Micha Moffie

According to our database1, Micha Moffie authored at least 24 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Data minimization for GDPR compliance in machine learning models.
AI Ethics, 2022

Applying Artificial Intelligence Privacy Technology in the Healthcare Domain.
Proceedings of the Challenges of Trustable AI and Added-Value on Health, 2022

2021
Enhancing GDPR compliance through data sensitivity and data hiding tools.
J. Univers. Comput. Sci., 2021

Next Generation Data Masking Engine.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Anonymizing Machine Learning Models.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

2020
Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.0.
Comput. Stand. Interfaces, 2020

2019
Multi-value Classification of Ambiguous Personal Data.
Proceedings of the New Trends in Model and Data Engineering, 2019

2016
Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

2015
A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015

Cyber-Physical Systems Design for Runtime Thrustworthiness Maintenance Supported by Tools.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015

Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015

2014
Maintaining Trustworthiness of Socio-Technical Systems at Run-Time.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014

2011
Virtual machine monitor-based lightweight intrusion detection.
ACM SIGOPS Oper. Syst. Rev., 2011

Workload Characterization at the Virtualization Layer.
Proceedings of the MASCOTS 2011, 2011

2010
Effective Virtual Machine Monitor Intrusion Detection Using Feature Selection on Highly Imbalanced Data.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010

2007
On the complexity of Jensen's algorithm for counting fixed polyominoes.
J. Discrete Algorithms, 2007

Exploring Novel Parallelization Technologies for 3-D Imaging Applications.
Proceedings of the 19th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2007), 2007

2006
Hunting Trojan Horses.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

2005
Characterizing antivirus workload execution.
SIGARCH Comput. Archit. News, 2005

ASM: application security monitor.
SIGARCH Comput. Archit. News, 2005

2004
Power Awareness through Selective Dynamically Optimized Traces.
Proceedings of the 31st International Symposium on Computer Architecture (ISCA 2004), 2004

The Complexity of Jensen's Algorithm for Counting Polyominoes.
Proceedings of the Sixth Workshop on Algorithm Engineering and Experiments and the First Workshop on Analytic Algorithmics and Combinatorics, 2004

2003
PARROT: Power Awareness Through Selective Dynamically Optimized Traces.
Proceedings of the Power-Aware Computer Systems, Third International Workshop, 2003

Selecting long atomic traces for high coverage.
Proceedings of the 17th Annual International Conference on Supercomputing, 2003


  Loading...