Search

Your search keyword '"Josang, Audun"' showing total 256 results

Search Constraints

Start Over You searched for: Author "Josang, Audun" Remove constraint Author: "Josang, Audun"
256 results on '"Josang, Audun"'

Search Results

1. Winning the Social Media Influence Battle: Uncertainty-Aware Opinions to Understand and Spread True Information via Competitive Influence Maximization

2. Hyper Evidential Deep Learning to Quantify Composite Classification Uncertainty

3. TIPS: Threat Sharing Information Platform for Enhanced Security

4. Active Learning on Neural Networks through Interactive Generation of Digit Patterns and Visual Representation

5. An Opportunity-Based Approach to Information Security Risk

6. Uncertainty-Aware Reward-based Deep Reinforcement Learning for Intent Analysis of Social Media Information

7. PPO-UE: Proximal Policy Optimization via Uncertainty-Aware Exploration

8. A Survey on Uncertainty Reasoning and Quantification for Decision Making: Belief Theory Meets Deep Learning

9. Business Language for Information Security

11. Data-Driven Threat Hunting Using Sysmon

12. Threat Actor Type Inference and Characterization within Cyber Threat Intelligence

13. Using Subjective Logic to Estimate Uncertainty in Multi-Armed Bandit Problems

14. A Framework for Data-Driven Physical Security and Insider Threat Detection

15. An Empirical Evaluation of the Approximation of Subjective Logic Operators Using Monte Carlo Simulations

16. The Impact of Quantum Computing on Present Cryptography

17. Threat Poker: Gamification of Secure Agile

18. A Formal Calculus for International Relations Computation and Evaluation

19. Threat Poker: Solving Security and Privacy Threats in Agile Software Development

29. Introduction

30. Subjective Networks

34. Computational Trust

36. Belief Fusion

38. Cumulative and Averaging Fission of Beliefs

39. The Cumulative Rule for Belief Fusion

40. Belief Calculus

41. Exploit Prevention, Quo Vadis?

42. A Consistent Definition of Authorization

43. Joint Subjective Opinions

44. Towards Behavioural Computer Science

45. Generating Product Feature Hierarchy from Product Reviews

46. 1,2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space

47. Cybersecurity Through Secure Software Development

48. Mathematical Modelling of Trust Issues in Federated Identity Management

49. Subjective Networks: Perspectives and Challenges

50. FIDO Trust Requirements

Catalog

Books, media, physical & digital resources