TM), Jun 2013, Malaga, Spain. pp.49-65, ⟨10.1007/978-3-642-38323-6_4⟩
Conference papers
hal-01468207v1
|
||
|
Modeling the German Legal Latitude Principles5th International Conference on Electronic Participation (ePart), Sep 2013, Koblenz, Germany. pp.49-56, ⟨10.1007/978-3-642-40346-0_5⟩
Conference papers
hal-01491259v1
|
||
|
Mining NetFlow Records for Critical Network Activities4th International Conference on Autonomous Infrastructure, Management and Security (AIMS), Jun 2010, Zurich, Switzerland. pp.135-146, ⟨10.1007/978-3-642-13986-4_20⟩
Conference papers
hal-01056635v1
|
||
|
Mind the Gap Gender and Computer Science Conferences13th IFIP International Conference on Human Choice and Computers (HCC13), Sep 2018, Poznan, Poland. pp.232-249, ⟨10.1007/978-3-319-99605-9_17⟩
Conference papers
hal-02001958v1
|
||
|
Logics for Security and Privacy26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.1-7, ⟨10.1007/978-3-642-31540-4_1⟩
Conference papers
hal-01534776v1
|
||
|
Kill or Spare – Moral Decision-Making in Video Games20th International Conference on Entertainment Computing (ICEC), Nov 2021, Coimbra, Portugal. pp.88-99, ⟨10.1007/978-3-030-89394-1_7⟩
Conference papers
hal-04144381v1
|
||
|
FSquaDRA: Fast Detection of Repackaged Applications28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.130-145, ⟨10.1007/978-3-662-43936-4_9⟩
Conference papers
hal-01285035v1
|
||
|
Examination of a New Defense Mechanism: Honeywords11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.130-139, ⟨10.1007/978-3-319-93524-9_8⟩
Conference papers
hal-01875522v1
|
||
|
Enterprise Modelling in the Age of Digital Transformation11th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Oct 2018, Vienna, Austria. pp.257-273, ⟨10.1007/978-3-030-02302-7_16⟩
Conference papers
hal-02156472v1
|
||
|
Enterprise Coherence with GEA – A 15 year Co-evolution of Practice and Theory14th IFIP Working Conference on The Practice of Enterprise Modeling (PoEM), Nov 2021, Riga, Latvia. pp.3-18, ⟨10.1007/978-3-030-91279-6_1⟩
Conference papers
hal-04323846v1
|
||
|
Enhanced Mobile Broadband as Enabler for 5G: Actions from the Framework of the 5G-DRIVE Project15th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), May 2019, Hersonissos, Greece. pp.31-45, ⟨10.1007/978-3-030-19909-8_3⟩
Conference papers
hal-02363853v1
|
||
|
Efficient Architecture-Level Configuration of Large-Scale Embedded Software Systems6th Fundamentals of Software Engineering (FSEN), Apr 2015, Tehran, Iran. pp.110-126, ⟨10.1007/978-3-319-24644-4_8⟩
Conference papers
hal-01446633v1
|
- 1
- 2