If you made any changes in Pure these will be visible here soon.

Research Output 2000 2019

2019
1 Citation (Scopus)
11 Downloads (Pure)

Artificial intelligence in clinical health care applications: viewpoint

van Hartskamp, M., Consoli, S., Verhaegh, W., Petkovic, M. & van de Stolpe, A., 5 Apr 2019, In : Interactive Journal of Medical Research. 8, 2, 8 p., e12100.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Artificial Intelligence
Delivery of Health Care
Intelligence
History
Communication

Data science for healthcare: methodologies and applications

Consoli, S. (ed.), Recupero, D. R. (ed.) & Petković, M. (ed.), 1 Jan 2019, Cham: Springer International Publishing Switzerland. 367 p.

Research output: Book/ReportBookAcademic

Delivery of Health Care
Semantic Web
Computer vision
Pattern recognition
Artificial intelligence
1 Citation (Scopus)

Data science in healthcare: benefits, challenges and opportunities

Abedjan, Z., Boujemaa, N., Campbell, S., Casla, P., Chatterjea, S., Consoli, S., Costa-Soria, C., Czech, P., Despenic, M., Garattini, C., Hamelinck, D., Heinrich, A., Kraaij, W., Kustra, J., Lojo, A., Sanchez, M. M., Mayer, M. A., Melideo, M., Menasalvas, E., Aarestrup, F. M. & 15 others, Artigot, E. N., Petković, M., Recupero, D. R., Gonzalez, A. R., Kerremans, G. R., Roller, R., Romao, M., Ruping, S., Sasaki, F., Spek, W., Stojanovic, N., Thoms, J., Vasiljevs, A., Verachtert, W. & Wuyts, R., 1 Jan 2019, Data Science for Healthcare: Methodologies and Applications. Consoli, S., Reforgiato Recupero, D. & Petković, M. (eds.). Cham: Springer, p. 3-38 36 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Delivery of Health Care
Technology
Health Care Sector
Big data
Learning

Preface

Consoli, S., Recupero, D. R. & Petković, M., 2019, Data Science for Healthcare: Methodologies and Applications. Consoli, S., Recupero, D. R. & Petković, M. (eds.). Cham: Springer International Publishing Switzerland, p. vii-ix 3 p.

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

2018

Deep metric learning for sequential data using approximate information

Thaler, S., Menkovski, V. & Petkovic, M., 8 Jul 2018, Machine Learning and Data Mining in Pattern Recognition - 14th International Conference, MLDM 2018, Proceedings. Perner, P. (ed.). Cham: Springer, p. 269-282 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10934 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Distance Metric
Labels
Metric
High-dimensional
Neural Networks
2017
14 Citations (Scopus)
9 Downloads (Pure)

A white-box anomaly-based framework for database leakage detection

Costante, E., den Hartog, J., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2017, In : Journal of Information Security and Applications. 32, p. 27-46

Research output: Contribution to journalArticleAcademicpeer-review

Agglomeration
Neural networks
Feedback
Industry
1 Citation (Scopus)
1 Downloads (Pure)

Towards a neural language model for signature extraction from forensic logs

Thaler, S. M., Menkovski, V. & Petkovic, M., 26 Apr 2017, 2017 5th International Symposium on Digital Forensic and Security (ISDFS), 26-28 April 2017, Tirgu Mures, Romania. Piscataway: Institute of Electrical and Electronics Engineers, p. 1--6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Information use
Knowledge based systems

Towards unsupervised signature extraction of forensic logs

Thaler, S. M., Menkovski, V. & Petkovic, M., 2017, Benelearn 2017: Proceedings of the Twenty-Sixth Benelux Conference on Machine Learning, 9-10 June 2017, Technische Universiteit Eindhoven . p. 154 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)
1 Downloads (Pure)

Unsupervised signature extraction from forensic logs

Thaler, S. M., Menkovski, V. & Petkovic, M., 2017, Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2017, Skopje, Macedonia, September 18–22, 2017, Proceedings, Part III. Altun, Y., Das, K., Mielikäinen, T., Malerba, D., Stefanowski, J., Read, J., Žitnik, M. & Ceci, M. (eds.). Dordrecht: Springer, p. 305-316 (LNCS; vol. 10536).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2016
2 Citations (Scopus)

A severity-based quantification of data leakages in database systems

Vavilis, S., Petkovic, M. & Zannone, N., 1 Jun 2016, In : Journal of Computer Security. 24, 3, p. 321-345 25 p.

Research output: Contribution to journalArticleAcademicpeer-review

Data structures
Leakage (fluid)
Specifications
88 Citations (Scopus)
58 Downloads (Pure)

Making sense of big data in health research : towards an EU action plan

Petkovic, M., Auffray, C., Balling, R. & Barroso, I., 23 Jun 2016, In : Genome Medicine. 8, 13 p., 71.

Research output: Contribution to journalArticleAcademicpeer-review

Open Access
File
Health
Research
Medicine
Mobile Applications
Inventions
2 Citations (Scopus)

Role mining with missing values

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES), 31 August - 2 September 2016, Salzburg, Austria. Piscataway: Institute of Electrical and Electronics Engineers, p. 167-176

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Secure distributed key generation in attribute based encryption systems

Pletea, D., Sedghi, S., Veeningen, M. & Petkovic, M., 17 Feb 2016, 2015 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, 14-16 December 2015, London, United Kingdom. Piscataway: Institute of Electrical and Electronics Engineers, p. 103-107 5 p. 7412067

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cryptography
Computer systems
Data privacy
Cloud computing
Servers
1 Downloads (Pure)

Towards creating believable decoy project folders for detecting data theft

Thaler, S., den Hartog, J. & Petkovic, M., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer, p. 161-169 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Markov processes
User Studies
Data-driven
Markov chain
Attack
2015
7 Citations (Scopus)
5 Downloads (Pure)

An anomaly analysis framework for database systems

Vavilis, S., Egner, A. I., Petkovic, M. & Zannone, N., 2015, In : Computers and Security. 53, p. 156-173 18 p.

Research output: Contribution to journalArticleAcademicpeer-review

incident
ranking
Risk assessment
Visualization
Monitoring
4 Citations (Scopus)
4 Downloads (Pure)

Understanding perceived trust to reduce regret

Costante, E., Hartog, den, J. I. & Petkovic, M., 2015, In : Computational Intelligence. 31, 2, p. 327-347 21 p.

Research output: Contribution to journalArticleAcademicpeer-review

Regret
Privacy
Health
Impact Factor
Security Model
41 Downloads (Pure)

Welcome message from the AU2EU 2015 workshop organizers

Petkovic, M., Camenisch, J., Zic, J. & Egner, A-I., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. p. XXXV

Research output: Chapter in Book/Report/Conference proceedingForeword/postscriptAcademic

Open Access
File
2014
37 Citations (Scopus)
3 Downloads (Pure)

A reference model for reputation systems

Vavilis, S., Petkovic, M. & Zannone, N., 2014, In : Decision Support Systems. 61, 1, p. 147-154 8 p.

Research output: Contribution to journalArticleAcademicpeer-review

Systems Analysis
Technology
Reference model
Reputation system
Surveys and Questionnaires
6 Citations (Scopus)
2 Downloads (Pure)

Attribute-based encryption with encryption and decryption outsourcing

Asim, M., Petkovic, M. & Ignatenko, T., 2014, 12th Australian Information Security Management Conference (Perth, Australia, December 1-3, 2014). Perth: ECU Security Research Institute, p. -21-28

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Outsourcing
Cryptography
1 Citation (Scopus)
4 Downloads (Pure)

AU2EU : Privacy-preserving matching of DNA sequences

Ignatenko, T. & Petkovic, M., 2014, 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Securing the Internet of Things (WISTP 2014, Heraklion, Crete, Greece, June 30-July 2, 2014). Naccache, D. & Sauveron, D. (eds.). Berlin: Springer, p. 180-189 (Lecture Notes in Computer Science; vol. 8501).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Privacy
DNA
DNA Sequence Analysis
Automatic Data Processing
Life Style
2 Downloads (Pure)

Authentication and authorisation in entrusted unions

Ayed, D., Camenisch, J., Ignatenko, T., Johnstone, M. N., Koster, R. P., Lange, B., Petkovic, M., Sommer, D. & Zic, J., 2014, 12th Australian Information Security Management Conference ( Perth, Australia, December 1-3, 2014). p. -56-63

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Authentication
Cryptography
Information management
Health
Processing
19 Downloads (Pure)

Cuvette and method for authenticating a cuvette

Laubscher, M., Tuyls, P. T., Petkovic, M. & Skoric, B., 4 Mar 2014, Patent No. US8665431, Priority date 6 Nov 2008, Priority No. EP20080168446

Research output: PatentPatent publication

Open Access
File
physical properties
6 Citations (Scopus)
2 Downloads (Pure)

Data leakage quantification

Vavilis, S., Petkovic, M. & Zannone, N., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 98-113 (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Leakage (fluid)
Data structures
10 Citations (Scopus)
5 Downloads (Pure)

Hunting the unknown: White-box database leakage detection

Costante, E., Hartog, den, J. I., Petkovic, M., Etalle, S. & Pechenizkiy, M., 2014, Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014). Atluri, V. & Pernul, G. (eds.). Springer, p. 243-259 (Lecture Notes in Computer Science; vol. 8566).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Industry

Identity-based encryption of data items for secure access thereto

Katzenbeisser, S. & Petkovic, M., 7 Jan 2014, Patent No. US8627103, Priority date 23 May 2008, Priority No. EP20080156783

Research output: PatentPatent publication

Data privacy
Patents and inventions
Cryptography
Health
20 Downloads (Pure)

Method for exchanging data

Koster, R. P. & Petkovic, M., 22 Jul 2014, Patent No. US8788679, Priority date 22 Dec 2008, Priority No. EP20080172594

Research output: PatentPatent publication

Open Access
File
Anonyms and Pseudonyms
Delivery of Health Care

Secure Data Management : 10th VLDB workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings

Jonker, W. (ed.) & Petkovic, M. (ed.), 2014, Berlin: Springer. (Lecture notes in computer science; vol. 8425)

Research output: Book/ReportBook editingAcademic

data management
book

Security, privacy and trust : from innovation blocker to innovation enabler

Jonker, W. & Petkovic, M., 2014, Secure Data Management (10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings). Jonker, W. & Petkovic, M. (eds.). Berlin: Springer, p. 54-58 (Lecture Notes in Computer Science; vol. 8425).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

privacy
innovation
social economics
new technology
communication technology
2013
9 Citations (Scopus)
2 Downloads (Pure)

Database anomalous activities: Detection and quantification

Costante, E., Vavilis, S., Etalle, S., Petkovic, M. & Zannone, N., 2013, SECRYPT 2013 (Proceedings of the 10th International Conference on Security and Cryptography, Reykjavik, Iceland, July 29-31, 2013). SCITEPRESS-Science and Technology Publications, Lda., p. 603-608

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Monitoring
4 Citations (Scopus)
2 Downloads (Pure)

Data reliability in home healthcare services

Vavilis, S., Zannone, N. & Petkovic, M., 2013, Proceedings of the 26th International Symposium on Computer-Based Medical Systems (CBMS'13, Porto, Portugal, June 20-22, 2013). Piscataway: Institute of Electrical and Electronics Engineers, p. 377-380

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

eConsent management and enforcement in personal telehealth

Asim, M., Koster, R. P., Petkovic, M. & Rosner, M., 2013, ISSE 2012 Securing Electronic Business Processes (Highlights of the Information Security Solutions Europe 2012 Conference, Brussels, Germany, October 23-24, 2012). Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Springer, p. 209-216

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Security of data
Health
Communication
Costs

Fundamental building blocks for security interoperability in e-business

Asim, M. & Petkovic, M., 30 Jun 2013, Enterprise Resource Planning: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 118-141 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Interoperability
Electronic business
Enterprise systems
Business concept
22 Downloads (Pure)

Information interchange system and apparatus

Qu, J., Li, H. & Petkovic, M., 31 Dec 2013, Patent No. US8621234, Priority date 28 Dec 2007, Priority No. CN20071306619

Research output: PatentPatent publication

Open Access
File
Interchanges
Health
Information management
Managers
Patents and inventions
4 Citations (Scopus)

Privacy and security in e-health applications

Petković, M. & Ibraimi, L., 31 Jan 2013, User-Driven Healthcare: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 1141-1166 26 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Privacy
Delivery of Health Care
Health
Technology
Costs and Cost Analysis

Role-based access control

Hammoutene, M., Petkovic, M. & Conrado, C., 21 May 2013, Patent No. US8448240, Priority date 31 Jan 2006, Priority No. US20060763879P

Research output: PatentPatent publication

Access control
User interfaces
Program processors
10 Citations (Scopus)

Trust management and user's trust perception in e-business

Costante, E., Petkovic, M. & den Hartog, J., 28 Feb 2013, IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications. IGI Global, p. 64-83 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

Industry
Access control
User interfaces
Websites
Internet
8 Citations (Scopus)
11 Downloads (Pure)

What websites know about you : privacy policy analysis using information extraction

Costante, E., Hartog, den, J. I. & Petkovic, M., 2013, Data Privacy Management and Autonomous Spontaneous Security (7th International Workshop, DPM 2012, and 5th International Workshop, SETOP 2012, Pisa, Italy, September 13-14, 2012. Revised Selected Papers). Di Pietro, R., Herranz, J., Damiani, E. & State, R. (eds.). Berlin: Springer, p. 146-159 (Lecture Notes in Computer Science; vol. 7731).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Information analysis
Data privacy
Websites
Internet
2012
27 Citations (Scopus)

A machine learning solution to assess privacy policy completeness

Costante, E., Sun, Y., Petkovic, M. & Hartog, den, J. I., 2012, Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society (WPES co-located with CCS 2012), October 15, 2012, Raleigh NC, USA. Association for Computing Machinery, Inc, p. 91-96

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Learning systems
Data privacy
Websites
2 Citations (Scopus)

An encryption scheme for a secure policy updating

Ibraimi, L., Asim, M. & Petkovic, M., 2012, e-Business and Telecommunications (7th International Joint Conference, ICETE 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers). Obaidat, M. S., Tsihrintzis, G. A. & Filipe, J. (eds.). Berlin: Springer, p. 304-318 (Communications in Computer and Information Science; vol. 222).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Cryptography
Semantics
4 Citations (Scopus)
1 Downloads (Pure)

Enforcing access control in virtual organizations using hierarchical attribute-based encryption

Asim, M., Ignatenko, T., Petkovic, M., Trivellato, D. & Zannone, N., 2012, s.n. 17 p. (arXiv.org; vol. 1205.5757)

Research output: Book/ReportReportAcademic

Access control
Cryptography
4 Citations (Scopus)
4 Downloads (Pure)

Enforcing access control in virtual organizations using hierarchical attribute-based encryption

Asim, M., Ignatenko, T., Petkovic, M., Trivellato, D. & Zannone, N., 2012, Proceedings of the 2012 7th International Conference on Availability, Reliability and Security (ARES 2012) August 20-24, 2012, Prague, Czech Republic. Piscataway: Institute of Electrical and Electronics Engineers, p. 212-217

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Access control
Cryptography
15 Citations (Scopus)

Fundamental building blocks for security interoperability in e-business (Chapter 13)

Asim, M. & Petkovic, M., 2012, Handbook of research on E-business standards and protocols: documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 269-292

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

Interoperability
Industry
8 Citations (Scopus)
2 Downloads (Pure)

Impact of ICT on Home Healthcare

Vavilis, S., Petkovic, M. & Zannone, N., 2012, ICT Critical Infrastructures and Society (10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012. Proceedings). Hercheui, M. D., Whitehouse, D., McIver, W. J. & Phahlamohlaka, J. (eds.). Springer, p. 111-122 (IFIP Advances in Information and Communication Technology; vol. 386).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Innovation
Access control
Communication
Compliance
14 Citations (Scopus)
4 Downloads (Pure)

Measuring privacy compliance using fitness metrics

Banescu, S., Petkovic, M. & Zannone, N., 2012, Business Process Management (10th International Conference, BPM 2012, Tallinn, Estonia, September 3-6, 2012. Proceedings). Barros, A., Gal, A. & Kindler, E. (eds.). Berlin: Springer, p. 114-119 (Lecture Notes in Computer Science; vol. 7481).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data privacy
Specifications
Compliance
26 Downloads (Pure)

Processing rights in DRM systems

Kamperman, F. L. A. J., Petkovic, M., Koster, R. P. P. & Vrielink, K. H. J., 7 Aug 2012, Patent No. US8239962, Priority date 17 May 2004, Priority No. EP20040102157

Research output: PatentPatent publication

Open Access
File
invention
management
service provider

Secure Data Management : 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012: Preface

Jonker, W. & Petković, M., 6 Sep 2012, In : Lecture Notes in Computer Science. 7482

Research output: Contribution to journalEditorialAcademicpeer-review

Secure data management : 9th VLDB workshop, SDM 2012, Istanbul, Turkey, August 27, 2012 : proceedings

Jonker, W. (ed.) & Petkovic, M. (ed.), 2012, Berlin: Springer. (Lecture notes in computer science; vol. 7482)(SDM : secure data management : VLDB workshop; vol. 9)

Research output: Book/ReportBook editingAcademic

Turkey
management
8 Citations (Scopus)
1 Downloads (Pure)

Towards trustworthy health platform cloud

Deng, M., Nalin, M., Petkovic, M., Baroni, I. & Marco, A., 2012, Secure Data Management (9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012. Proceedings). Jonker, W. & Petkovic, M. (eds.). Berlin: Springer, p. 162-175 (Lecture Notes in Computer Science; vol. 7482).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Data privacy
Health

Trust management and user's trust perception in e-business

Costante, E., Hartog, den, J. I. & Petkovic, M., 2012, Handbook of research on e-business standards and protocols : documents, data and advanced web technologies. Kajan, E., Dorloff, F. D. & Bedini, I. (eds.). IGI Global, p. 321-341

Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

End users
Electronic business
Trust management
Service provider
Privacy policies
2011
40 Citations (Scopus)

A home healthcare system in the cloud-addressing security and privacy challenges

Deng, M., Petkovic, M., Nalin, M. & Baroni, I., 2011, Proceedings of the 4th International Conference on Cloud Computing (CLOUD 2011, Washington DC, USA, July 4-9, 2011). Institute of Electrical and Electronics Engineers, p. 549-556

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Cloud computing
Cost reduction
Cryptography
Scalability
Software engineering