Search results for: Yuval Elovici
Handbook of Social Network Technologies and Applications > Privacy in Online Social Networks > 549-568
Lecture Notes in Computer Science > KI 2007: Advances in Artificial Intelligence > Posters > 489-493
Lecture Notes in Computer Science > Protecting Persons While Protecting the People > Section Two: Theoretical Approaches to the Problem > 63-81
Lecture Notes in Computer Science > Next Generation Information Technologies and Systems > The Fifth Workshop on Next Generation Information Technologies and Systems (NGITS’2002) > 45-57
Lecture Notes in Computer Science > Intelligence and Security Informatics > Malware and Intrusion Detection > 179-190
Lecture Notes in Computer Science > Intelligence and Security Informatics > Malware and Intrusion Detection > 191-203
Lecture Notes in Computer Science > Privacy, Security, and Trust in KDD > Contributed Papers > 74-91
Lecture Notes in Computer Science > Stabilization, Safety, and Security of Distributed Systems > 223-237
Lecture Notes in Computer Science > Intelligence and Security Informatics > Malware and Intrusion Detection > 204-215
Lecture Notes in Computer Science > Knowledge Discovery in Databases: PKDD 2004 > Demonstration Papers > 540-542