Jean-Noël Colin
Cited by
Cited by
C Linard, K Tersago, H Leirs, EF Lambin
International Journal of Health Geographics 6, 15, 2007
Utilising deep learning techniques for effective zero-day attack detection
H Hindy, R Atkinson, C Tachtatzis, JN Colin, E Bayne, X Bellekens
Electronics 9 (10), 1684, 2020
researchportal. unamur. be
C Feltus, E Grandry, T Kupper, JN Colin
A digital licensing model for the exchange of learning objects in a federated environment
J Simon, JN Colin
Proceedings. First IEEE International Workshop on Electronic Contracting …, 2004
Model-driven approach for privacy management in business ecosystem
C Feltus, E Grandry, T Kupper, JN Colin
MODELSWARD 2017-Proceedings of the 5th International Conference on Model …, 2017
Secure ICT services for mobile and wireless communications: a federated global identity management framework
J Siddiqi, B Akhgar, M Naderi, W Orth, N Meyer, M Tuisku, G Pipan, ...
Third International Conference on Information Technology: New Generations …, 2006
PrimAndroid: privacy policy modelling and analysis for android applications
G Benats, A Bandara, Y Yu, JN Colin, B Nuseibeh
2011 IEEE International Symposium on Policies for Distributed Systems and …, 2011
LIMBS: Open source, open standards, and open content to foster learning resource exchanges
JN Colin, D Massart
Sixth IEEE International Conference on Advanced Learning Technologies (ICALT …, 2006
Adaptive risk-aware access control model for internet of things
TA Rath, JN Colin
2017 International Workshop on Secure Internet of Things (SIoT), 40-49, 2017
Strengthening access control in case of compromised accounts in smart home
AT Rath, JN Colin
2017 IEEE 13th International Conference on Wireless and Mobile Computing …, 2017
On the evolution of mechanisms for collective decision making in a swarm of robots
A Almansoori, M Alkilabi, JN Colin, E Tuci
Italian Workshop on Artificial Life and Evolutionary Computation, 109-120, 2021
Context-aware and attribute-based access control applying proactive computing to IoT system
N Picard, JN Colin, D Zampunieris
Proceedings of the 3rd International Conference on Internet of Things, Big …, 2018
Blockchain and Internet of Things opportunities and challenges
K Sok, JN Colin, K Po
Proceedings of the 9th International Symposium on Information and …, 2018
DTMS: Un environnement pour la programmation distribuéea grain indéterminé
JN Colin
PhD thesis, University of Mons-Hainaut, Belgium, 1995
Attacker behavior-based metric for security monitoring applied to darknet analysis
L Evrard, J François, JN Colin
2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2019
A federated authorization service for bridging learning object distribution models
JN Colin, TD Le, D Massart
Advances in Web Based Learning–ICWL 2009: 8th International Conference …, 2009
Authentication, authorisation, and rights management for the CELEBRATE brokerage system
JN Colin, J Simon
Celebrate Deliverable D 3 (3), 2003
Patient privacy preservation: P-RBAC vs OrBAC in patient controlled records type of centralized healthcare information system. case study of walloon healthcare network, belgium
AT Rath, JN Colin
The Fourth International Conference on eHealth, Telemedicine, and Social …, 2012
A comparison of an adaptive self-guarded honeypot with conventional honeypots
S Touch, JN Colin
Applied Sciences 12 (10), 5224, 2022
Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment
AT Rath, JN Colin
Proceedings of the 8th International Conference on Ubiquitous Information …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20