• 809 Citations
20002019
If you made any changes in Pure these will be visible here soon.

Research Output 2000 2019

2019

Automation for information security using machine learning

Thaler, S. M., 20 Feb 2019, Eindhoven: Technische Universiteit Eindhoven. 129 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File
2018

Auditing of user behavior: identification, analysis and understanding of deviations

Alizadeh, M., 19 Nov 2018, Eindhoven: Technische Universiteit Eindhoven. 170 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File

Deep metric learning for sequential data using approximate information

Thaler, S., Menkovski, V. & Petkovic, M., 8 Jul 2018, Machine Learning and Data Mining in Pattern Recognition - 14th International Conference, MLDM 2018, Proceedings. Perner, P. (ed.). Cham: Springer, p. 269-282 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10934 LNAI)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Distance Metric
Labels
Metric
High-dimensional
Neural Networks
2017
12 Citations (Scopus)

A white-box anomaly-based framework for database leakage detection

Costante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2017, In : Journal of Information Security and Applications. 32, p. 27-46

Research output: Contribution to journalArticleAcademicpeer-review

Agglomeration
Neural networks
Feedback
Industry

eHealth infrastructuur : ontwerp voor het LUMC

Moll, T. G., 30 Aug 2017, Eindhoven: Technische Universiteit Eindhoven. 116 p.

Research output: ThesisPd Eng ThesisAcademic

1 Citation (Scopus)

Towards a neural language model for signature extraction from forensic logs

Thaler, S. M., Menkovski, V. & Petkovic, M., 26 Apr 2017, 2017 5th International Symposium on Digital Forensic and Security (ISDFS), 26-28 April 2017, Tirgu Mures, Romania. Piscataway: Institute of Electrical and Electronics Engineers, p. 1--6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Information use
Knowledge based systems

Towards unsupervised signature extraction of forensic logs

Thaler, S. M., Menkovski, V. & Petkovic, M., 2017, Benelearn 2017: Proceedings of the Twenty-Sixth Benelux Conference on Machine Learning, 9-10 June 2017, Technische Universiteit Eindhoven . p. 154 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Unsupervised signature extraction from forensic logs

Thaler, S. M., Menkovski, V. & Petkovic, M., 2017, Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18–22, 2017, Proceedings, Part III. Altun, Y., Das, K., Mielikäinen, T., Malerba, D., Stefanowski, J., Read, J., Žitnik, M. & Ceci, M. (eds.). Dordrecht: Springer, p. 305-316 (LNCS; vol. 10536)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2016
2 Citations (Scopus)

A severity-based quantification of data leakages in database systems

Vavilis, S., Petkovic, M. & Zannone, N., 1 Jun 2016, In : Journal of Computer Security. 24, 3, p. 321-345 25 p.

Research output: Contribution to journalArticleAcademicpeer-review

Data structures
Leakage (fluid)
Specifications
79 Citations (Scopus)

Making sense of big data in health research : towards an EU action plan

Petkovic, M., Auffray, C., Balling, R. & Barroso, I., 23 Jun 2016, In : Genome Medicine. 8, 13 p., 71

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Health
Research
Medicine
Mobile Applications
Inventions
2 Citations (Scopus)

Role mining with missing values

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES), 31 August - 2 September 2016, Salzburg, Austria. Piscataway: Institute of Electrical and Electronics Engineers, p. 167-176

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Secure distributed key generation in attribute based encryption systems

Pletea, D., Sedghi, S., Veeningen, M. & Petkovic, M., 17 Feb 2016, 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, 14-16 December 2015, London, United Kingdom. Piscataway: Institute of Electrical and Electronics Engineers, p. 103-107 5 p. 7412067

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Computer systems
Data privacy
Cloud computing
Servers

Towards creating believable decoy project folders for detecting data theft

Thaler, S., den Hartog, J. & Petkovic, M., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer, p. 161-169 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Markov processes
User Studies
Data-driven
Markov chain
Attack
2015
6 Citations (Scopus)

An anomaly analysis framework for database systems

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2015, In : Computers and Security. 53, p. 156-173 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

incident
ranking
Risk assessment
Visualization
Monitoring

Privacy throughout the data cycle

Costante, E., 31 Mar 2015, Eindhoven: Technische Universiteit Eindhoven. 182 p.

Research output: ThesisPhd Thesis 1 (Research TU/e / Graduation TU/e)Academic

Open Access
File
4 Citations (Scopus)

Understanding perceived trust to reduce regret

Costante, E., Hartog, den, J. I. & Petkovic, M., 2015, In : Computational Intelligence. 31, 2, p. 327-347 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

Regret
Privacy
Health
Impact Factor
Security Model

Welcome message from the AU2EU 2015 workshop organizers

Petkovic, M., Camenisch, J., Zic, J. & Egner, A-I., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. p. XXXV

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

Open Access
File
2014
36 Citations (Scopus)

A reference model for reputation systems

Vavilis, S., Petkovic, M. & Zannone, N., 2014, In : Decision Support Systems. 61, 1, p. 147-154 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

Systems Analysis
Technology
Reputation system
Reference model
Surveys and Questionnaires
5 Citations (Scopus)

Attribute-based encryption with encryption and decryption outsourcing

Asim, M., Petkovic, M. & Ignatenko, T., 2014, 12th Australian Information Security Management Conference (Perth, Australia, December 1-3, 2014). Perth: ECU Security Research Institute, p. -21-28

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Outsourcing
Cryptography
1 Citation (Scopus)

AU2EU : Privacy-preserving matching of DNA sequences

Ignatenko, T. & Petkovic, M., 2014, 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Securing the Internet of Things (WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014). Naccache, D. & Sauveron, D. (eds.). Berlin: Springer, p. 180-189 (Lecture Notes in Computer Science; vol. 8501)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Privacy
DNA
DNA Sequence Analysis
Life Style
Clinical Trials

Authentication and authorisation in entrusted unions

Ayed, D., Camenisch, J., Ignatenko, T., Johnstone, M. N., Koster, R. P., Lange, B., Petkovic, M., Sommer, D. & Zic, J., 2014, 12th Australian Information Security Management Conference ( Perth, Australia, December 1-3, 2014). p. -56-63

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authentication
Cryptography
Information management
Health
Processing

Cuvette and method for authenticating a cuvette

Laubscher, M., Tuyls, P. T., Petkovic, M. & Skoric, B., 4 Mar 2014, Patent No. US8665431, Priority date 6 Nov 2008, Priority No. EP20080168446

Research output: PatentPatent publicationProfessional

Open Access
File
physical properties
6 Citations (Scopus)

Data leakage quantification

Vavilis, S., Petkovic, M. & Zannone, N., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 98-113 (Lecture Notes in Computer Science; vol. 8566)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Leakage (fluid)
Data structures
10 Citations (Scopus)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 243-259 (Lecture Notes in Computer Science; vol. 8566)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Industry

Identity-based encryption of data items for secure access thereto

Katzenbeisser, S. & Petkovic, M., 7 Jan 2014, Patent No. US8627103, Priority date 23 May 2008, Priority No. EP20080156783

Research output: PatentPatent publicationProfessional

Data privacy
Patents and inventions
Cryptography
Health

Method for exchanging data

Koster, R. P. & Petkovic, M., 22 Jul 2014, Patent No. US8788679, Priority date 22 Dec 2008, Priority No. EP20080172594

Research output: PatentPatent publicationProfessional

Open Access
File
Anonyms and Pseudonyms
Delivery of Health Care

Secure Data Management : 10th VLDB workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings

Jonker, W. (ed.) & Petkovic, M. (ed.), 2014, Berlin: Springer. (Lecture notes in computer science; vol. 8425)

Research output: Book/ReportBook editingAcademic

data management
book

Security, privacy and trust : from innovation blocker to innovation enabler

Jonker, W. & Petkovic, M., 2014, Secure Data Management (10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings). Jonker, W. & Petkovic, M. (eds.). Berlin: Springer, p. 54-58 (Lecture Notes in Computer Science; vol. 8425)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

privacy
innovation
social economics
new technology
communication technology
2013
9 Citations (Scopus)

Database anomalous activities: Detection and quantification

Costante, E., Vavilis, S., Etalle, S., Petkovic, M. & Zannone, N., 2013, SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013). SCITEPRESS-Science and Technology Publications, Lda., p. 603-608

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Monitoring
Positive ions
4 Citations (Scopus)

Data reliability in home healthcare services

Vavilis, S., Zannone, N. & Petkovic, M., 2013, Proceedings of the 26th International Symposium on Computer-Based Medical Systems (CBMS'13, Porto, Portugal, June 20-22, 2013). Piscataway: Institute of Electrical and Electronics Engineers, p. 377-380

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

eConsent management and enforcement in personal telehealth

Asim, M., Koster, R. P., Petkovic, M. & Rosner, M., 2013, ISSE 2012 Securing Electronic Business Processes (Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Germany, October 23-24, 2012). Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Springer, p. 209-216

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Security of data
Health
Communication
Costs

Fundamental building blocks for security interoperability in e-business

Asim, M. & Petkovic, M., 30 Jun 2013, Enterprise Resource Planning: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 118-141 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Interoperability
Electronic business
Business concept
Enterprise systems

Information interchange system and apparatus

Qu, J., Li, H. & Petkovic, M., 31 Dec 2013, Patent No. US8621234, Priority date 28 Dec 2007, Priority No. CN20071306619

Research output: PatentPatent publicationProfessional

Open Access
File
Interchanges
Health
Information management
Managers
Patents and inventions
4 Citations (Scopus)

Privacy and security in e-health applications

Petković, M. & Ibraimi, L., 31 Jan 2013, User-Driven Healthcare: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 1141-1166 26 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Privacy
Delivery of Health Care
Health
Technology
Costs and Cost Analysis

Role-based access control

Hammoutene, M., Petkovic, M. & Conrado, C., 21 May 2013, Patent No. US8448240, Priority date 31 Jan 2006, Priority No. US20060763879P

Research output: PatentPatent publicationProfessional

Access control
User interfaces
Program processors
10 Citations (Scopus)

Trust management and user's trust perception in e-business

Costante, E., Petkovic, M. & den Hartog, J., 28 Feb 2013, IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 64-83 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Industry
Access control
User interfaces
Websites
Internet
8 Citations (Scopus)

What websites know about you : privacy policy analysis using information extraction

Costante, E., Hartog, den, J. I. & Petkovic, M., 2013, Data Privacy Management and Autonomous Spontaneous Security (7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers). Di Pietro, R., Herranz, J., Damiani, E. & State, R. (eds.). Berlin: Springer, p. 146-159 (Lecture Notes in Computer Science; vol. 7731)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Information analysis
Data privacy
Websites
Internet
2012
27 Citations (Scopus)

A machine learning solution to assess privacy policy completeness

Costante, E., Sun, Y., Petkovic, M. & Hartog, den, J. I., 2012, Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (WPES co-located with CCS 2012), October 15, 2012, Raleigh NC, USA. Association for Computing Machinery, Inc, p. 91-96

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Learning systems
Data privacy
Websites
2 Citations (Scopus)

An encryption scheme for a secure policy updating

Ibraimi, L., Asim, M. & Petkovic, M., 2012, e-Business and Telecommunications (7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers). Obaidat, M. S., Tsihrintzis, G. A. & Filipe, J. (eds.). Berlin: Springer, p. 304-318 (Communications in Computer and Information Science; vol. 222)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Cryptography
Semantics
4 Citations (Scopus)

Enforcing access control in virtual organizations using hierarchical attribute-based encryption

Asim, M., Ignatenko, T., Petkovic, M., Trivellato, D. & Zannone, N., 2012, Proceedings of the 2012 7th International Conference on Availability, Reliability and Security (ARES 2012) August 20-24, 2012, Prague, Czech Republic. Piscataway: Institute of Electrical and Electronics Engineers, p. 212-217

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Cryptography
4 Citations (Scopus)

Enforcing access control in virtual organizations using hierarchical attribute-based encryption

Asim, M., Ignatenko, T., Petkovic, M., Trivellato, D. & Zannone, N., 2012, s.n.17 p. (arXiv.org; vol. 1205.5757)

Research output: Book/ReportReportAcademic

Access control
Cryptography
15 Citations (Scopus)

Fundamental building blocks for security interoperability in e-business (Chapter 13)

Asim, M. & Petkovic, M., 2012, Handbook of research on E-business standards and protocols: documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 269-292

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Interoperability
Industry
8 Citations (Scopus)

Impact of ICT on Home Healthcare

Vavilis, S., Petkovic, M. & Zannone, N., 2012, ICT Critical Infrastructures and Society (10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedings). Hercheui, M. D., Whitehouse, D., McIver, W. J. & Phahlamohlaka, J. (eds.). Springer, p. 111-122 (IFIP Advances in Information and Communication Technology; vol. 386)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Innovation
Access control
Communication
Compliance
14 Citations (Scopus)

Measuring privacy compliance using fitness metrics

Banescu, S., Petkovic, M. & Zannone, N., 2012, Business Process Management (10th International Conference, BPM 2012, Tallinn, Estonia, September 3-6, 2012. Proceedings). Barros, A., Gal, A. & Kindler, E. (eds.). Berlin: Springer, p. 114-119 (Lecture Notes in Computer Science; vol. 7481)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data privacy
Specifications
Compliance

Processing rights in DRM systems

Kamperman, F. L. A. J., Petkovic, M., Koster, R. P. P. & Vrielink, K. H. J., 7 Aug 2012, Patent No. US8239962, Priority date 17 May 2004, Priority No. EP20040102157

Research output: PatentPatent publicationProfessional

Open Access
File
invention
management
service provider

Secure Data Management : 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012: Preface

Jonker, W. & Petković, M., 6 Sep 2012, In : Lecture Notes in Computer Science. 7482

Research output: Contribution to journalEditorialAcademicpeer-review

Secure data management : 9th VLDB workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings

Jonker, W. (ed.) & Petkovic, M. (ed.), 2012, Berlin: Springer. (Lecture notes in computer science; vol. 7482)(SDM : secure data management : VLDB workshop; vol. 9)

Research output: Book/ReportBook editingAcademic

Turkey
management
8 Citations (Scopus)

Towards trustworthy health platform cloud

Deng, M., Nalin, M., Petkovic, M., Baroni, I. & Marco, A., 2012, Secure Data Management (9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings). Jonker, W. & Petkovic, M. (eds.). Berlin: Springer, p. 162-175 (Lecture Notes in Computer Science; vol. 7482)

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data privacy
Health

Trust management and user's trust perception in e-business

Costante, E., Hartog, den, J. I. & Petkovic, M., 2012, Handbook of research on e-business standards and protocols : documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 321-341

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Trust management
Electronic business
End users
Service provider
Web sites
2011
38 Citations (Scopus)

A home healthcare system in the cloud-addressing security and privacy challenges

Deng, M., Petkovic, M., Nalin, M. & Baroni, I., 2011, Proceedings of the 4th International Conference on Cloud Computing (CLOUD 2011, Washington DC, USA, July 4-9, 2011). Institute of Electrical and Electronics Engineers, p. 549-556

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cloud computing
Cost reduction
Cryptography
Scalability
Software engineering