Zobrazeno 1 - 10
of 65
pro vyhledávání: '"Camp, Olivier"'
Publikováno v:
In Expert Systems With Applications 15 July 2024 246
Recent works on Multi-Armed Bandits (MAB) and Combinatorial Multi-Armed Bandits (COM-MAB) show good results on a global accuracy metric. This can be achieved, in the case of recommender systems, with personalization. However, with a combinatorial onl
Externí odkaz:
http://arxiv.org/abs/2009.07518
Publikováno v:
In Artificial Intelligence In Medicine May 2022 127
Publikováno v:
In Information Sciences 6 February 2021 546:378-396
Autor:
Spagnuelo, Dayana, Ferreira, Ana, Lenzini, Gabriele, Mori, Paolo, Furnell, Steven, Camp, Olivier
Publikováno v:
Communications in Computer and Information Science ISBN: 9783030494421
ICISSP (Revised Selected Papers)
Spagnuelo, D, Ferreira, A & Lenzini, G 2020, Transparency Enhancing Tools and the GDPR : Do They Match? in P Mori, S Furnell & O Camp (eds), Information Systems Security and Privacy : 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers . Communications in Computer and Information Science, vol. 1221 CCIS, Springer, pp. 162-185, 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, 23/02/19 . https://doi.org/10.1007/978-3-030-49443-8_8
Information Systems Security and Privacy: 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers, 162-185
STARTPAGE=162;ENDPAGE=185;TITLE=Information Systems Security and Privacy
ICISSP (Revised Selected Papers)
Spagnuelo, D, Ferreira, A & Lenzini, G 2020, Transparency Enhancing Tools and the GDPR : Do They Match? in P Mori, S Furnell & O Camp (eds), Information Systems Security and Privacy : 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers . Communications in Computer and Information Science, vol. 1221 CCIS, Springer, pp. 162-185, 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, Prague, Czech Republic, 23/02/19 . https://doi.org/10.1007/978-3-030-49443-8_8
Information Systems Security and Privacy: 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers, 162-185
STARTPAGE=162;ENDPAGE=185;TITLE=Information Systems Security and Privacy
The introduction of the General Data Protection Regulation (GDPR) came to further strengthen the need for transparency—one of its main principles—and with it, the users’ empowerment to make service providers more responsible and accountable for
Autor:
Lathouwers, Sophie, Everts, Maarten, Huisman, Marieke, Furnell, Steven, Mori, Paolo, Weippl, Edgar, Camp, Olivier
Publikováno v:
ICISSP
ICISSP 2020-Proceedings of the 6th International Conference on Information Systems Security and Privacy, 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, 25 February 2020 through 27 February 2020, 784-795
Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE, 784-795
STARTPAGE=784;ENDPAGE=795;TITLE=Proceedings of the 6th International Conference on Information Systems Security and Privacy
ICISSP 2020-Proceedings of the 6th International Conference on Information Systems Security and Privacy, 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, 25 February 2020 through 27 February 2020, 784-795
Proceedings of the 6th International Conference on Information Systems Security and Privacy: Volume 1: ForSE, 784-795
STARTPAGE=784;ENDPAGE=795;TITLE=Proceedings of the 6th International Conference on Information Systems Security and Privacy
String sanitizers are widely used functions for preventing injection attacks such as SQL injections and cross-site scripting (XSS). It is therefore crucial that the implementations of such string sanitizers are correct. We present a novel approach to
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0465c15754c2deca173b1a9a24f42c7e
https://doi.org/10.5220/0009371207840795
https://doi.org/10.5220/0009371207840795
Publikováno v:
In How Information Systems Can Help in Alarm/Alert Detection 2018:33-53