Report of 14th International Conference on Webometrics, Informetrics and Scientometrics (WIS) & 19th COLLNET Meeting 05 to 08 December 2018, University of Macau, Macau. - In: Collnet journal of scientometrics and information management, ISSN 2168-930X, Bd. 13 (2019), 1, S. 3-6
https://doi.org/10.1080/09737766.2019.1617229
Sentiment analysis of German emails: a comparison of two approaches. - In: DATA 2019, (2019), S. 385-391
Bibliometric analysis of the publication output of TU Ilmenau in the period 2012-2016. - In: Collaboration - impact on productivity and innovation, (2019), S. 21-29
https://doi.org/10.22032/dbt.39328
Collaboration - impact on productivity and innovation : proceedings of 14th International Conference on Webometrics, Informetrics and Scientometrics & 19th COLLNET Meeting 2018, December 5-8, 2018, University of Macau, Macau. - Ilmenau : Universitätsbibliothek, 2019. - 1 Online-Ressource (iv, 130 Seiten)
https://doi.org/10.22032/dbt.39296
Library data science - challenges and opportunities. - In: Libraries and librarianship in digital plus era, (2019), S. 207-214
Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems. - In: ARES 2019, (2019), article no. 86, 10 Seiten
Cyber security management requires fast and cost efficient responses to threat alerts. Automation of cyber threat sensing and responding is one way to achieve immediate reactions to imminent threats. There are already tools for an extensive automation of threat sensing, e.g. threat intelligence sharing platforms. Methods, techniques and tools for reacting to menacing states and events, e.g. security-policy-controlled systems, have also been explored and published for some time. What is still missing, however, is the integration of these two approaches. This paper describes first steps towards an integration of threat intelligence sharing platforms and security-policy-controlled systems. We present a conceptual design for threat reaction strategies, security architectures and mechanisms and information representation requirements. We use two exemplary threat scenarios to demonstrate our proposals.
https://doi.org/10.1145/3339252.3340509
Assessing theories for research on personal data transparency. - In: Privacy and identity management, (2019), S. 239-254
A growing number of business models are based on the collection, processing and dissemination of personal data. For a free decision about the disclosure of personal data, the individual concerned needs transparency as insight into which personal data is collected, processed, passed on to third parties, for what purposes and for what time (Personal Data Transparency, or PDT for short). The intention of this paper is to assess theories for research on PDT. We performed a literature review and explored theories used in research on PDT. We assessed the selected theories that may be appropriate for exploring PDT. Such research may build on several theories that open up different perspectives and enable various fields of study.
A literature analysis for the identification of machine learning and feature extraction methods for sentiment analysis. - In: ICDIM 2018, (2018), S. 6-11
https://doi.org/10.1109/ICDIM.2018.8846980
Assessment of six e-mail encryption solutions using an utility value analysis. - In: International journal of internet technology and secured transactions, ISSN 2046-3723, Bd. 6 (2018), 1, S. 526-533
https://doi.org/10.20533/jitst.2046.3723.2018.0065
Barriers to adopting data pools for product information sharing - a literature review. - In: Multikonferenz Wirtschaftsinformatik 2018, (2018), S. 295-306