Author of the publication

Simulating Malicious Users in a Software Reputation System.

, , and . STA, volume 186 of Communications in Computer and Information Science, page 147-156. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Defense Methods Against the One-Pixel Attack on Deep Neural Networks., , and . SAIS, volume 199 of Linköping Electronic Conference Proceedings, page 49-57. Linköping University Electronic Press, (2023)Multi-expert estimations of burglars' risk exposure and level of pre-crime preparation based on crime scene data., , and . SAIS, volume 137 of Linköping Electronic Conference Proceedings, page 137:004. Linköping University Electronic Press, (2017)Preventing Privacy-Invasive Software Using Collaborative Reputation Systems., , , and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 142-157. Springer, (2007)On the Risk Exposure of Smart Home Automation Systems., , and . FiCloud, page 183-190. IEEE Computer Society, (2014)Software Vulnerability Assessment Version Extraction and Verification., , and . ICSEA, page 59. IEEE Computer Society, (2007)Consensus Decision Making in Random Forests., , , and . MOD, volume 9432 of Lecture Notes in Computer Science, page 347-358. Springer, (2015)Do we really need to catch them all? A new User-guided Social Media Crawling method., , , and . CoRR, (2016)Privacy-Invasive Software.. Blekinge Institute of Technology, Sweden, (2010)Preliminary Results on the use of Artificial Intelligence for Managing Customer Life Cycles., , , and . SAIS, volume 199 of Linköping Electronic Conference Proceedings, page 68-76. Linköping University Electronic Press, (2023)Simulating Malicious Users in a Software Reputation System., , and . STA, volume 186 of Communications in Computer and Information Science, page 147-156. Springer, (2011)