Author of the publication

Exploiting social networks to provide privacy in personalized web search.

, , , and . J. Syst. Softw., 84 (10): 1734-1745 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Search Results to Microaggregate Query Logs Semantically., and . DPM/SETOP, volume 8247 of Lecture Notes in Computer Science, page 148-161. Springer, (2013)Formalising Policies for Insider-threat Detection: A Tripwire Grammar., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 8 (1): 26-43 (2017)Semantic Microaggregation for the Anonymization of Query Logs., , , and . Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, page 127-137. Springer, (2010)Practitioners' Views on Cybersecurity Control Adoption and Effectiveness., , , , , and . ARES, page 91:1-91:10. ACM, (2021)Exploiting social networks to provide privacy in personalized web search., , , and . J. Syst. Softw., 84 (10): 1734-1745 (2011)Analysing cyber-insurance claims to design harm-propagation trees., , , , and . CyberSA, page 1-4. IEEE, (2019)An Assessment of the Security and Transparency Procedural Components of the Estonian Internet Voting System., , , , , , , and . HCI (22), volume 10292 of Lecture Notes in Computer Science, page 366-383. Springer, (2017)A Tripwire Grammar for Insider Threat Detection., , , and . MIST@CCS, page 105-108. ACM, (2016)A system to calculate Cyber Value-at-Risk., , , , , and . Comput. Secur., (2022)The challenge of detecting sophisticated attacks: Insights from SOC Analysts., , and . ARES, page 55:1-55:9. ACM, (2018)