Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Where is the human in human-centered AI? Insights from developer priorities and user experiences., , , , , , , , , and . Comput. Hum. Behav., (April 2023)Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools., , and . SSCC, volume 1364 of Communications in Computer and Information Science, page 1-20. Springer, (2020)PrivColl: Practical Privacy-Preserving Collaborative Machine Learning., , , , , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 399-418. Springer, (2020)Consumer-centric protection for online social networks., , and . IRI, page 62-67. IEEE Computer Society, (2014)Privacy Preserving Computation by Fragmenting Individual Bits and Distributing Gates., , and . Trustcom/BigDataSE/ISPA, page 900-908. IEEE, (2016)A Scalable Approach to Joint Cyber Insurance and Security-as-a-Service Provisioning in Cloud Computing., , , , and . IEEE Trans. Dependable Secur. Comput., 16 (4): 565-579 (2019)Unified Model for Data Security - A Position Paper., and . TrustCom, page 831-839. IEEE Computer Society, (2014)Escrow: A Large-Scale Web Vulnerability Assessment Tool., and . TrustCom, page 983-988. IEEE Computer Society, (2014)Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography., , and . TrustCom/BigDataSE/ICESS, page 1024-1031. IEEE Computer Society, (2017)Dynamic Collaborative Business Process Formulation via Ontologised Hierarchical Task Network (HTN) Planning., , , and . ICWS, page 959-967. IEEE Computer Society, (2009)