Henric Johnson

According to our database1, Henric Johnson authored at least 28 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Governing AI safety through independent audits.
Nat. Mach. Intell., 2021

2017
A Cloud Theory-Based Trust Computing Model in Social Networks.
Entropy, 2017

Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method.
Entropy, 2017

2016
Finding Influential Users in Social Media Using Association Rule Learning.
Entropy, 2016

Predicting User Participation in Social Media.
Proceedings of the Advances in Network Science, 2016

2015
Crawling Online Social Networks.
Proceedings of the 2015 Second European Network Intelligence Conference, 2015

2014
Profile Cloning Detection in Social Networks.
Proceedings of the 2014 European Network Intelligence Conference, 2014

2013
SmartWiki: A reliable and conflict-refrained Wiki model based on reader differentiation and social context analysis.
Knowl. Based Syst., 2013

Making social interactions accessible in online social networks.
Inf. Serv. Use, 2013

On user perception of safety in online social networks.
Int. J. Commun. Networks Distributed Syst., 2013

Open data for anomaly detection in maritime surveillance.
Expert Syst. Appl., 2013

Leveraging Social Interactions to Suggest Friends.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

2012
E-Mail Prioritization using Online Social Network Profile Distance.
Int. J. Comput. Sci. Appl., 2012

SIN: A Platform to Make Interactions in Social Networks Accessible.
Proceedings of the 2012 International Conference on Social Informatics (SocialInformatics), 2012

Privacy Threats Related to User Profiling in Online Social Networks.
Proceedings of the 2012 International Conference on Privacy, 2012

2011
Measuring profile distance in online social networks.
Proceedings of the International Conference on Web Intelligence, Mining and Semantics, 2011

Read What You Trust: An Open Wiki Model Enhanced by Social Context.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

A Socially-Aware Operating System for Trustworthy Computing.
Proceedings of the 5th IEEE International Conference on Semantic Computing (ICSC 2011), 2011

Trustworthy opportunistic sensing: A Social Computing Paradigm.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Your best might not be good enough: Ranking in collaborative social search engines.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Accurate Adware Detection Using Opcode Sequence Extraction.
Proceedings of the Sixth International Conference on Availability, 2011

2006
Hierarchical Defense Structure for Mitigating DoS Attacks.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

A Decision System for Adequate Authentication.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

2005
Toward Adjustable Lightweight Authentication for Network Access Control.
PhD thesis, 2005

TCPtransform: Property-Oriented TCP Traffic Transformation.
Proceedings of the Detection of Intrusions and Malware, 2005

2004
SOLA: Lightweight Security for Access Control in IEEE 802.11.
IT Prof., 2004

2003
RBWA: an efficient random-bit window-based authentication protocol.
Proceedings of the Global Telecommunications Conference, 2003

2002
SOLA: a one-bit identity authentication protocol for access control in IEEE 802.11.
Proceedings of the Global Telecommunications Conference, 2002


  Loading...