Author of the publication

Privacy Invasive Software in File-Sharing Tools.

, , and . International Information Security Workshops, volume 148 of IFIP, page 277-292. Kluwer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Preventing Privacy-Invasive Software Using Collaborative Reputation Systems., , , and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 142-157. Springer, (2007)Multi-expert estimations of burglars' risk exposure and level of pre-crime preparation based on crime scene data., , and . SAIS, volume 137 of Linköping Electronic Conference Proceedings, page 137:004. Linköping University Electronic Press, (2017)Evaluation of Defense Methods Against the One-Pixel Attack on Deep Neural Networks., , and . SAIS, volume 199 of Linköping Electronic Conference Proceedings, page 49-57. Linköping University Electronic Press, (2023)On the Risk Exposure of Smart Home Automation Systems., , and . FiCloud, page 183-190. IEEE Computer Society, (2014)Software Vulnerability Assessment Version Extraction and Verification., , and . ICSEA, page 59. IEEE Computer Society, (2007)Automated Generation of CCTV Camera Coverage Areas for Smart Cities Using Line-of-Sight Analysis., , and . ISCC, page 1-6. IEEE, (2024)Analysis and Text Classification of Privacy Policies From Rogue and Top-100 Fortune Global Companies., and . Int. J. Inf. Secur. Priv., 13 (2): 47-66 (2019)E-mail classification with machine learning and word embeddings for improved customer support., , , and . Neural Comput. Appl., 33 (6): 1881-1902 (2021)Predicting e-Mail Response Time in Corporate Customer Support., , and . ICEIS (1), page 305-314. SCITEPRESS, (2020)Analysing Countermeasures Against Privacy-Invasive Software., and . ICSEA, page 61. IEEE Computer Society, (2006)