Reducing multiple occurrences of meta-mark selection in relational data watermarking

MLP Gort, M Olliaro, A Cortesi - IEEE Access, 2022 - ieeexplore.ieee.org
Contrary to multimedia data watermarking approaches, it is not recommended that relational
data watermarking techniques consider sequential selection for marks in the watermark and …

Relational data watermarking resilience to brute force attacks in untrusted environments

MLP Gort, M Olliaro, A Cortesi - Expert Systems with Applications, 2023 - Elsevier
Watermarking techniques for relational data that aim at robustness face the challenge of
guaranteeing watermark persistence despite aggressive attacks. Nevertheless, attackers …

Online social transparency in enterprise information systems: a risk assessment method

T Alsaedi, N Sherief, K Phalp, R Ali - Information Technology and …, 2022 - Springer
Teleworking refers to the utilization of information and communication technologies for work
done outside the workplace. The Covid-19 crisis led to increased utilisation of social …

A double fragmentation approach for improving virtual primary key-based watermark synchronization

MLP Gort, C Feregrino-Uribe, A Cortesi… - IEEE …, 2020 - ieeexplore.ieee.org
Relational data watermarking techniques using virtual primary key schemes try to avoid
compromising watermark detection due to the deletion or replacement of the relation's …

[PDF][PDF] A novel database watermarking technique using blockchain as trusted third party

AS Alghamdi, S Naz, A Saeed, E Al Solami… - … Material and Continua …, 2022 - academia.edu
With widespread use of relational database in various real-life applications, maintaining
integrity and providing copyright protection is gaining keen interest of the researchers. For …

[PDF][PDF] ЛВ Мазник

ОІ Драган - dspace.nuft.edu.ua
Одним із напрямків вдосконалення інструментів комунікативного менеджменту в умовах
сучасних викликів є релевантне забезпечення актуальних змін у форматах організації …

String analysis for software verification

M Olliaro - 2021 - dspace.unive.it
This thesis aims to investigate string manipulation with security implications in different
programming languages and to improve the state-of-the-art by applying the abstract …

Комунікативний менеджмент в управлінні ризиками соціальної прозорості інформаційних систем підприємства

ЛВ Мазник, ОІ Драган - 2022 - dspace.nuft.edu.ua
Анотація Одним із напрямків вдосконалення інструментів комунікативного
менеджменту в умовах сучасних викликів є релевантне забезпечення актуальних змін у …

[PDF][PDF] Software Verification

A Cortesi - is.muni.cz
This thesis aims to investigate string manipulation with security implications in different
programming languages and to improve the state-of-the-art by applying the Abstract …

[引用][C] Artificial Intelligence: exploring value and challenges in the context of strategic decisions

J HAUTZ - 2020 - The University of Innsbruck