Login / Signup
PrAISe@ECAI
2016
2016
2016
Keyphrases
Publications
2016
Mona Lange
,
Felix Kuhr
,
Ralf Möller
Using a Deep Understanding of Network Activities for Network Vulnerability Assessment.
PrAISe@ECAI
(2016)
Yingrui Chen
,
Mark Elliot
,
Joseph W. Sakshaug
A Genetic Algorithm Approach to Synthetic Data Production.
PrAISe@ECAI
(2016)
Yatin Wadhawan
,
Clifford Neuman
Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic Approach.
PrAISe@ECAI
(2016)
Oana Cocarascu
,
Francesca Toni
Detecting deceptive reviews using Argumentation.
PrAISe@ECAI
(2016)
Tarik Berkant Kepez
,
Pinar Yolum
Learning Privacy Rules Cooperatively in Online Social Networks.
PrAISe@ECAI
(2016)
Salem Benferhat
,
Mouslim Tolba
,
Karim Tabia
,
Abdelkader Belkhir
Representing sequences of actions in access control security policies.
PrAISe@ECAI
(2016)
Duncan Smith
,
Mark Elliot
Towards a general record linkage framework for statistical disclosure control.
PrAISe@ECAI
(2016)
Proceedings of the 1st International Workshop on AI for Privacy and Security, PrAISe@ECAI 2016, The Hague, Netherlands, August 29-30, 2016
PrAISe@ECAI
(2016)
Dilara Keküllüoglu
,
Nadin Kökciyan
,
Pinar Yolum
Strategies for Privacy Negotiation in Online Social Networks.
PrAISe@ECAI
(2016)
Dimitris Kalles
,
Vassilios S. Verykios
,
Georgios Feretzakis
,
Athanasios Papagelis
Data set operations to hide decision tree rules.
PrAISe@ECAI
(2016)
Masoud Tabatabaei
,
Wojciech Jamroga
,
Peter Y. A. Ryan
Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt.
PrAISe@ECAI
(2016)
Michal Stolba
,
Jan Tozicka
,
Antonín Komenda
Secure Multi-Agent Planning.
PrAISe@ECAI
(2016)
Igor Saenko
,
Igor V. Kotenko
Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes.
PrAISe@ECAI
(2016)
Sebastián García
,
Michal Pechoucek
Detecting the Behavioral Relationships of Malware Connections.
PrAISe@ECAI
(2016)