Filter your results
- 6
- 6
- 6
- 1
- 2
- 1
- 1
- 1
- 1
- 6
- 6
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Eliciting Security Requirements for Business Processes of Legacy Systems8th Practice of Enterprise Modelling (P0EM), Nov 2015, Valencia, Spain. pp.91-107, ⟨10.1007/978-3-319-25897-3_7⟩
Conference papers
hal-01442267v1
|
||
|
Supporting Privacy by Design Using Privacy Process Patterns32th IFIP International Conference on ICT Systems Security and Privacy Protection (SEC), May 2017, Rome, Italy. pp.491-505, ⟨10.1007/978-3-319-58469-0_33⟩
Conference papers
hal-01648984v1
|
||
|
Migrating into the Cloud: Identifying the Major Security and Privacy Concerns12th Conference on e-Business, e-Services, and e-Society (I3E), Apr 2013, Athens, Greece. pp.73-87, ⟨10.1007/978-3-642-37437-1_7⟩
Conference papers
hal-01470568v1
|
||
|
An Automated Tool to Support an Intelligence Learner Management System Using Learning Analytics and Machine Learning17th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2021, Hersonissos, Crete, Greece. pp.494-504, ⟨10.1007/978-3-030-79150-6_39⟩
Conference papers
hal-03287708v1
|
||
|
Cyber Supply Chain Threat Analysis and Prediction Using Machine Learning and Ontology17th IFIP International Conference on Artificial Intelligence Applications and Innovations (AIAI), Jun 2021, Hersonissos, Crete, Greece. pp.518-530, ⟨10.1007/978-3-030-79150-6_41⟩
Conference papers
hal-03287656v1
|
||
|
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments10th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2016, Heraklion, Greece. pp.70-84, ⟨10.1007/978-3-319-45931-8_5⟩
Conference papers
hal-01639606v1
|