Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preliminary interdependency analysis: An approach to support critical-infrastructure risk-assessment., , , , and . Reliab. Eng. Syst. Saf., (2017)Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure., , , , and . CRITIS, volume 6027 of Lecture Notes in Computer Science, page 201-212. Springer, (2009)Structuring stakeholder e-inclusion needs.. J. Inf., Comm, Ethics in Society, 8 (2): 178-205 (2010)Privacy, identity and security in ambient intelligence: A scenario analysis., , , and . Telematics Informatics, 24 (1): 15-29 (2007)The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues., , , and . SPC, volume 3934 of Lecture Notes in Computer Science, page 119-133. Springer, (2006)Trust in the Pi-Calculus., and . PPDP, page 103-114. ACM, (2001)Redesigning consent forms and processes for health research.. IPCC, page 1-2. IEEE, (2012)The state of the art in privacy impact assessment.. Comput. Law Secur. Rev., 28 (1): 54-61 (2012)Evolution of Standards for Smart Grid Communications.. Int. J. Interdiscip. Telecommun. Netw., 4 (1): 47-55 (2012)To imprison or not to imprison: an analytics model for drug courts., , , and . Ann. Oper. Res., 303 (1): 101-124 (2021)