Skip to main content

Research Repository

Advanced Search

All Outputs (8)

Using flickr for characterizing the environment: An exploratory analysis (2017)
Journal Article
Jeawak, S. S., Jones, C. B., & Schockaert, S. (2017). Using flickr for characterizing the environment: An exploratory analysis. LIPIcs, 86, 21:1--21:13. https://doi.org/10.4230/LIPIcs.COSIT.2017.21

© Shelan S. Jeawak, Christopher B. Jones, and Steven Schockaert. The photo-sharing website Flickr has become a valuable informal information source in disciplines such as geography and ecology. Some ecologists, for instance, have been manually analys... Read More about Using flickr for characterizing the environment: An exploratory analysis.

The CrossCult knowledge base: A co-inhabitant of cultural heritage ontology and vocabulary classification (2017)
Journal Article
Vlachidis, A., Bikakis, A., Kyriaki-Manessi, D., Triantafyllou, I., & Antoniou, A. (2017). The CrossCult knowledge base: A co-inhabitant of cultural heritage ontology and vocabulary classification. Communications in Computer and Information Science, 767, 353-362. https://doi.org/10.1007/978-3-319-67162-8_35

© 2017, Springer International Publishing AG. CrossCult is an EU-funded research project aiming to spur a change in the way European citizens appraise History, fostering the re-interpretation of what they may have learnt in the light of cross-border... Read More about The CrossCult knowledge base: A co-inhabitant of cultural heritage ontology and vocabulary classification.

Evaluation of semantic web ontologies for modelling art collections (2017)
Journal Article
Liu, D., Bikakis, A., & Vlachidis, A. (2017). Evaluation of semantic web ontologies for modelling art collections. Communications in Computer and Information Science, 767, 343-352. https://doi.org/10.1007/978-3-319-67162-8_34

© 2017, Springer International Publishing AG. The need for organising, sharing and digitally processing Cultural Heritage (CH) information has led to the development of formal knowledge representation models (ontologies) for the CH domain. Based on R... Read More about Evaluation of semantic web ontologies for modelling art collections.

Modelling and reasoning about context-aware agents over heterogeneous knowledge sources (2017)
Journal Article
Ul Haque, H. M., Rakib, A., & Uddin, I. (2017). Modelling and reasoning about context-aware agents over heterogeneous knowledge sources. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 193, 1-11. https://doi.org/10.1007/978-3-319-56357-2_1

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2017. This paper presents a conceptual framework and multi-agent model for context-aware decision support in dynamic smart environments based on heterogeneo... Read More about Modelling and reasoning about context-aware agents over heterogeneous knowledge sources.

Privacy decision-making in the digital era: A game theoretic review (2017)
Journal Article
Anastasopoulou, K., Kokolakis, S., & Andriotis, P. (2017). Privacy decision-making in the digital era: A game theoretic review. Lecture Notes in Artificial Intelligence, 10292 LNCS, 589-603. https://doi.org/10.1007/978-3-319-58460-7_41

© Springer International Publishing AG 2017. Information privacy is constantly negotiated when people interact with enterprises and government agencies via the Internet. In this context, all relevant stakeholders take privacy-related decisions. Indiv... Read More about Privacy decision-making in the digital era: A game theoretic review.

A comparative study of android users’ privacy preferences under the runtime permission model (2017)
Journal Article
Andriotis, P., Li, S., Spyridopoulos, T., & Stringhini, G. (2017). A comparative study of android users’ privacy preferences under the runtime permission model. Lecture Notes in Artificial Intelligence, 10292 LNCS, 604-622. https://doi.org/10.1007/978-3-319-58460-7_42

© Springer International Publishing AG 2017. Android users recently were given the ability to selectively grant access to sensitive resources of their mobile devices when apps request them at runtime. The Android fine-grained runtime permission model... Read More about A comparative study of android users’ privacy preferences under the runtime permission model.

System dynamics approach to malicious insider cyber-threat modelling and analysis (2017)
Journal Article
Fagade, T., Spyridopoulos, T., Albishry, N., & Tryfonas, T. (2017). System dynamics approach to malicious insider cyber-threat modelling and analysis. Lecture Notes in Artificial Intelligence, 10292 LNCS, 309-321. https://doi.org/10.1007/978-3-319-58460-7_21

© Springer International Publishing AG 2017. Enforcing cybersecurity controls against malicious insiders touches upon complex issues like people, process and technology. In large and complex systems, addressing the problem of insider cyber threat inv... Read More about System dynamics approach to malicious insider cyber-threat modelling and analysis.

Recommender systems meeting security: From product recommendation to cyber-attack prediction (2017)
Journal Article
Pavlidis, M., Polatidis, N., Pimenidis, E., & Mouratidis, H. (2017). Recommender systems meeting security: From product recommendation to cyber-attack prediction. Communications in Computer and Information Science, 744, 508-519. https://doi.org/10.1007/978-3-319-65172-9_43

© Springer International Publishing AG 2017. Modern information society depends on reliable functionality of information systems infrastructure, while at the same time the number of cyber-attacks has been increasing over the years and damages have be... Read More about Recommender systems meeting security: From product recommendation to cyber-attack prediction.