Utilising deep learning techniques for effective zero-day attack detection H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens Electronics 9 (10), 1684, 2020 | 200 | 2020 |
RESEARCH OUTPUTS/RÉSULTATS DE RECHERCHE C Linard, K Tersago, H Leirs, EF Lambin International Journal of Health Geographics 6, 15, 2007 | 170* | 2007 |
researchportal. unamur. be C Feltus, E Grandry, T Kupper, JN Colin | 32* | 2017 |
Model-driven approach for privacy management in business ecosystem C Feltus, E Grandry, T Kupper, JN Colin MODELSWARD 2017-Proceedings of the 5th International Conference on Model …, 2017 | 30 | 2017 |
A digital licensing model for the exchange of learning objects in a federated environment J Simon, JN Colin Proceedings. First IEEE International Workshop on Electronic Contracting …, 2004 | 28 | 2004 |
Secure ICT services for mobile and wireless communications: a federated global identity management framework J Siddiqi, B Akhgar, M Naderi, W Orth, N Meyer, M Tuisku, G Pipan, ... Third International Conference on Information Technology: New Generations …, 2006 | 27 | 2006 |
PrimAndroid: privacy policy modelling and analysis for android applications G Benats, A Bandara, Y Yu, JN Colin, B Nuseibeh 2011 IEEE international symposium on policies for distributed systems and …, 2011 | 26 | 2011 |
Adaptive risk-aware access control model for Internet of Things TA Rath, JN Colin 2017 International Workshop on Secure Internet of Things (SIoT), 40-49, 2017 | 15 | 2017 |
LIMBS: Open source, open standards, and open content to foster learning resource exchanges JN Colin, D Massart Sixth IEEE International Conference on Advanced Learning Technologies (ICALT …, 2006 | 15 | 2006 |
Strengthening access control in case of compromised accounts in smart home AT Rath, JN Colin 2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017 | 13 | 2017 |
A comparison of an adaptive self-guarded honeypot with conventional honeypots S Touch, JN Colin Applied Sciences 12 (10), 5224, 2022 | 12 | 2022 |
On the evolution of mechanisms for collective decision making in a swarm of robots A Almansoori, M Alkilabi, JN Colin, E Tuci Italian Workshop on Artificial Life and Evolutionary Computation, 109-120, 2021 | 12 | 2021 |
Blockchain and Internet of Things opportunities and challenges K Sok, JN Colin, K Po Proceedings of the 9th International Symposium on Information and …, 2018 | 12 | 2018 |
Context-aware and attribute-based access control applying proactive computing to IoT system N Picard, JN Colin, D Zampunieris SPBDIoT 2018–Special Session on Recent Advances on Security, Privacy, Big …, 2018 | 11 | 2018 |
Attacker behavior-based metric for security monitoring applied to darknet analysis L Evrard, J François, JN Colin 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019 | 9 | 2019 |
Patient privacy preservation: P-RBAC vs OrBAC in patient controlled records type of centralized healthcare information system. case study of walloon healthcare network, belgium AT Rath, JN Colin The Fourth International Conference on eHealth, Telemedicine, and Social …, 2012 | 9 | 2012 |
A federated authorization service for bridging learning object distribution models JN Colin, TD Le, D Massart Advances in Web Based Learning–ICWL 2009: 8th International Conference …, 2009 | 9 | 2009 |
Authentication, authorisation, and rights management for the CELEBRATE brokerage system JN Colin, J Simon Celebrate Deliverable D 3 (3), 2003 | 9 | 2003 |
Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment AT Rath, JN Colin Proceedings of the 8th International Conference on Ubiquitous Information …, 2014 | 7 | 2014 |
Asguard: Adaptive Self-guarded Honeypot. S Touch, JN Colin WEBIST, 565-574, 2021 | 6 | 2021 |