Mediated ciphertext-policy attribute-based encryption and its application L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker Information Security Applications: 10th International Workshop, WISA 2009 …, 2009 | 334 | 2009 |
Making sense of big data in health research: towards an EU action plan C Auffray, R Balling, I Barroso, L Bencze, M Benson, J Bergeron, ... Genome medicine 8, 1-13, 2016 | 332 | 2016 |
Secure management of personal health records by applying attribute-based encryption L Ibraimi, M Asim, M Petković Proceedings of the 6th international workshop on wearable, micro, and nano …, 2009 | 208 | 2009 |
Dynamic bayesian networks: A state of the art V Mihajlovic, M Petkovic University of Twente, 2001 | 197 | 2001 |
Method for exchanging data RP Koster, M Petkovic US Patent 8,788,679, 2014 | 138 | 2014 |
Transformation of BPMN Models for Behaviour Analysis. I Raedts, M Petkovic, YS Usenko, JMEM van der Werf, JF Groote, ... MSVVEIS 2007, 126-137, 2007 | 126 | 2007 |
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker IEEE Trans. Image process, 2009 | 115 | 2009 |
A machine learning solution to assess privacy policy completeness: (short paper) E Costante, Y Sun, M Petković, J Den Hartog Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, 91-96, 2012 | 113 | 2012 |
Content-based video retrieval by integrating spatio-temporal and stochastic recognition of events M Petkovic, W Jonker Proceedings IEEE Workshop on Detection and Recognition of Events in Video, 75-82, 2001 | 107 | 2001 |
A reference model for reputation systems S Vavilis, M Petković, N Zannone Decision Support Systems 61, 147-154, 2014 | 105 | 2014 |
A Home Healthcare System in the Cloud--Addressing Security and Privacy Challenges M Deng, M Petkovic, M Nalin, I Baroni 2011 IEEE 4th International conference on cloud computing, 549-556, 2011 | 103 | 2011 |
Multi-modal extraction of highlights from TV formula 1 programs M Petkovic, V Mihajlovic, W Jonker, S Djordjevic-Kajan Proceedings. IEEE International Conference on Multimedia and Expo 1, 817-820, 2002 | 100 | 2002 |
Specifying an access control policy EW Mwangi, M Petkovic US Patent App. 13/254,203, 2011 | 90 | 2011 |
Recognizing Strokes in Tennis Videos using Hidden Markov Models. M Petkovic, W Jonker, Z Zivkovic VIIP, 512-516, 2001 | 84 | 2001 |
CPP2XMI: reverse engineering of UML class, sequence, and activity diagrams from C++ source code E Korshunova, M Petkovic, MGJ Van Den Brand, MR Mousavi 2006 13th Working Conference on Reverse Engineering, 297-298, 2006 | 81 | 2006 |
Point estimation of root finding methods M Petković Springer Berlin Heidelberg, 2008 | 80 | 2008 |
On-line trust perception: What really matters E Costante, J Den Hartog, M Petkovic 2011 1st Workshop on Socio-Technical Aspects in Security and Trust (STAST …, 2011 | 76 | 2011 |
Authenticating a device and a user JG Merchan, M Petkovic US Patent 9,158,906, 2015 | 75 | 2015 |
Security, privacy, and trust in modern data management M Petkovic, W Jonker Springer Science & Business Media, 2007 | 75* | 2007 |
Artificial intelligence in clinical health care applications M Van Hartskamp, S Consoli, W Verhaegh, M Petkovic, A Van de Stolpe Interactive journal of medical research 8 (2), e12100, 2019 | 72 | 2019 |