Author of the publication

Privacy Data Management and Awareness for Public Administrations: A Case Study from the Healthcare Domain.

, , , , , , , , , , , and . APF, volume 10518 of Lecture Notes in Computer Science, page 192-209. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Long-Range attack detection on permissionless blockchains using Deep Learning., , , and . Expert Syst. Appl., (May 2023)Visual Privacy Management., , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems., , , and . CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS, volume 11980 of Lecture Notes in Computer Science, page 140-158. Springer, (2019)Visual Privacy Management in User Centric Open Environments., and . RCIS, page 461-462. IEEE, (2017)Cyber-attack path discovery in a dynamic supply chain maritime risk management system., , and . Comput. Stand. Interfaces, (2018)MVDroid: an android malicious VPN detector using neural networks., , , and . Neural Comput. Appl., 35 (29): 21555-21565 (October 2023)A Holistic Approach for Privacy Requirements Analysis: An Industrial Case Study., , , , , , and . Visual Privacy Management, volume 12030 of Lecture Notes in Computer Science, Springer, (2020)A Metamodel for GDPR-based Privacy Level Agreements., , , and . ER Forum/Demos, volume 1979 of CEUR Workshop Proceedings, page 285-291. CEUR-WS.org, (2017)TrojanDroid: Android Malware Detection for Trojan Discovery Using Convolutional Neural Networks., , and . EANN, volume 1600 of Communications in Computer and Information Science, page 203-212. Springer, (2022)Addressing Privacy and Trust Issues in Cultural Heritage Modelling., , , and . CRiSIS, volume 9572 of Lecture Notes in Computer Science, page 3-16. Springer, (2015)