Semir Daskapan

According to our database1, Semir Daskapan authored at least 16 papers between 2003 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
An Adaptive Trustworthiness Modelling Approach for Ubiquitous Software Systems.
Int. J. Inf. Secur. Priv., 2014

2012
Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data Analysis.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2010
Towards a trustworthy short-range mobile payment system.
Int. J. Inf. Technol. Manag., 2010

2009
Privacy Automation in Context-Aware Services.
Proceedings of the Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability, 2009

2008
Improving trust valuation for file sharing in P2P networks.
Proceedings of the IEEE International Conference on Systems, 2008

2006
Emergent information security in critical infrastructures.
Int. J. Crit. Infrastructures, 2006

The paradox between complexity and reliability of computer infrastructures.
Proceedings of the IEEE International Conference on Systems, 2006

Computer Immunodeficiency: Analogy between Computer Security and HIV.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

Available trust and security in wireless networks.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

Building governments in e-government: settlement of trusted e-oligarchy.
Proceedings of the The First International Conference on Availability, 2006

2005
Validating the Security of Medusa: A survivability Protocol for Security Systems.
Proceedings of the Security in Information Systems, 2005

2004
Virtual Trust in Distributed Systems.
Proceedings of the Trust and Privacy in Digital Business, First International Conference, 2004

Building a distributed security defence system.
Proceedings of the IEEE International Conference on Systems, 2004

Dependable Security by Twisted Secret Sharing.
Proceedings of the Security and Protection in Information Processing Systems, 2004

Simulating the establishment of trust infrastructures in multi-agent systems.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Trust metrics for survivable security systems.
Proceedings of the IEEE International Conference on Systems, 2003


  Loading...