Filter your results
- 5
- 5
- 5
- 4
- 1
- 5
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Methodology for Internal Traceability Support in Foundry Manufacturing20th Advances in Production Management Systems (APMS), Sep 2013, State College, PA, United States. pp.183-190, ⟨10.1007/978-3-642-41266-0_23⟩
Conference papers
hal-01452112v1
|
||
|
Position Paper: Privacy Risk Analysis Is about Understanding Conflicting Incentives3rd Policies and Research in Identity Management (IDMAN), Apr 2013, London, United Kingdom. pp.100-103, ⟨10.1007/978-3-642-37282-7_9⟩
Conference papers
hal-01470507v1
|
||
|
Advancing Digital Forensics8th World Conference on Information Security Education (WISE), Jul 2009, Bento Gonçalves, Brazil. pp.288-295, ⟨10.1007/978-3-642-39377-8_34⟩
Conference papers
hal-01463655v1
|
||
|
Using the Conflicting Incentives Risk Analysis Method28th Security and Privacy Protection in Information Processing Systems (SEC), Jul 2013, Auckland, New Zealand. pp.315-329, ⟨10.1007/978-3-642-39218-4_24⟩
Conference papers
hal-01463835v1
|
||
|
Mapping between Classical Risk Management and Game Theoretical Approaches12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.147-154, ⟨10.1007/978-3-642-24712-5_12⟩
Conference papers
hal-01596184v1
|