Zobrazeno 1 - 10
of 258
pro vyhledávání: '"Zannone, N."'
Publikováno v:
In Computers & Security April 2024 139
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
VEHITS 2020-Proceedings of the 6th International Conference on Vehicle Technology and Intelligent Transport Systems, 53-58
Vehicles, as a prime example of high-tech systems, get increasingly connected and data-centric with the need to process personally identifiable information. Often, companies that develop such systems act as integrators and need to comply to adequate
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::aa2b74df7da2dfedbfbd256dab4f627c
http://resolver.tudelft.nl/uuid:84fe3f16-4e29-4139-99a3-eef0570b3dee
http://resolver.tudelft.nl/uuid:84fe3f16-4e29-4139-99a3-eef0570b3dee
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017), 8-22
STARTPAGE=8;ENDPAGE=22;TITLE=Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)
STARTPAGE=8;ENDPAGE=22;TITLE=Proceedings of the 7th International Symposium on Data-driven Process Discovery and Analysis (SIMPDA 2017)
Mining local patterns of process behavior is a vital tool for the analysis of event data that originates from flexible processes, for which it is generally not possible to describe the behavior of the process in a single process model without overgen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::f9666b5a2ec8161d7440c099b63cee07
https://research.tue.nl/nl/publications/7d564d78-16be-4a65-b5b7-879e957e20f8
https://research.tue.nl/nl/publications/7d564d78-16be-4a65-b5b7-879e957e20f8
Publikováno v:
Lecture Notes in Business Information Processing ISBN: 9783319272429
SIMPDA (Revised Selected Papers)
Data-driven process discovery and analysis, 237, 58-78
SIMPDA (Revised Selected Papers)
Data-driven process discovery and analysis, 237, 58-78
Alignments provide a robust approach for conformance checking, which has been largely applied in various contexts such as auditing and performance analysis. Alignment-based conformance checking techniques pinpoint the deviations causing nonconformity
Publikováno v:
Secure Data Management (10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings), 121-138
STARTPAGE=121;ENDPAGE=138;TITLE=Secure Data Management (10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings)
Lecture Notes in Computer Science ISBN: 9783319068107
Secure Data Management
STARTPAGE=121;ENDPAGE=138;TITLE=Secure Data Management (10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013. Proceedings)
Lecture Notes in Computer Science ISBN: 9783319068107
Secure Data Management
Social networks are becoming increasingly popular nowadays. Users share personal information about themselves and other users in order to build and maintain their social network. However, the large amount of personal information available on social n
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662439357
DBSec
Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014), 98-113
STARTPAGE=98;ENDPAGE=113;TITLE=Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014)
DBSec
Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014), 98-113
STARTPAGE=98;ENDPAGE=113;TITLE=Data and Applications Security and Privacy XXVIII (28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014)
The detection and handling of data leakages is becoming a critical issue for organizations. To this end, data leakage solutions are usually employed by organizations to monitor network traffic and the use of portable storage devices. These solutions