default search action
Jean-Noël Colin
Person information
- affiliation: University of Namur, Faculty of Computer Science, Belgium
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c26]Reatrey Pich, Sokchenda Sreng, Jean-Noël Colin:
DoH Tunneling Traffic Detection Based on Single Packet Features Analysis. ICNCC 2023: 57-63 - 2022
- [c25]Kimheng Sok, Jean-Noël Colin, Kimtho Po:
Multi-authority Decentralized Attribute-Based Authorization Framework. CAiSE Workshops 2022: 18-30 - 2021
- [c24]Sereysethy Touch, Jean-Noël Colin:
Asguard: Adaptive Self-guarded Honeypot. WEBIST 2021: 565-574 - [c23]Ahmed Almansoori, Muhanad Alkilabi, Jean-Noël Colin, Elio Tuci:
On the Evolution of Mechanisms for Collective Decision Making in a Swarm of Robots. WIVACE 2021: 109-120 - 2020
- [i1]Hanan Hindy, Robert C. Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, Xavier J. A. Bellekens:
Towards an Effective Zero-Day Attack Detection Using Outlier-Based Deep Learning Techniques. CoRR abs/2006.15344 (2020)
2010 – 2019
- 2019
- [c22]Laurent Evrard, Jérôme François, Jean-Noël Colin:
Attacker Behavior-Based Metric for Security Monitoring Applied to Darknet Analysis. IM 2019: 89-97 - [c21]Laurent Evrard, Jérôme François, Jean-Noël Colin, Frédéric Beck:
port2dist: Semantic Port Distances for Network Analytics. IM 2019: 747-748 - 2018
- [c20]Noé Picard, Jean-Noël Colin, Denis Zampuniéris:
Context-aware and Attribute-based Access Control Applying Proactive Computing to IoT System. IoTBDS 2018: 333-339 - [c19]Kimheng Sok, Jean-Noël Colin, Kimtho Po:
Blockchain and Internet of Things Opportunities and Challenges. SoICT 2018: 150-154 - 2017
- [c18]Christophe Feltus, Eric Grandry, Thomas Kupper, Jean-Noël Colin:
Model-driven Approach for Privacy Management in Business Ecosystem. MODELSWARD 2017: 392-400 - [c17]Annanda Thavymony Rath, Jean-Noël Colin:
Adaptive Risk-Aware Access Control Model for Internet of Things. SIoT 2017: 40-49 - [c16]Annanda Thavymony Rath, Jean-Noël Colin:
Strengthening access control in case of compromised accounts in smart home. WiMob 2017: 1-8 - 2015
- [c15]Annanda Thavymony Rath, Jean-Noël Colin:
Protecting Personal Data: Access Control for Privacy Preserving Perimeter Protection System. DBSec 2015: 233-241 - 2014
- [c14]Annanda Thavymony Rath, Jean-Noël Colin:
Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment. ICUIMC 2014: 14:1-14:8 - [c13]Jean-Noël Colin, Minh Tien Hoang:
Authentication and Authorisation for Widget-based Applications in a Loosely-coupled Web eLearning Environment. WEBIST (1) 2014: 17-26 - [c12]Jean-Noël Colin, Hoang Minh Tien:
Securing a Loosely-Coupled Web-Based eLearning Ecosystem Combining Open Standards. WEBIST (Revised Selected Papers) 2014: 48-62 - 2013
- [j1]Annanda Thavymony Rath, Jean-Noël Colin:
Towards purpose enforcement model for privacy-aware usage control policy in distributed healthcare. Int. J. Secur. Networks 8(2): 94-105 (2013) - [c11]Annanda Thavymony Rath, Jean-Noël Colin:
A Purpose Model and Policy Enforcement Engine for Usage Control in Distributed Healthcare Information System. HEALTHINF 2013: 174-180 - [c10]Annanda Thavymony Rath, Jean-Noël Colin:
Access and Usage Control Requirements for Patient Controlled Record Type of Healthcare Information System. HEALTHINF 2013: 331-336 - [c9]Annanda Thavymony Rath, Jean-Noël Colin:
Towards enforcement of purpose for privacy policy in distributed healthcare. CCNC 2013: 881-886 - [c8]Frans Van Assche, Bernd Simon, Michael Aram, Jean-Noël Colin, Hoang Minh Tien, Dai Griffiths, Kris Popat, Luis E. Anido-Rifón, Manuel Caeiro Rodríguez, Juan M. Santos-Gago, Will Ellis, Joris Klerkx:
Re-engineering the Uptake of ICT in Schools. EC-TEL 2013: 645-646 - 2011
- [c7]Seweryn Dynerowicz, Jean-Noël Colin, Laurent Schumacher:
A Distributed Local-Optimum Distance Vector Algorithm for the Metarouting Approach. ICC 2011: 1-6 - [c6]Guillaume Benats, Arosha K. Bandara, Yijun Yu, Jean-Noël Colin, Bashar Nuseibeh:
PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. POLICY 2011: 129-132
2000 – 2009
- 2009
- [c5]Jean-Noël Colin, Tien-Dung Le, David Massart:
Mediating Distribution Models and Access Control for the Exchange of Learning Objects. ICALT 2009: 714-715 - [c4]Jean-Noël Colin, Tien-Dung Le, David Massart:
A Federated Authorization Service for Bridging Learning Object Distribution Models. ICWL 2009: 116-125 - 2008
- [e1]David Massart, Jean-Noël Colin, Frans Van Assche:
Proceedings of the First International Workshop on Learning Object Discovery & Exchange, LODE 2007, Sissi, Lassithi - Crete Greece, 18 September, 2007. CEUR Workshop Proceedings 311, CEUR-WS.org 2008 [contents] - 2006
- [c3]Babak Akhgar, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan, Mario López Gallego, José Alberto García, Maurizio Cecchi, Jean-Noël Colin:
Secure Mobile and Wireless Communication Services for Collaborative Virtual Gaming. CTS 2006: 363-369 - [c2]Jean-Noël Colin, David Massart:
LIMBS: Open Source, Open Standards, and Open Content To Foster Learning Resource Exchanges. ICALT 2006: 682-686 - [c1]Jawed I. A. Siddiqi, Babak Akhgar, Mehrdad Naderi, Wolfgang Orth, Norbert Meyer, Miika Tuisku, Gregor Pipan, Mario López Gallego, José Alberto García, Maurizio Cecchi, Jean-Noël Colin:
Secure ICT Services for Mobile and Wireless Communications: A Federated Global Identity Management Framework. ITNG 2006: 351-357
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint