-
1Report
المؤلفون: Tihanyi, Norbert, Bisztray, Tamas, Dubniczky, Richard A., Toth, Rebeka, Borsos, Bertalan, Cherif, Bilel, Ferrag, Mohamed Amine, Muzsai, Lajos, Jain, Ridhi, Marinelli, Ryan, Cordeiro, Lucas C., Debbah, Merouane, Mavroeidis, Vasileios, Josang, Audun
URL الوصول: http://arxiv.org/abs/2410.15490
-
2Report
المؤلفون: Zhang, Qi, Kaplan, Lance M., Jøsang, Audun, Jeong, Dong Hyun., Chen, Feng, Cho, Jin-Hee
مصطلحات موضوعية: Computer Science - Social and Information Networks
URL الوصول: http://arxiv.org/abs/2404.18826
-
3Report
المؤلفون: Li, Changbin, Li, Kangshuo, Ou, Yuzhe, Kaplan, Lance M., Jøsang, Audun, Cho, Jin-Hee, Jeong, Dong Hyun, Chen, Feng
مصطلحات موضوعية: Computer Science - Computer Vision and Pattern Recognition, Computer Science - Machine Learning
URL الوصول: http://arxiv.org/abs/2404.10980
-
4Report
المؤلفون: Pasumarthy, Lakshmi Rama Kiran, Ali, Hisham, Buchanan, William J, Ahmad, Jawad, Josang, Audun, Mavroeidis, Vasileios, Lemoudden, Mouad
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/2403.05210
-
5Report
المؤلفون: Jeong, Dong H., Cho, Jin-Hee, Chen, Feng, Josang, Audun, Ji, Soo-Yeon
مصطلحات موضوعية: Computer Science - Human-Computer Interaction, Computer Science - Artificial Intelligence
URL الوصول: http://arxiv.org/abs/2310.01580
-
6Report
المؤلفون: Guo, Zhen, Zhang, Qi, An, Xinwei, Zhang, Qisheng, Jøsang, Audun, Kaplan, Lance M., Chen, Feng, Jeong, Dong H., Cho, Jin-Hee
مصطلحات موضوعية: Computer Science - Computation and Language, Computer Science - Artificial Intelligence, Computer Science - Machine Learning
URL الوصول: http://arxiv.org/abs/2302.10195
-
7Report
المؤلفون: Zhang, Qisheng, Guo, Zhen, Jøsang, Audun, Kaplan, Lance M., Chen, Feng, Jeong, Dong H., Cho, Jin-Hee
URL الوصول: http://arxiv.org/abs/2212.06343
-
8Report
المؤلفون: Guo, Zhen, Wan, Zelin, Zhang, Qisheng, Zhao, Xujiang, Chen, Feng, Cho, Jin-Hee, Zhang, Qi, Kaplan, Lance M., Jeong, Dong H., Jøsang, Audun
مصطلحات موضوعية: Computer Science - Artificial Intelligence, Computer Science - Information Theory, Computer Science - Machine Learning
URL الوصول: http://arxiv.org/abs/2206.05675
-
9Book
المؤلفون: Tran, Dinh Uy, Selnes, Sigrid Haug, Hagen, Janne Merete, Jøsang, Audun
المصدر: Tran, Dinh Uy Selnes, Sigrid Haug Hagen, Janne Merete Jøsang, Audun . An Opportunity-Based Approach to Information Security Risk. Computer Security. ESORICS 2023 International Workshops CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25–29, 2023, Revised Selected Papers, Part II. 2024, 7-25 Springer Cham
Relation: Lecture Notes in Computer Science (LNCS)
الاتاحة: http://hdl.handle.net/10852/115044
-
10Report
المؤلفون: Mavroeidis, Vasileios, Jøsang, Audun
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/2103.15194
-
11Report
المؤلفون: Mavroeidis, Vasileios, Hohimer, Ryan, Casey, Tim, Jøsang, Audun
المصدر: 2021 13th International Conference on Cyber Conflict (CyCon)
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/2103.02301
-
12
-
13Academic Journal
المؤلفون: Guo, Zhen, Wan, Zelin, Zhang, Qisheng, Zhao, Xujiang, Zhang, Qi, Kaplan, Lance M., Jøsang, Audun, Jeong, Dong H., Chen, Feng, Cho, Jin-Hee
المساهمون: Army Research Office, Army Research Laboratory, National Science Foundation
المصدر: Information Fusion ; volume 101, page 101987 ; ISSN 1566-2535
-
14Report
-
15
-
16Report
المؤلفون: Mavroeidis, Vasileios, Vishi, Kamer, Zych, Mateusz D., Jøsang, Audun
المصدر: International Journal of Advanced Computer Science and Applications (IJACSA), 9(3), 405-414, March 2018
مصطلحات موضوعية: Computer Science - Cryptography and Security, 81P94, 11T71, 94A60, 14G50
URL الوصول: http://arxiv.org/abs/1804.00200
-
17Report
المؤلفون: Isa, Mohd Anuar Mat, Mahmod, Ramlan, Udzir, Nur Izura, Manan, Jamalul-lail Ab, Jøsang, Audun, Tanha, Ali Dehghan
المصدر: Journal of Current Research in Science, Issn 2322-5009, 4(2), 2016: 177-194
مصطلحات موضوعية: Computer Science - Cryptography and Security, Computer Science - Artificial Intelligence
URL الوصول: http://arxiv.org/abs/1606.02239
-
18BookInformation Security Posture to Organize and Communicate the Information Security Governance Program
المؤلفون: Tran, Dinh Uy, Jøsang, Audun
المصدر: Tran, Dinh Uy Jøsang, Audun . Information Security Posture to Organize and Communicate the Information Security Governance Program. Proceedings of the 18th European Conference on Management Leadership and Governance. 2022, 515-522 Academic Conferences International (ACI)
Relation: Proceedings of the European Conference on Management, Leadership and Governance (ECMLG)
الاتاحة: http://hdl.handle.net/10852/98958
-
19Conference
المؤلفون: Chetwyn, Robert Andrew, Eian, Martin, Jøsang, Audun
المصدر: 2024 IEEE International Conference on Cyber Security and Resilience (CSR) ; page 853-859
-
20Conference
المؤلفون: Chetwyn, Robert Andrew, Eian, Martin, Jøsang, Audun
المصدر: European Interdisciplinary Cybersecurity Conference