Mapping crime descriptions to law articles using deep learning. | 0 | 0.34 | 2020 |
Opening Privacy Sensitive Microdata Sets in Light of GDPR | 0 | 0.34 | 2019 |
On opening sensitive data sets in light of GDPR | 0 | 0.34 | 2019 |
A Conceptual Framework For Addressing Iot Threats: Challenges In Meeting Challenges | 0 | 0.34 | 2018 |
Exploiting Data Analytics for Social Services: On Searching for Profiles of Unlawful Use of Social Benefits. | 0 | 0.34 | 2018 |
Influence Of Mental Models On The Design Of Cyber Security Dashboards | 0 | 0.34 | 2017 |
On Usage Control In Relational Database Management Systems Obligations And Their Enforcement In Joining Datasets | 1 | 0.35 | 2017 |
On Using Obligations for Usage Control in Joining of Datasets. | 0 | 0.34 | 2017 |
Exploiting Big Data for Evaluation Studies | 0 | 0.34 | 2017 |
On Enabling Smart Government: A Legal Logistics Framework for Future Criminal Justice Systems. | 0 | 0.34 | 2016 |
Maturing Pay-as-you-go Data Quality Management: Towards Decision Support for Paying the Larger Bills. | 0 | 0.34 | 2016 |
Compressing Large Amounts of NetFlow Data Using a Pattern Classification Scheme | 0 | 0.34 | 2016 |
Meeting Open Data Halfway: on Semi-Open Data Paradigm. | 1 | 0.37 | 2016 |
On design and deployment of two privacy-preserving procedures for judicial-data dissemination. | 1 | 0.37 | 2016 |
Management of Data Quality Related Problems - Exploiting Operational Knowledge. | 0 | 0.34 | 2016 |
A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence | 4 | 0.43 | 2015 |
Privacy and information sharing in a judicial setting: a wicked problem | 3 | 0.47 | 2015 |
Privacy protection in data sharing: towards feedback based solutions | 4 | 0.44 | 2014 |
Research skills for software engineering undergraduates in dutch universities of applied sciences | 1 | 0.37 | 2014 |
Fraud Indicators Applied to Legal Entities: An Empirical Ranking Approach. | 0 | 0.34 | 2014 |
Exploring a Warrior Paradigm to Design Out Cybercrime | 2 | 0.38 | 2012 |
Sensing, actuation triggering and decision making for service robots deployed in smart homes | 0 | 0.34 | 2011 |
Power- and delay-awareness of health telemonitoring services: the mobihealth system case study | 5 | 0.49 | 2009 |
Trust-enhanced Security in Location-based Adaptive Authentication | 10 | 0.61 | 2008 |
Indoor localization based on response rate of bluetooth inquiries | 49 | 2.91 | 2008 |
Reducing handover latency in future IP-based wireless networks: proxy mobile IPv6 with simultaneous bindings | 7 | 1.68 | 2008 |
Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using DNSSEC | 0 | 0.34 | 2008 |
Network Resource Awareness and Control in Mobile Applications | 2 | 0.42 | 2007 |
Context Sensitive Adaptive Authentication | 15 | 0.72 | 2007 |
Towards an Energy-Aware Network Activation Strategy for Multi-Homed Mobile Devices | 3 | 0.45 | 2006 |
Context sensitive access control | 76 | 3.00 | 2005 |
Context-Based Service Access for Train Travelers | 2 | 0.51 | 2004 |
The 4GPLUS Project, Overview and Main Results | 1 | 0.44 | 2004 |
Privacy Enforcement Embedded in Mobile Services | 0 | 0.34 | 2004 |
A mechanism for host mobility management supporting application awareness | 11 | 0.89 | 2004 |
A structured framework for federation between 4G-service platforms | 1 | 0.43 | 2003 |