RESEARCH OUTPUTS/RÉSULTATS DE RECHERCHE C Linard, K Tersago, H Leirs, EF Lambin International Journal of Health Geographics 6, 15, 2007 | 153* | 2007 |
Utilising deep learning techniques for effective zero-day attack detection H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens Electronics 9 (10), 1684, 2020 | 85 | 2020 |
A digital licensing model for the exchange of learning objects in a federated environment J Simon, JN Colin Proceedings. First IEEE International Workshop on Electronic Contracting …, 2004 | 28 | 2004 |
Secure ICT services for mobile and wireless communications: a federated global identity management framework J Siddiqi, B Akhgar, M Naderi, W Orth, N Meyer, M Tuisku, G Pipan, ... Third International Conference on Information Technology: New Generations …, 2006 | 26 | 2006 |
Model-driven Approach for Privacy Management in Business Ecosystem. C Feltus, E Grandry, T Kupper, JN Colin MODELSWARD, 392-400, 2017 | 24 | 2017 |
PrimAndroid: privacy policy modelling and analysis for android applications G Benats, A Bandara, Y Yu, JN Colin, B Nuseibeh 2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011 | 24 | 2011 |
LIMBS: Open source, open standards, and open content to foster learning resource exchanges JN Colin, D Massart Sixth IEEE International Conference on Advanced Learning Technologies (ICALT …, 2006 | 15 | 2006 |
Adaptive risk-aware access control model for internet of things TA Rath, JN Colin 2017 International Workshop on Secure Internet of Things (SIoT), 40-49, 2017 | 13 | 2017 |
Strengthening access control in case of compromised accounts in smart home AT Rath, JN Colin 2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017 | 12 | 2017 |
Context-aware and attribute-based access control applying proactive computing to IoT system N Picard, JN Colin, D Zampunieris Proceedings of the 3rd International Conference on Internet of Things, Big …, 2018 | 9 | 2018 |
Patient privacy preservation: P-RBAC vs OrBAC in patient controlled records type of centralized healthcare information system. case study of walloon healthcare network, belgium AT Rath, JN Colin The 4th International Conference on eHealth, Telemedicine, and Social …, 2012 | 9 | 2012 |
A Federated Authorization Service for Bridging Learning Object Distribution Models. JN Colin, TD Le, D Massart ICWL, 116-125, 2009 | 9 | 2009 |
Authentication, authorisation, and rights management for the CELEBRATE brokerage system JN Colin, J Simon Celebrate Deliverable D 3 (3), 2003 | 9 | 2003 |
Blockchain and Internet of Things opportunities and challenges K Sok, JN Colin, K Po Proceedings of the 9th International Symposium on Information and …, 2018 | 7 | 2018 |
Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment AT Rath, JN Colin Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 7 | 2014 |
Celebrate: A federated model for exchange of learning objects J Simon, JN Colin Proc. of the World Conference on E-Learning in Corporate, Government …, 2004 | 7 | 2004 |
Attacker behavior-based metric for security monitoring applied to darknet analysis L Evrard, J François, JN Colin 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 6 | 2019 |
Internet of Things Opportunities and Challenges K Sok, JN Colin, KB Po Proceedings of the Ninth International Symposium on Information and …, 2018 | 6 | 2018 |
Towards purpose enforcement model for privacy–aware usage control policy in distributed healthcare AT Rath, JN Colin International Journal of Security and Networks 8 (2), 94-105, 2013 | 6 | 2013 |
Protecting personal data: access control for privacy preserving perimeter protection system AT Rath, JN Colin Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 5 | 2015 |