Author of the publication

Explaining Algorithmic Decisions with respect to Fairness.

, , , , and . SE/SWM, volume P-292 of LNI, page 161-162. GI, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Semi-Automated Co-Evolution of Security Knowledge and System Modelsn, , , , and . Journal of Systems and Software, (2018)Formalizing Cost Fairness for Two-Party Exchange Protocols using Game Theory and Applications to Blockchain., , , , and . ICBC, page 1-5. IEEE, (2022)Developing Secure Systems with UMLsec - From Business Processes to Implementation.. VIS, page 151-161. Vieweg+Teubner Verlag, (2001)Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project.. AVoCS, volume 250 of Electronic Notes in Theoretical Computer Science, page 123-136. Elsevier, (2007)Information security management and the human aspect in organizations., and . Inf. Comput. Secur., 25 (5): 494-534 (2017)Ontology-driven evolution of software security., , , and . Data Knowl. Eng., (2021)Secure Data-Flow Compliance Checks between Models and Code Based on Automated Mappings., , , , and . MoDELS, page 23-33. IEEE, (2019)Privacy-enhanced system design modeling based on privacy features., , and . SAC, page 1492-1499. ACM, (2019)Knowledge guided multi-filter residual convolutional neural network for ICD coding from clinical text., , and . Neural Comput. Appl., 35 (24): 17633-17644 (August 2023)Requirements document relations., , and . Softw. Syst. Model., 21 (6): 1-37 (2022)