Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Audun Josang"'
Publikováno v:
Information, Vol 14, Iss 1, p 16 (2022)
Network traffic data analysis is important for securing our computing environment and data. However, analyzing network traffic data requires tremendous effort because of the complexity of continuously changing network traffic patterns. To assist the
Externí odkaz:
https://doaj.org/article/3073b640256e41c7ab21cc5f20be839c
Autor:
Touhid Bhuiyan, Audun Josang
Publikováno v:
International Journal of Engineering Business Management, Vol 2, Iss 1, Pp 23-28 (2010)
Trust can be used to improve online automated recommendation within a given domain. Trust transitivity is used to make it successful. But trust transitivity has different interpretations. Trust and trust transitivity; both are the human mental phenom
Externí odkaz:
https://doaj.org/article/e87321f9b481452b8d2eeb9e892ee23a
Publikováno v:
2022 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI).
Autor:
Audun Jøsang
This book gives a complete introduction to cybersecurity and its many subdomains. It's unique by covering both technical and governance aspects of cybersecurity and is easy to read with 150 full color figures. There are also exercises and study cases
This book constitutes the refereed proceedings of the 36th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2021, held in Oslo, Norway, in June 2021.•The 28 full papers presented were carefully reviewed and se
Autor:
Audun Josang
Publikováno v:
2019 22th International Conference on Information Fusion (FUSION).
Autor:
Audun Jøsang
This is the first comprehensive treatment of subjective logic and all its operations. The author developed the approach, and in this book he first explains subjective opinions, opinion representation, and decision-making under vagueness and uncertain
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research
Autor:
Audun Jøsang, Bengt Carlsson
This book constitutes the refereed proceedings of the 17th Nordic Conference on Secure IT Systems, NordSec 2012, held in Karlskrona, Sweden, in October 2012. The 16 revised papers were carefully reviewed and selected from 32 submissions. The papers a
This volume contains the proceedings of IFIPTM 2010, the 4th IFIP WG 11.11 International Conference on Trust Management, held in Morioka, Iwate, Japan during June 16-18, 2010. IFIPTM 2010 provided a truly global platform for the reporting of research