Found 147 results
Filters: First Letter Of Last Name is O [Clear All Filters]
Towards an Explainable Approach for Insider Threat Detection: Constraint Network Learning. 2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA).
.
2020. Identifying anomalies in Cyber Physical Systems using higher order derivatives and machine learning.
.
2019. Enhancing Ransomware Classification with Multi-stage Feature Selection and Data Imbalance Correction. Cyber Security, Cryptology, and Machine Learning.
.
2023. Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction. nternational Symposium on Cyber Security, Cryptology, and Machine Learning.
.
2023. Understanding Architectural Elements from Requirements Traceability Networks. Relating Software Requirements and Software ArchitecturesRelating Software Requirements and Software Architectures.
.
2011. Exploring a Bayesian and Linear approach to requirements traceability. Information and Software Technology.
.
2011. A review of awareness in distributed collaborative software engineering. Software: Practice and Experience. 40
.
2010. Misuse case techniques for mobile privacy. First International Workshop on Mobile Privacy Management (PriMo2011).
.
2011. Caprice: A tool for engineering adaptive privacy. 27th International Conference on Automated Software Engineering (ASE 2012)27th International Conference on Automated Software Engineering (ASE 2012).
.
2012. Engineering Adaptive Privacy: on the role of privacy awareness requirements. ICSE 2013ICSE 2013.
.
2013. Investigating the Post-Implementation of Digital Transformations. UK ACADEMY FOR INFORMATION SYSTEMS CONFERENCE.
.
2023. Towards a protocol for inferring preferences using majority-rule sorting models. ADT 2017, The 5th International Conference on Algorithmic Decision TheoryADT 2017, The 5th International Conference on Algorithmic Decision Theory.
.
2017. A Systematic Investigation into the Use of Game Elements in the Context of Software Business Landscapes: A Systematic Literature Review.. 17th International Conference on Software Process Improvement and Capability dEtermination17th International Conference on Software Process Improvement and Capability dEtermination.
.
2017. Delay-based priority queueing for VoIP over Software Defined Networks. 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM).
.
2017. DAPP: A Delay-Aware Packet Prioritisation scheme for VoIP in wireless multi-hop networks. 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC).
.
2016. Designing MAS Organisation through an integrated MDA/Ontology Approach. proceedings of Models@run.time, in conjunction with MODELS 2008.
.
2008. On the Use of Commit-Relevant Mutants. Empirical Softw. Engg.. 27
.
2022. Towards Evaluating the Benefits of Inter-vehicle Coordination. 2015 IEEE 18th International Conference on Intelligent Transportation Systems.
.
2015. Lecture Notes in Computer Science. Proceedings of 9th Intl. Software Product Line Conference (SPLC 2005)Proceedings of 9th Intl. Software Product Line Conference (SPLC 2005). LNCS 3714
.
2005. Proceedings of 9th International Software Product Line Conference (SPLC 2005). Lecture Notes in Computer Science (LNCS 3714)Lecture Notes in Computer Science (LNCS 3714).
.
2005. Multi-Metaphor Method: Organisational Metaphors in Information Systems Development. Information Systems. 17
.
2007. How soon is now? Theorizing Temporality in Information Systems Research International Conference on Information Systems (ICIS)International Conference on Information Systems (ICIS).
.
2013. A comparitive study of Image Filters and Machine Learning for use in Machined Part Recognition. 2019 13th International Conference on Sensing Technology (ICST).
.
2019. Semantic methods in genetic programming. Genetic Programming and Evolvable Machines. 17
.
2016. Business analytics capability, organisational value and competitive advantage. Journal of Business Analytics. 2:1-14.
.
2019.