Supports for identity management in ambient environments-the hydra approach H Akram, M Hoffmann 2008 Third International Conference on Systems and Networks Communications …, 2008 | 24 | 2008 |
Grammatical inference algorithms in MATLAB H Akram, C De La Higuera, H Xiao, C Eckert Grammatical Inference: Theoretical Results and Applications, 262-266, 2010 | 23 | 2010 |
Laws of identity in ambient environments: The hydra approach H Akram, M Hoffmann 2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008 | 14 | 2008 |
Requirements analysis for identity management in ambient environments: The HYDRA approach H Akram, M Hoffmann Proceedings of the 2nd International Workshop on Combining Context with …, 2008 | 10 | 2008 |
Actively Learning Probabilistic Subsequential Transducers HI Akram, C de la Higuera, C Eckert | 9* | 2012 |
PSMA: A Parallel Algorithm for Learning Regular Languages HI Akram, A Batard, C de la Higuera, C Eckert NIPS Workshop on Learning on Cores, Clusters and Clouds, 2010 | 9 | 2010 |
Security Testing over Encrypted Channels on the ARM Platform F Kilic, B Geßele, HI Akram Proceedings of the 12th International Conference on Internet Monitoring and …, 2017 | 4 | 2017 |
Designing safe and secure autopilots for the urban environment S Norton, HI Akram IET Digital Library, 2016 | 3 | 2016 |
User-centric identity management in ambient environments HI Akram, M Hoffmann International Journal On Advances in Intelligent Systems Volume 2, Number 1 …, 2009 | 3 | 2009 |
Development Model of a Public Safety Broadband Communications Network in Indonesia G Damanik, DK Hendraningrat, O Favre, B Tellenbach, J Alsenz, F Kilic, ... ICIMP, 2017 | 2 | 2017 |
Learning probabilistic subsequential transducers from positive data HI Akram, C de La Higuera Special Session on Learning, Agents and Formal Languages 2, 479-486, 2013 | 2 | 2013 |
Identity Metasystem in Location Based Persistent Authentication HI Akram, CD Jensen, M Hoffmann European Context-Awareness and Trust (EUROCAT09) 3rd Workshop on Combining …, 2009 | 1 | 2009 |
Secured Identity Management in Ambient Environments: Vulnerabilities and Proposed Remedies H Akram | | 2008 |