A method of conceptual modelling for realistic training scenariosShvartsman, Inna; Taveter, Kuldar; Meriste, MerikICAART 2013 - proceedings of the 5th International Conference on Agents and Artificial Intelligence, : Barcelona, Spain, 15-18 February, 2013. Volume 12013 / p. 443-446 An enhanced lightweight authentication scheme for secure access to cloud dataHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokProceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 20202020 / p. 110-117 https://doi.org/10.5220/0009824301100117 An idea for universal generator of hypothesesLind, Grete; Kuusik, Rein, inform.ICEIS 2012 - proceedings of the 14th International Conference on Enterprise Information Systems : Wroclaw, Poland, 28 June-1 July, 2012. Volume 12012 / p. 169-174 https://www.scitepress.org/PublishedPapers/2012/40971/pdf/index.html An integrated platform for blended learning in engineering educationMakarova, Irina; Shubenkova, Ksenia; Tikhonov, Danila; Pashkevich, AntonProceedings of the 9th International Conference on Computer Supported Education (CSEDU 2017) : April 21-23, 2017, in Porto, Portugal. Volume 22017 / p. 171-176 : ill http://dx.doi.org/10.5220/0006375601710176 BLT+L : efficient signatures from timestamping and endorsementsFirsov, Denis; Lakk, Henri; Laur, Sven; Truu, AhtoProceedings of the 18th International Conference on Security and Cryptography - SECRYPT. Vol. 12021 / p. 75-86 https://doi.org/10.5220/0010530000750086 Business process development for industrial clusterKangilaski, TaivoICINCO 2012 - proceedings of the 9th International Conference on Informatics in Control, Automation and Robotics : Rome, Italy, 28-31 July, 2012. Vol. 22012 / p. 535-538 https://www.scitepress.org/Papers/2012/40047/40047.pdf Combining aspect-orientation and UPPAAL timed automataTruscan, Dragos; Vain, Jüri; Koskinen, MartinICSOFT-PT 2014 : proceedings of the 9th International Conference on Software Paradigm Trends, Vienna, Austria, 29-31 August, 20142014 / p. 159-164 : ill Culturally-sensitive cybersecurity awareness program design for Iranian high-school studentsKarimnia, Rooya; Maennel, Kaie; Shahin, MahtabProceedings of the 8th International Conference on Information Systems Security and Privacy (ICISSP), 9-11 February, 20222022 / p. 121-132 https://doi.org/10.5220/0010824800003120 Discovering data lineage from data warehouse proceduresTomingas, Kalle; Järv, Priit; Tammet, TanelProceedings of the 8th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management : November 9-11, 2016, in Porto, Portugal. Vol. 12016 / p. 101-110 http://doi.org/10.5220/0006054301010110 EuroTeQ as an alliance to promote European engineering educationVodovozov, Valery; Raud, Zoja; Lehtla, MadisProceedings of the 15th International Conference on Computer Supported Education (CSEDU 2023). Vol. 22023 / p. 601-607 https://doi.org/10.5220/0011824900003470 Evaluating a novel agile requirements engineering method : a case studyTenso, Tanel; Norta, Alexander; Vorontsova, IrinaENASE 2016 : 11th International Conference on Evaluation of Novel Software Approaches to Software Engineering : proceedings : Rome, Italy, 27-28 April 20162016 / p. 156-163 : ill http://dx.doi.org/10.5220/0005829701560163 Evaluating RuleCore as event processing network modelAstrova, Irina; Koschel, Arne; Kobert, SebastianProceedings of the 15th International Conference on Web Information Systems and Technologies, WEBIST 2019, Vienna, Austria, September 18-20, 2019. Vol. 12019 / p. 297–300 : ill https://doi.org/10.5220/0008192302970300 Evaluating the RESTfulness of "APIs from the Rough"Koschel, Arne; Astrova, Irina; Blankschyn, MaximilianProceedings of the 15th International Conference on Web Information Systems and Technologies, WEBIST 2019, Vienna, Austria, September 18-20, 2019. Vol. 12019 / p. 281-288 https://doi.org/10.5220/0008166802810288 Explainable AI based fault detection and diagnosis system for air handling unitsBelikov, Juri; Meas, Molika; Machlev, Ram; Köse, Ahmet; Tepljakov, Aleksei; Loo, Lauri; Petlenkov, Eduard; Levron, YoashProceedings of the 19th International Conference on Informatics in Control, Automation and Robotics - ICINCO, 2022 , Lisbon, Portugal2022 / p. 271-279 https://doi.org/10.5220/0011350000003271 Fuzzy gradient control of electric vehicles at blended braking with volatile driving conditionsVodovozov, Valery; Petlenkov, Eduard; Aksjonov, Andrei; Raud, ZojaICINCO 2020 : 17th International Conference on Informatics in Control, Automation and Robotics, July 7-9, 2020 : online2020 / p. 250−261 http://wikicfp.com/cfp/servlet/event.showcfp?eventid=97093©ownerid=45217 In-depth feature selection and ranking for automated detection of mobile malwareGuerra Manzanares, Alejandro; Nõmm, Sven; Bahsi, HayretdinProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 274-283 : ill https://doi.org/10.5220/0007349602740283 Knowledge integration for commonsense reasoning with default logicJärv, Priit; Tammet, Tanel; Verrev, Martin; Draheim, DirkProceedings of the 14th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - KEOD 2022, October 24-26, 2022, in Valletta, Malta ; Vol. 1 / p. 148-155 https://doi.org/10.5220/0000165700003335 Lattice-based threshold signature implementation for constrained devicesDobias, Patrik; Ricci, Sara; Dzurenda, Petr; Malina, Lukas; Snetkov, NikitaProceedings of the 20th International Conference on Security and Cryptography. Vol. 12023 / p. 724-730 https://doi.org/10.5220/0012112700003555 MedBIoT : generation of an IoT Botnet Dataset in a medium-sized IoT networkGuerra Manzanares, Alejandro; Medina-Galindo, Jorge; Bahsi, Hayretdin; Nõmm, SvenProceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP : February 25-27, 2020, La Valletta, Malta. Vol. 12020 / p. 207-218 : ill https://doi.org/10.5220/0009187802070218 Model based continual planning and control framework for assistive robotsAnier, Aivo; Vain, JüriPECCS 2012 : final program and book of abstracts : 2nd International Conference on Pervasive and Embedded Computing and Communication Systems, Rome, Italy, 24-26 February, 20122012 / p. 45 https://www.scitepress.org/Papers/2012/38271/38271.pdf Model based continual planning and control framework for assistive robotsAnier, Aivo; Vain, JüriPECCS 2012 : proceedings of the 2nd International Conference on Pervasive and Embedded Computing and Communication Systems, Rome, Italy, 24-26 February, 20122012 / p. 403-406 https://www.scitepress.org/Papers/2012/38271/38271.pdf Model based continual planning and control framework for assistive robotsAnier, Aivo; Vain, JüriHEALTHINF 2012 : proceedings of the International Conference on Health Informatics, Vilamoura, Algarve, Portugal, 1-4 February, 20122012 / p. 382-385 https://www.scitepress.org/Papers/2012/38271/38271.pdf A novel anonymous authentication and key agreement scheme for smart gridHammami, Hamza; Obaidat, Mohammad S.; Ben Yahia, SadokProceedings of the 17th International Joint Conference on e-Business and Telecommunications, ICETE 2020 - Volume 3: ICE-B, Lieusaint, Paris, France, July 8-10, 20202020 / p. 357-362 https://doi.org/10.5220/0009824203570362 Partner Network and its process managementKangilaski, Taivo; Poljantšikov, Igor; Ševtšenko, EduardICINCO 2013 : proceedings of the 10th International Conference on Informatics in Control, Automation and Robotics : Reykjavík, Iceland, 29-31 July, 2013. Vol. 22013 / p. 519-527 Remote exploit development for cyber red team computer network operations targeting industrial control systemsBlumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 88-99 : ill https://doi.org/10.5220/0007310300880099 Social, legal, and technical considerations for machine learning and artificial intelligence systems in governmentDreyling, Richard; Jackson, Eric B.; Tammet, Tanel; Labanava, Alena; Pappel, IngridProceedings of the 23rd International Conference on Enterprise Information Systems ; vol. 12021 / p. 701-708 https://doi.org/10.5220/0010452907010708 TED : a container based tool to perform security risk assessment for ELF binariesMucci, Daniele; Blumbergs, BernhardsProceedings of the 5th International Conference on Information Systems Security and Privacy : ICISSP 2019 : February 23-25, 2019, Prague, Czech Republic. Vol. 12019 / p. 361–369 : tab http://doi.org/10.5220/0007371603610369 Towards distributed sociotechnical system for reporting critical laboratory resultsMahunnah, Msury; Koorts, Annike; Taveter, KuldarHEALTHINF 2013 - Proceedings of the International Conference on Health Informatics, Barcelona, Spain, 11-14 February, 20132013 / p. 269-276