RESEARCH OUTPUTS/RÉSULTATS DE RECHERCHE C Linard, K Tersago, H Leirs, EF Lambin International Journal of Health Geographics 6, 15, 2007 | 164* | 2007 |
Utilising deep learning techniques for effective zero-day attack detection H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens Electronics 9 (10), 1684, 2020 | 142 | 2020 |
researchportal. unamur. be C Feltus, E Grandry, T Kupper, JN Colin | 32* | 2017 |
A digital licensing model for the exchange of learning objects in a federated environment J Simon, JN Colin Proceedings. First IEEE International Workshop on Electronic Contracting …, 2004 | 28 | 2004 |
Model-driven approach for privacy management in business ecosystem C Feltus, E Grandry, T Kupper, JN Colin MODELSWARD 2017-Proceedings of the 5th International Conference on Model …, 2017 | 26 | 2017 |
Secure ICT services for mobile and wireless communications: a federated global identity management framework J Siddiqi, B Akhgar, M Naderi, W Orth, N Meyer, M Tuisku, G Pipan, ... Third International Conference on Information Technology: New Generations …, 2006 | 26 | 2006 |
PrimAndroid: privacy policy modelling and analysis for android applications G Benats, A Bandara, Y Yu, JN Colin, B Nuseibeh 2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011 | 24 | 2011 |
Adaptive risk-aware access control model for internet of things TA Rath, JN Colin 2017 International Workshop on Secure Internet of Things (SIoT), 40-49, 2017 | 15 | 2017 |
LIMBS: Open source, open standards, and open content to foster learning resource exchanges JN Colin, D Massart Sixth IEEE International Conference on Advanced Learning Technologies (ICALT …, 2006 | 15 | 2006 |
Strengthening access control in case of compromised accounts in smart home AT Rath, JN Colin 2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017 | 12 | 2017 |
On the evolution of mechanisms for collective decision making in a swarm of robots A Almansoori, M Alkilabi, JN Colin, E Tuci Italian Workshop on Artificial Life and Evolutionary Computation, 109-120, 2021 | 11 | 2021 |
Context-aware and attribute-based access control applying proactive computing to IoT system N Picard, JN Colin, D Zampunieris Proceedings of the 3rd International Conference on Internet of Things, Big …, 2018 | 11 | 2018 |
Blockchain and Internet of Things opportunities and challenges K Sok, JN Colin, K Po Proceedings of the 9th International Symposium on Information and …, 2018 | 10 | 2018 |
DTMS: Un environnement pour la programmation distribuéea grain indéterminé JN Colin PhD thesis, University of Mons-Hainaut, Belgium, 1995 | 10 | 1995 |
Attacker behavior-based metric for security monitoring applied to darknet analysis L Evrard, J François, JN Colin 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 9 | 2019 |
A federated authorization service for bridging learning object distribution models JN Colin, TD Le, D Massart Advances in Web Based Learning–ICWL 2009: 8th International Conference …, 2009 | 9 | 2009 |
Authentication, authorisation, and rights management for the CELEBRATE brokerage system JN Colin, J Simon Celebrate Deliverable D 3 (3), 2003 | 9 | 2003 |
Patient privacy preservation: P-RBAC vs OrBAC in patient controlled records type of centralized healthcare information system. case study of walloon healthcare network, belgium AT Rath, JN Colin The Fourth International Conference on eHealth, Telemedicine, and Social …, 2012 | 8 | 2012 |
A comparison of an adaptive self-guarded honeypot with conventional honeypots S Touch, JN Colin Applied Sciences 12 (10), 5224, 2022 | 7 | 2022 |
Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment AT Rath, JN Colin Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 7 | 2014 |