Search for persons
X
?
From Data to Models and Back; Lecture Notes in Computer Science ,
3
Model-Based Security Assessment on the Design of a Patient-..:
, In:
?
Adjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization ,
4
On the Benefits and Security Risks of a User-Centric Data S..:
, In:
?
Rules and Reasoning; Lecture Notes in Computer Science ,
6
Conflict-Free Access Rules for Sharing Smart Patient Health..:
, In:
?
Communications in Computer and Information Science; Dependable Computing - EDCC 2021 Workshops ,
8
Design of a Trustworthy and Resilient Data Sharing Platform..:
, In:
?
2020 IEEE 10th International Conference on Intelligent Systems (IS) ,
10
Intrusion Detection Using Extremely Limited Data Based on S..:
, In:
?
2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM) ,
11