Filter your results
- 32
- 1
- 31
- 1
- 1
- 33
- 1
- 4
- 4
- 4
- 2
- 4
- 2
- 4
- 2
- 3
- 1
- 3
- 33
- 4
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 6
- 4
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Ontology-Based Modeling of Privacy Vulnerabilities for Data Sharing14th IFIP International Summer School on Privacy and Identity Management (Privacy and Identity), Aug 2019, Windisch, Switzerland. pp.109-125, ⟨10.1007/978-3-030-42504-3_8⟩
Conference papers
hal-03378967v1
|
||
|
Stable Integration of Power Electronics-Based DG Links to the Utility Grid with Interfacing Impedance Uncertainties6th Doctoral Conference on Computing, Electrical and Industrial Systems (DoCEIS), Apr 2015, Costa de Caparica, Portugal. pp.502-511, ⟨10.1007/978-3-319-16766-4_54⟩
Conference papers
hal-01343525v1
|
||
|
A Privacy Preserving Design Framework in Relation to an Environmental Scanning System for Fighting Organized Crime11th IFIP International Conference on Human Choice and Computers (HCC), Jul 2014, Turku, Finland. pp.226-238, ⟨10.1007/978-3-662-44208-1_19⟩
Conference papers
hal-01383060v1
|
- 1
- 2