Author of the publication

Structured Machine Learning for Data Analytics and Modeling: Intelligent Security as an Example.

, , and . WI-IAT (1), page 325-332. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Agent-Based Secure E-Commerce Environment With Distributed Authentication and Authorization Services., and . International Conference on Internet Computing (1), page 268-274. CSREA Press, (2001)Agent-Oriented Public Key Infrastructure for Multi-agent E-service., and . KES, volume 2773 of Lecture Notes in Computer Science, page 1215-1221. Springer, (2003)Semantics-enabled Policies for Super-Peer Data Integration and Protection., , and . Int. J. Comput. Sci. Appl., 9 (1): 23-49 (2012)Towards law-aware semantic cloud policies with exceptions for data integration and protection., , and . WIMS, page 26:1-26:12. ACM, (2012)Crafting a balance between big data utility and protection in the semantic data cloud., , and . WIMS, page 18. ACM, (2013)Semantics-Enabled Policies for Information Sharing and Protection in the Cloud., , and . SocInfo, volume 6984 of Lecture Notes in Computer Science, page 198-211. Springer, (2011)Structured Machine Learning for Data Analytics and Modeling: Intelligent Security as an Example., , and . WI-IAT (1), page 325-332. IEEE Computer Society, (2015)Privacy-Preserving WebID Analytics on the Decentralized Policy-Aware Social Web.. WI-IAT (1), page 503-510. IEEE Computer Society, (2014)A semantic privacy-preserving model for data sharing and integration., and . WIMS, page 9. ACM, (2011)The Strategic Planning for Open Systems Environoments.. PACIS, page 25. AISeL, (1993)