Audun Jøsang
Orcid: 0000-0001-6337-2264Affiliations:
- University of Oslo, Norway
According to our database1,
Audun Jøsang
authored at least 160 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on folk.uio.no
On csauthors.net:
Bibliography
2024
A survey on uncertainty reasoning and quantification in belief theory and its application to deep learning.
Inf. Fusion, January, 2024
Winning the Social Media Influence Battle: Uncertainty-Aware Opinions to Understand and Spread True Information via Competitive Influence Maximization.
CoRR, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the European Interdisciplinary Cybersecurity Conference, 2024
Onto Hunt - A Semantic Reasoning Approach to Cyber Threat Hunting with Indicators of Behaviour.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024
Uncertainty-Aware Influence Maximization: Enhancing Propagation in Competitive Social Networks with Subjective Logic.
Proceedings of the IEEE International Conference on Big Data, 2024
Dynamic Intelligence Assessment: Benchmarking LLMs on the Road to AGI with a Focus on Model Confidence.
Proceedings of the IEEE International Conference on Big Data, 2024
2023
Active Learning on Neural Networks through Interactive Generation of Digit Patterns and Visual Representation.
CoRR, 2023
Uncertainty-Aware Reward-based Deep Reinforcement Learning for Intent Analysis of Social Media Information.
CoRR, 2023
Proceedings of the IEEE International Conference on Web Services, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Human Aspects of Information Security and Assurance, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
2022
Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange.
DTRAP, 2022
A Survey on Uncertainty Reasoning and Quantification for Decision Making: Belief Theory Meets Deep Learning.
CoRR, 2022
Proceedings of the IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2022
2021
Proceedings of the 13th International Conference on Cyber Conflict, 2021
2020
CoRR, 2020
Proceedings of the Information Security Education. Information Security in Action, 2020
2019
An empirical evaluation of the approximation of subjective logic operators using Monte Carlo simulations.
Int. J. Approx. Reason., 2019
Proceedings of the 22th International Conference on Information Fusion, 2019
2018
Behavioural Computer Science: an agenda for combining modelling of human and system behaviours.
Hum. centric Comput. Inf. Sci., 2018
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018
Global perspectives on cybersecurity education for 2030: a case for a meta-discipline.
Proceedings of the Proceedings Companion of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education, 2018
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the 21st International Conference on Information Fusion, 2018
Proceedings of the 21st International Conference on Information Fusion, 2018
Proceedings of the IEEE/ACM 2018 International Conference on Advances in Social Networks Analysis and Mining, 2018
2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Offline Trusted Device and Proxy Architecture Based on a new TLS Switching Technique.
Proceedings of the 2017 International Workshop on Secure Internet of Things, 2017
Proceedings of the Modeling Decisions for Artificial Intelligence, 2017
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017
Proceedings of the 20th International Conference on Information Fusion, 2017
Proceedings of the 20th International Conference on Information Fusion, 2017
2016
Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, 2016
Proceedings of the 29th Norsk Informatikkonferanse, 2016
Proceedings of the 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2016
Proceedings of the Principles of Knowledge Representation and Reasoning: Proceedings of the Fifteenth International Conference, 2016
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
Proceedings of the 19th International Conference on Information Fusion, 2016
Proceedings of the 19th International Conference on Information Fusion, 2016
DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Artificial Intelligence: Foundations, Theory, and Algorithms, Springer, ISBN: 978-3-319-42337-1, 2016
2015
A normal-distribution based rating aggregation method for generating product reputations.
Web Intell., 2015
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015
Proceedings of the Modeling Decisions for Artificial Intelligence, 2015
1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Proceedings of the Information Security Education Across the Curriculum, 2015
Proceedings of the Graph Structures for Knowledge Representation and Reasoning, 2015
Proceedings of the 18th International Conference on Information Fusion, 2015
Proceedings of the 18th International Conference on Information Fusion, 2015
Proceedings of the 2015 IEEE International Conference on Data Science and Advanced Analytics, 2015
2014
IET Inf. Secur., 2014
Proceedings of the Web Information Systems and Technologies, 2014
Proceedings of the WEBIST 2014, 2014
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
Proceedings of the 25th ACM Conference on Hypertext and Social Media, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
Proceedings of the 17th International Conference on Information Fusion, 2014
Proceedings of the 17th International Conference on Information Fusion, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Modeling Decisions for Artificial Intelligence, 2013
Proceedings of the Trust Management VII - 7th IFIP WG 11.11 International Conference, 2013
Proceedings of the Policies and Research in Identity Management, 2013
Proceedings of the ICEIS 2013, 2013
Proceedings of the 16th International Conference on Information Fusion, 2013
2012
Artif. Intell. Rev., 2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
Proceedings of the 15th International Conference on Information Fusion, 2012
2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the Fifth IEEE Conference on Self-Adaptive and Self-Organizing Systems, 2011
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011
Proceedings of the 2011 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology, 2011
Proceedings of the 14th International Conference on Information Fusion, 2011
2010
Proceedings of the Handbook of Social Network Technologies and Applications, 2010
J. Theor. Appl. Electron. Commer. Res., 2010
Developing Trust Networks Based on User Tagging Information for Recommendation Making.
Proceedings of the Web Information Systems Engineering - WISE 2010, 2010
Proceedings of the Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems. Theory and Methods, 2010
Proceedings of the Policies and Research in Identity Management, 2010
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010
The Potential Relationship Between Trust and Interest Similarity.
Proceedings of the 2010 International Conference on Internet Computing, 2010
A Review of Trust in Online Social Networks to Explore New Research Agenda.
Proceedings of the 2010 International Conference on Internet Computing, 2010
Proceedings of the 13th Conference on Information Fusion, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
J. Multiple Valued Log. Soft Comput., 2009
J. Theor. Appl. Electron. Commer. Res., 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the Identity and Privacy in the Internet Age, 2009
Proceedings of the 12th International Conference on Information Fusion, 2009
2008
Proceedings of the Trust, 2008
Proceedings of the Second International Conference on Emerging Security Information, 2008
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008
Proceedings of the Trust Management II, 2008
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008
An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems.
Proceedings of the Sixth Australasian Information Security Conference, 2008
Proceedings of the Sixth Australasian Information Security Conference, 2008
2007
Decis. Support Syst., 2007
Proceedings of the Foundations of Security Analysis and Design IV, 2007
Proceedings of the Symbolic and Quantitative Approaches to Reasoning with Uncertainty, 2007
Proceedings of the Theory of Computing 2007. Proceedings of the Thirteenth Computing: The Australasian Theory Symposium (CATS2007). January 30, 2007
Proceedings of the ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Web Intell. Agent Syst., 2006
Proceedings of the Trust Management, 4th International Conference, 2006
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006
Proceedings of the Computer Science 2006, 2006
2005
Proceedings of the Trust Management, Third International Conference, 2005
Proceedings of the Symbolic and Quantitative Approaches to Reasoning with Uncertainty, 2005
Proceedings of the Conceptual Modelling 2005, 2005
Proceedings of the ACSW Frontiers 2005, 2005 ACSW Workshops, 2005
2004
Private Reputation Schemes for P2P systems.
Proceedings of the Security In Information Systems, 2004
An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Trust Management, Second International Conference, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004
2003
Proceedings of the Trust Management, First International Conference, 2003
Proceedings of the 7th International Enterprise Distributed Object Computing Conference (EDOC 2003), 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Proceedings of the User Interfaces 2003, 2003
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003
2002
Proceedings of the 6th International Enterprise Distributed Object Computing Conference (EDOC 2002), 2002
Proceedings of the 15th Bled eConference: eReality: Constructing the eEconomy, 2002
2001
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2001
Proceedings of the 9th European Conference on Information Systems, 2001
2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the Intelligence in Networks, 1999
Proceedings of the Network and Distributed System Security Symposium, 1999
1998
1997
How to trust systems.
Proceedings of the Information Security in Research and Business, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Proceedings of the 1996 Workshop on New Security Paradigms, 1996