Research Output 2007 2019

Filter
Chapter
2018

Theory of local search

Michiels, W., Aarts, E. H. L. & Korst, J., 13 Aug 2018, Handbook of heuristics. Martí, R., Pardalos, P. & Resende, M. (eds.). Cham: Springer, p. 299-339 41 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Combinatorial optimization
Local Search
Heuristic methods
Combinatorial Optimization Problem
Computational complexity
2014
33 Citations (Scopus)

Simulated annealing

Aarts, E., Korst, J. & Michiels, W., 1 Jan 2014, Search methodologies: introductory tutorials in optimization and decision support techniques, second edition. Burke, E. & Kendall, G. (eds.). Boston: Springer, p. 265-286 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Planning
Manufacturing
Optimization problem
Combinatorial optimization
Simulated annealing
2012
15 Citations (Scopus)

Fundamental building blocks for security interoperability in e-business (Chapter 13)

Asim, M. & Petkovic, M., 2012, Handbook of research on E-business standards and protocols: documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 269-292

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Interoperability
Industry

Trust management and user's trust perception in e-business

Costante, E., Hartog, den, J. I. & Petkovic, M., 2012, Handbook of research on e-business standards and protocols : documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 321-341

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

End users
Electronic business
Trust management
Service provider
Privacy policies
2011
2 Downloads (Pure)

Detecting conflicts between functional and security requirements with Secure Tropos: John Rusnak and the Allied Irish Bank (Chapter 9)

Massacci, F. & Zannone, N., 2011, Social Modeling for Requirements Engineering. Giorgini, P., Maiden, N., Mylopoulos, J. & Yu, E. (eds.). Cambridge MA: MIT Press, p. 337-362

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Information systems
Requirements engineering
Security of data

Privacy and security in e-health applications

Petkovic, M. & Ibraimi, L., 2011, E-health, assistive technologies and applications for assisted living : challenges and solutions. Ziefle, M. (ed.). IGI Global, p. 23-48

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Health
Costs
2010
37 Citations (Scopus)
2 Downloads (Pure)

Security requirements engineering : the SI* modeling language and the Secure Tropos methodology

Massacci, F., Mylopoulos, J. & Zannone, N., 2010, Advances in Intelligent Information Systems. Ras, Z. W. & Tsay, L-S. (eds.). Berlin: Springer, p. 147-174 (Studies in Computational Intelligence; vol. 265).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Requirements engineering
Software engineering
Consolidation
Industry
Modeling languages
3 Citations (Scopus)

Towards reliable remote healthcare applications using combined fuzzy extraction

Guajardo, J., Asim, M. & Petkovic, M., 2010, Towards Hardware-Intrinsic Security: Foundations and Practice. Sadeghi, A. R. & Naccache, D. (eds.). Berlin: Springer, p. 387-407 (Information Security and Cryptography).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Medical problems
2008
8 Citations (Scopus)

Approaches in anomaly-based network intrusion detection systems

Bolzoni, D. & Etalle, S., 2008, Intrusion Detection Systems. Di Pietro, R. & Mancini, L. V. (eds.). London: Springer, p. 1-16 (Advances in Information Security; vol. 38).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Intrusion detection
Engines
2007

Simulated annealing

Aarts, E. H. L., Horn, van der, P., Korst, J. H. M., Michiels, W. P. A. J. & Sontrop, H., 2007, Metaheuristic procedures for training neural networks. Alba, E. & Marti, R. (eds.). Boston, USA: Springer, p. 37-52 (Operations Research/Computer Science Interfaces Series; vol. 36,PartII).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Continuous Optimization
Combinatorial Optimization
Metaheuristics
Simulated Annealing
Local Search

Simulated annealing

Aarts, E. H. L., Korst, J. H. M. & Michiels, W. P. A. J., 2007, Handbook of approximation algorithms and metaheuristics. Gonzales, T. F. (ed.). London: Chapman & Hall, p. 25.1-25.11 (CRC computer & information science; vol. 10).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Simulated annealing