Filter
Chapter

Search results

  • 2021

    Anonymity

    Bleumer, G. & Sciancalepore, S., 18 Dec 2021, Encyclopedia of Cryptography, Security and Privacy. Jajodia, S., Samarati, P. & Yung, M. (eds.). Springer, p. 1-3

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • Data economy 2.0: From big data value to AI value and a european data space

    Zillner, S., Gomez, J. A., García Robles, A., Hahn, T., Bars, L. L., Petkovic, M. & Curry, E., 1 Aug 2021, The Elements of Big Data Value: Foundations of the Research and Innovation Ecosystem. Springer, p. 379-399 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    Open Access
    6 Citations (Scopus)
  • Technical research priorities for big data

    Curry, E., Zillner, S., Metzger, A., Berre, A. J., Auer, S., Walshe, R., Despenic, M., Petkovic, M., Roman, D., Waterfeld, W., Seidl, R., Hasan, S., ul Hassan, U. & Ojo, A., 2021, The Elements of Big Data Value: Foundations of the Research and Innovation Ecosystem. Cham: Springer, p. 97-126 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    Open Access
    File
    1 Citation (Scopus)
    16 Downloads (Pure)
  • The european big data value ecosystem

    Curry, E., Metzger, A., Zillner, S., Pazzaglia, J. C., García Robles, A., Hahn, T., Bars, L., Petkovic, M. & Lama, N., 1 Aug 2021, The Elements of Big Data Value: Foundations of the Research and Innovation Ecosystem. Springer, p. 3-19 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    Open Access
    4 Citations (Scopus)
  • 2018

    Theory of local search

    Michiels, W., Aarts, E. H. L. & Korst, J., 13 Aug 2018, Handbook of heuristics. Martí, R., Pardalos, P. & Resende, M. (eds.). Cham: Springer, p. 299-339 41 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    4 Citations (Scopus)
    2 Downloads (Pure)
  • 2014

    Simulated annealing

    Aarts, E., Korst, J. & Michiels, W., 1 Jan 2014, Search methodologies: introductory tutorials in optimization and decision support techniques, second edition. Burke, E. & Kendall, G. (eds.). Boston: Springer, p. 265-286 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    47 Citations (Scopus)
  • 2012

    Fundamental building blocks for security interoperability in e-business (Chapter 13)

    Asim, M. & Petkovic, M., 2012, Handbook of research on E-business standards and protocols: documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 269-292

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    15 Citations (Scopus)
  • Trust management and user's trust perception in e-business

    Costante, E., Hartog, den, J. I. & Petkovic, M., 2012, Handbook of research on e-business standards and protocols : documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 321-341

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • 2011

    Detecting conflicts between functional and security requirements with Secure Tropos: John Rusnak and the Allied Irish Bank (Chapter 9)

    Massacci, F. & Zannone, N., 2011, Social Modeling for Requirements Engineering. Giorgini, P., Maiden, N., Mylopoulos, J. & Yu, E. (eds.). Cambridge MA: MIT Press, p. 337-362

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Downloads (Pure)
  • Privacy and security in e-health applications

    Petkovic, M. & Ibraimi, L., 2011, E-health, assistive technologies and applications for assisted living : challenges and solutions. Ziefle, M. (ed.). IGI Global, p. 23-48

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • 2010

    Security requirements engineering : the SI* modeling language and the Secure Tropos methodology

    Massacci, F., Mylopoulos, J. & Zannone, N., 2010, Advances in Intelligent Information Systems. Ras, Z. W. & Tsay, L-S. (eds.). Berlin: Springer, p. 147-174 (Studies in Computational Intelligence; vol. 265).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    38 Citations (Scopus)
    2 Downloads (Pure)
  • Towards reliable remote healthcare applications using combined fuzzy extraction

    Guajardo, J., Asim, M. & Petkovic, M., 2010, Towards Hardware-Intrinsic Security: Foundations and Practice. Sadeghi, A. R. & Naccache, D. (eds.). Berlin: Springer, p. 387-407 (Information Security and Cryptography).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    3 Citations (Scopus)
  • 2008

    Approaches in anomaly-based network intrusion detection systems

    Bolzoni, D. & Etalle, S., 2008, Intrusion Detection Systems. Di Pietro, R. & Mancini, L. V. (eds.). London: Springer, p. 1-16 (Advances in Information Security; vol. 38).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    10 Citations (Scopus)
  • 2007

    Simulated annealing

    Aarts, E. H. L., Korst, J. H. M. & Michiels, W. P. A. J., 2007, Handbook of approximation algorithms and metaheuristics. Gonzales, T. F. (ed.). London: Chapman & Hall, p. 25.1-25.11 (CRC computer & information science; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Simulated annealing

    Aarts, E. H. L., Horn, van der, P., Korst, J. H. M., Michiels, W. P. A. J. & Sontrop, H., 2007, Metaheuristic procedures for training neural networks. Alba, E. & Marti, R. (eds.). Boston, USA: Springer, p. 37-52 (Operations Research/Computer Science Interfaces Series; vol. 36,PartII).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic