Author of the publication

Privacy-Invasive Software and Preventive Mechanisms.

, and . ICSNC, page 21. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-expert estimations of burglars' risk exposure and level of pre-crime preparation based on crime scene data., , and . SAIS, volume 137 of Linköping Electronic Conference Proceedings, page 137:004. Linköping University Electronic Press, (2017)Preventing Privacy-Invasive Software Using Collaborative Reputation Systems., , , and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 142-157. Springer, (2007)On the Risk Exposure of Smart Home Automation Systems., , and . FiCloud, page 183-190. IEEE Computer Society, (2014)Evaluation of Defense Methods Against the One-Pixel Attack on Deep Neural Networks., , and . SAIS, volume 199 of Linköping Electronic Conference Proceedings, page 49-57. Linköping University Electronic Press, (2023)Software Vulnerability Assessment Version Extraction and Verification., , and . ICSEA, page 59. IEEE Computer Society, (2007)Automated Generation of CCTV Camera Coverage Areas for Smart Cities Using Line-of-Sight Analysis., , and . ISCC, page 1-6. IEEE, (2024)Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies., and . Int. J. Inf. Secur. Priv., 13 (2): 47-66 (2019)E-mail classification with machine learning and word embeddings for improved customer support., , , and . Neural Comput. Appl., 33 (6): 1881-1902 (2021)Using Conformal Prediction for Multi-label Document Classification in e-Mail Support Systems., , and . IEA/AIE, volume 11606 of Lecture Notes in Computer Science, page 308-322. Springer, (2019)Analysing Countermeasures Against Privacy-Invasive Software., and . ICSEA, page 61. IEEE Computer Society, (2006)