Home > Research > Browse

Results for Modeling technique

Publications & Outputs

  1. Privacy-by-design based on quantitative threat modeling

    Luna, J., Suri, N. & Krontiris, I., 10/10/2012, 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS). IEEE, 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Modeling human activity semantics for improved recognition performance

    Kim, E. & Helal, S., 2011, 8th International Conference on Ubiquitous Intelligence and Computing, UIC 2011. Hsu, C. H., Yang, L. T., Ma, J. & Zhu, C. (eds.). Berlin: Springer, p. 514-528 15 p. (Lecture Notes in Computer Science; vol. 6905).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review