2025
Cryptoscope: Analyzing cryptographic usages in modern software.
CoRR, March, 2025
2022
Data minimization for GDPR compliance in machine learning models.
AI Ethics, 2022
Applying Artificial Intelligence Privacy Technology in the Healthcare Domain.
Proceedings of the Challenges of Trustable AI and Added-Value on Health, 2022
2021
Enhancing GDPR compliance through data sensitivity and data hiding tools.
J. Univers. Comput. Sci., 2021
Next Generation Data Masking Engine.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
Anonymizing Machine Learning Models.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021
2020
Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.0.
Comput. Stand. Interfaces, 2020
2019
Multi-value Classification of Ambiguous Personal Data.
Proceedings of the New Trends in Model and Data Engineering, 2019
2016
Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
2015
A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015
Cyber-Physical Systems Design for Runtime Thrustworthiness Maintenance Supported by Tools.
Proceedings of the Joint Proceedings of REFSQ-2015 Workshops, 2015
Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems.
Proceedings of the CAiSE 2015 Forum at the 27th International Conference on Advanced Information Systems Engineering co-located with 27th International Conference on Advanced Information Systems Engineering (CAiSE 2015), 2015
2014
Maintaining Trustworthiness of Socio-Technical Systems at Run-Time.
Proceedings of the Trust, Privacy, and Security in Digital Business, 2014
2011
Virtual machine monitor-based lightweight intrusion detection.
ACM SIGOPS Oper. Syst. Rev., 2011
Workload Characterization at the Virtualization Layer.
Proceedings of the MASCOTS 2011, 2011
2010
Effective Virtual Machine Monitor Intrusion Detection Using Feature Selection on Highly Imbalanced Data.
Proceedings of the Ninth International Conference on Machine Learning and Applications, 2010
2007
On the complexity of Jensen's algorithm for counting fixed polyominoes.
J. Discrete Algorithms, 2007
Exploring Novel Parallelization Technologies for 3-D Imaging Applications.
Proceedings of the 19th Symposium on Computer Architecture and High Performance Computing (SBAC-PAD 2007), 2007
2006
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006
2005
Characterizing antivirus workload execution.
SIGARCH Comput. Archit. News, 2005
ASM: application security monitor.
SIGARCH Comput. Archit. News, 2005
2004
Power Awareness through Selective Dynamically Optimized Traces.
Proceedings of the 31st International Symposium on Computer Architecture (ISCA 2004), 2004
The Complexity of Jensen's Algorithm for Counting Polyominoes.
Proceedings of the Sixth Workshop on Algorithm Engineering and Experiments and the First Workshop on Analytic Algorithmics and Combinatorics, 2004
2003
PARROT: Power Awareness Through Selective Dynamically Optimized Traces.
Proceedings of the Power-Aware Computer Systems, Third International Workshop, 2003
Selecting long atomic traces for high coverage.
Proceedings of the 17th Annual International Conference on Supercomputing, 2003