default search action
Denis Trcek
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j35]Denis Trcek:
HeriLedger - A New Generation of Blockchains for Cultural Heritage Preservation. Sensors 22(22): 8913 (2022) - [i1]Denis Trcek, Habtamu Abie, Åsmund Skomedal:
Adaptive Safety for Internet of Things in e-Health. CoRR abs/2203.05309 (2022) - 2021
- [j34]Aleks Huc, Denis Trcek:
Anomaly Detection in IoT Networks: From Architectures to Machine Learning Transparency. IEEE Access 9: 60607-60616 (2021) - [j33]Denis Trcek:
Cruxes for visual domain sonification in digital arts. Digit. Creativity 32(4): 293-306 (2021) - [j32]Denis Trcek:
Mollitia: Toward Standardization of Resilience Provisioning in IoT/CPS Structures. IEEE Internet Things Mag. 4(3): 109-113 (2021)
2010 – 2019
- 2019
- [j31]Balu Deokate, Chhagan Lal, Denis Trcek, Mauro Conti:
Mobility-aware cross-layer routing for peer-to-peer networks. Comput. Electr. Eng. 73: 209-226 (2019) - [j30]Denis Trcek, Gasper Trcek:
sonicLamination - from a concept to artistic binding of visual and sound domains by using advanced technology. Int. J. Arts Technol. 11(2): 219-229 (2019) - [c14]Denis Trcek:
Driving Digital Transformation Through e-Government. M3E2-MLPEED 2019: 263-273 - 2017
- [j29]Andrej Dobrovoljc, Denis Trcek, Borut Likar:
Predicting Exploitations of Information Systems Vulnerabilities Through Attackers' Characteristics. IEEE Access 5: 26063-26075 (2017) - [c13]Jose J. Gonzalez, Denis Trcek:
Proper Incentives for Proper IT Security Management - A System Dynamics Approach. HICSS 2017: 1-10 - 2016
- [j28]Denis Trcek:
Wireless Sensors Grouping Proofs for Medical Care and Ambient Assisted-Living Deployment. Sensors 16(1): 33 (2016) - [c12]Denis Trcek, Jose J. Gonzalez:
Understanding the Importance of Proper Incentives for Critical Infrastructures Management - How System Dynamics Can Help. ITDRR 2016: 1-8 - 2015
- [j27]Jernej Kos, Mahdi Aiash, Jonathan Loo, Denis Trcek:
U-Sphere: Strengthening scalable flat-name routing for decentralized networks. Comput. Networks 89: 14-31 (2015) - 2014
- [j26]David Jelenc, Denis Trcek:
Qualitative trust model with a configurable method to aggregate ordinal data. Auton. Agents Multi Agent Syst. 28(5): 805-835 (2014) - [j25]Denis Trcek, Borut Likar:
Driving Information Systems Security through Innovations - First Indications. Cybern. Syst. 45(1): 56-68 (2014) - [j24]Denis Trcek:
Qualitative Assessment Dynamics - Complementing Trust Methods for Decision Making. Int. J. Inf. Technol. Decis. Mak. 13(1): 155-174 (2014) - [j23]Denis Trcek:
Computational Trust Management, QAD, and Its Applications. Informatica 25(1): 139-154 (2014) - [c11]Arild B. Torjusen, Habtamu Abie, Ebenezer Paintsil, Denis Trcek, Åsmund Skomedal:
Towards Run-Time Verification of Adaptive Security for IoT in eHealth. ECSA Workshops 2014: 4:1-4:8 - 2013
- [j22]Denis Trcek:
Lightweight protocols and privacy for all-in-silicon objects. Ad Hoc Networks 11(5): 1619-1628 (2013) - [j21]David Jelenc, Ramón Hermoso, Jordi Sabater-Mir, Denis Trcek:
Decision making matters: A better way to evaluate trust models. Knowl. Based Syst. 52: 147-164 (2013) - [j20]Denis Trcek, Andrej Brodnik:
Hard and soft security provisioning for computationally weak pervasive computing systems in E-health. IEEE Wirel. Commun. 20(4) (2013) - 2012
- [j19]Borut Likar, Denis Trcek:
A Methodology for Provision of Sustainable Information Systems Security. Cybern. Syst. 43(1): 22-33 (2012) - [j18]Denis Trcek:
An Integrative Architecture for a Sensor-Supported Trust Management System. Sensors 12(8): 10774-10787 (2012) - [c10]Eva Zupancic, Denis Trcek, Kuldar Taveter:
Agent-oriented Engineering of Trust Management Systems. AT 2012: 349-350 - [c9]Eva Zupancic, Denis Trcek:
Deployment of Trust Management System in Environment of e-Commerce. KES-AMSTA 2012: 484-493 - [p2]Iztok Starc, Denis Trcek:
Towards Quantitative Risk Management for Next Generation Networks. Telecommunication Economics 2012: 229-239 - 2011
- [j17]Denis Trcek:
Trust Management in the Pervasive Computing Era. IEEE Secur. Priv. 9(4): 52-55 (2011) - [c8]Denis Trcek:
Trust Management Methodologies for the Web. Reasoning Web 2011: 445-459 - 2010
- [j16]Denis Trcek:
Security Metrics Foundations for Computer Security. Comput. J. 53(7): 1106-1112 (2010) - [c7]Josune Hernantes, José Manuel Torres, Ana Laugé, Jose Mari Sarriegi, Iztok Starc, Eva Zupancic, Denis Trcek:
Using GMB methodology on a large crisis model. ISCRAM 2010
2000 – 2009
- 2009
- [j15]Denis Trcek, Damjan Kovac:
Formal apparatus for measurement of lightweight protocols. Comput. Stand. Interfaces 31(2): 305-308 (2009) - [j14]Damjan Kovac, Denis Trcek:
Qualitative trust modeling in SOA. J. Syst. Archit. 55(4): 255-263 (2009) - [j13]Denis Trcek:
A formal apparatus for modeling trust in computing environments. Math. Comput. Model. 49(1-2): 226-233 (2009) - [c6]Denis Trcek:
System Dynamics Based Risk Management for Distributed Information Systems. ICONS 2009: 74-79 - 2007
- [j12]Denis Trcek, Roman Trobec, Nikola Pavesic, Jurij F. Tasic:
Information systems security and human behaviour. Behav. Inf. Technol. 26(2): 113-118 (2007) - 2006
- [j11]Denis Trcek:
Security Models: Refocusing on the Human Factor. Computer 39(11): 103-104 (2006) - 2005
- [j10]Denis Trcek:
MAC Based Lightweight Protocols for Strong Authentication and Key Exchange. J. Inf. Sci. Eng. 21(4): 753-765 (2005) - [r1]Denis Trcek:
E-Business Systems Security for Intelligent Enterprise. Encyclopedia of Information Science and Technology (II) 2005: 930-933 - 2004
- [j9]Denis Trcek:
Towards trust management standardization. Comput. Stand. Interfaces 26(6): 543-548 (2004) - [c5]Denis Trcek:
Trust formalization - from taxonomy to modeling and simulation framework. IASTED Conf. on Software Engineering 2004: 297-302 - 2003
- [c4]Marjan Suselj, Tomaz Marcun, Denis Trcek, Gorazd Kandus:
Application of PKI in Health Care - Needs, Ambitions, Prospects. MIE 2003: 188-193 - [p1]Burkhard Stiller, Pere Barlet-Ros, John Cushnie, Jordi Domingo-Pascual, David Hutchison, Rui J. Lopes, Andreas Mauthe, Mihai Popa, James Roberts, Josep Solé-Pareta, Denis Trcek, Carlos Veciana-Nogués:
Pricing and QoS. QofIS Final Report 2003: 263-291 - 2001
- [j8]Denis Trcek, Roman Novak, Gorazd Kandus, Marjan Suselj:
Slovene smart card and IP based health-care information system infrastructure. Int. J. Medical Informatics 61(1): 33-43 (2001) - 2000
- [j7]Denis Trcek:
Security policy conceptual modeling and formalization for networked information systems. Comput. Commun. 23(17): 1716-1723 (2000) - [c3]Denis Trcek:
Security policy management for networked information systems. NOMS 2000: 817-830
1990 – 1999
- 1999
- [c2]T. Kalin, Gorazd Kandus, Denis Trcek, Blaz Zupan:
Slovenian national health insurance card: The next step. MIE 1999: 156-160 - 1998
- [j6]Denis Trcek:
Minimising the risk of electronic document forgery. Comput. Stand. Interfaces 19(2): 161-167 (1998) - 1997
- [j5]Denis Trcek, Borka Jerman-Blazic:
Certification Authorities in a Global Network - Procedures and Guidelines for a Public Key Infrastructure. Aust. Comput. J. 29(2): 41-47 (1997) - 1996
- [j4]Borka Jerman-Blazic, Denis Trcek, Tomaz Klobucar, Franc Bracun:
A Tool for Support of Key Distribution and Validity Certificate Check in Global Directory Service. Comput. Networks ISDN Syst. 28(5): 709-717 (1996) - [j3]Denis Trcek, Borka Jerman-Blazic, Nikola Pavesic:
Security policy space definition and structuring. Comput. Stand. Interfaces 18(2): 191-195 (1996) - 1995
- [j2]Denis Trcek, Borka Jerman-Blazic:
Formal language for security services base modelling and analysis. Comput. Commun. 18(12): 921-928 (1995) - 1994
- [c1]Borka Jerman-Blazic, Denis Trcek, Tomaz Klobucar, Franc Bracun:
A Tool for Support of Key Distribution and Validity Certificate Check in Global Directory Service. INDC 1994: 381-390 - 1993
- [j1]Denis Trcek, Borka Jerman-Blazic:
Certificates handling and their support within X.500 system. Microprocess. Microprogramming 39(2-5): 183-186 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint