Raúl Pardo

Orcid: 0000-0003-0003-7295

According to our database1, Raúl Pardo authored at least 29 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Free Open Source Communities Sustainability: Does It Make a Difference in Software Quality?
CoRR, 2024

2023
Exact and Efficient Bayesian Inference for Privacy Risk Quantification (Extended Version).
CoRR, 2023

Exact and Efficient Bayesian Inference for Privacy Risk Quantification.
Proceedings of the Software Engineering and Formal Methods - 21st International Conference, 2023

2022
Pull Request Governance in Open Source Communities.
IEEE Trans. Software Eng., 2022

A Specification Logic for Programs in the Probabilistic Guarded Command Language (Extended Version).
CoRR, 2022

A Specification Logic for Programs in the Probabilistic Guarded Command Language.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2022, 2022

Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming.
Proceedings of the IWSPA@CODASPY 2022: Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022

2021
Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
A collaborative access control framework for online social networks.
J. Log. Algebraic Methods Program., 2020

Privug: Quantifying Leakage using Probabilistic Programming for Privacy Risk Analysis.
CoRR, 2020

SoK: Three Facets of Privacy Policies.
Proceedings of the WPES'20: Proceedings of the 19th Workshop on Privacy in the Electronic Society, 2020

2019
Three Dimensions of Privacy Policies.
CoRR, 2019

Analysis of Privacy Policies to Enhance Informed Consent (Extended Version).
CoRR, 2019

Verification of Smart Contract Business Logic - Exploiting a Java Source Code Verifier.
Proceedings of the Fundamentals of Software Engineering - 8th International Conference, 2019

Analysis of Privacy Policies to Enhance Informed Consent.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
MoVEMo: A Structured Approach for Engineering Reward Functions.
Proceedings of the Second IEEE International Conference on Robotic Computing, 2018

Timed Epistemic Knowledge Bases for Social Networks.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

2017
Formalising privacy policies in social networks.
J. Log. Algebraic Methods Program., 2017

Model Checking Social Network Models.
Proceedings of the Proceedings Eighth International Symposium on Games, 2017

Timed Epistemic Knowledge Bases for Social Networks (Extended Version).
CoRR, 2017

Secure Photo Sharing in Social Networks.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

2016
Specification of Evolving Privacy Policies for Online Social Networks.
Proceedings of the 23rd International Symposium on Temporal Representation and Reasoning, 2016

An Automata-Based Approach to Evolving Privacy Policies for Social Networks.
Proceedings of the Runtime Verification - 16th International Conference, 2016

On the Runtime Enforcement of Evolving Privacy Policies in Online Social Networks.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications, 2016

2014
A Formal Privacy Policy Framework for Social Networks.
Proceedings of the Software Engineering and Formal Methods - 12th International Conference, 2014

2013
GPU Powered ROSA Analyzer.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

2012
ROSA Analyser: An automatized approach to analyse processes of ROSA
Proceedings of the Proceedings 2nd Workshop on Formal Methods in the Development of Software, 2012

Computational analysis of Canny & Binary Fuzzy Rough Set model based on Triangle Modulus Edge Detectors.
Proceedings of the 11th IEEE International Conference on Cognitive Informatics and Cognitive Computing, 2012


  Loading...