Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect., , , and . PDH, page 55-62. ACM, (2019)Adaptive Cryptographic Access Control, , and . Advances in Information Security Springer, (2010)Enhancing identity trust in cryptographic key management systems for dynamic environments., , and . Secur. Commun. Networks, 4 (1): 79-94 (2011)On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments., and . Privacy and Identity Management, volume 526 of IFIP Advances in Information and Communication Technology, page 170-186. Springer, (2017)Enabling PII Discovery in Textual Data via Outlier Detection., , and . DEXA (2), volume 14147 of Lecture Notes in Computer Science, page 209-216. Springer, (2023)Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings., , and . AINA (4), volume 202 of Lecture Notes on Data Engineering and Communications Technologies, page 145-158. Springer, (2024)Are motorways rational from slime mould's point of view?, , , , , , , , , and 5 other author(s). CoRR, (2012)A Parallel Quasi-identifier Discovery Scheme for Dependable Data Anonymisation., , and . Trans. Large Scale Data Knowl. Centered Syst., (2021)Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids., , , and . ISGT Asia, page 1-6. IEEE, (2015)Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization., , and . CODASPY, page 109-119. ACM, (2019)