


default search action
ICDS 2024: Oslo, Norway
- Sanjay Misra, Robertas Damasevicius, Petter Kvalvik:
International Conference on Digital Sovereignty, ICDS 2024, Oslo, Norway, November 28-30, 2024. Procedia Computer Science 254, 2025 - Sanjay Misra, Petter Kvalvik, Kai Morgan Kjølerbakken, Robertas Damasevicius:
Preface. 1-9 - Isaac Henderson Johnson Jeyakumar, Michael Kubach
:
A trust implementation model for cross-domain decentralized identity ecosystems: architecture, use case, and implementation. 10-19 - Edoghogho Olaye, Imonikosaye Omafovbe, Williams O. Aigbe, Daniel Obuh:
Personalized Governance Strategy for Patient Data in a Digital One Health Surveillance System. 20-29 - Elham Rostami, Muhammad Hanif, Fredrik Karlsson, Shang Gao:
Defining Actionable Advice in Information Security Policies - Guiding Employees to Strengthen Digital Sovereignty of Organizations. 30-38 - Sudhakar Kumar
, Sunil K. Singh
, Rakesh Kumar, Chandra Kumari Subba, Kwok Tai Chui, Brij B. Gupta:
Neoteric Threat Intelligence Ensuring Digital Sovereignty and Trust through ML-Infused Proactive Defense Analytics for NEXT-G and Beyond Ecosystems. 39-47 - Dharavath Ramesh, Santosh Thakur, Munesh Chandra Trivedi, Chi Hieu Le:
Ensuring Digital Sovereignty in Cross-chain EHR Sharing: A Relay-as-a-Service Approach for Secure Healthcare Interoperability. 48-57 - K. P. Anunita, S. R. Devisri, Chamundeswari Arumugam:
Federated Learning: Countering Label Flipping Attacks in Retinal OCT. 58-67 - Shashika Lokuliyana, A. G. A. Kalupahanage, H. M. S. D. Herath, Deemantha Siriwardana, D. N. Bulathsinhala, H. M. T. M. Herath:
Enhancing IoT Resilience: Machine Learning Techniques for Autonomous Anomaly Detection and Threat Mitigation. 68-77 - Ayan Chatterjee, Sundar Gopalakrishnan, Ayan Mondal:
Sovereignty-Aware Intrusion Detection on Streaming Data: Automatic Machine Learning Pipeline and Semantic Reasoning. 78-87 - Dara Tith, Jean-Noël Colin:
A Trust Policy Meta-Model for Trustworthy and Interoperability of Digital Identity Systems. 88-97 - Aikaterina C. Latsiou
, Arne Roar Nygård, Sokratis K. Katsikas, Costas Lambrinoudakis:
Never Trust - Always Verify: Assessing the cybersecurity trustworthiness of suppliers in the Digital Supply Chain. 98-107 - Sanjay Misra, Kousik Barik, Petter Kvalvik
:
Digital Sovereignty in the Era of Industry 5.0: Challenges and Opportunities. 108-117 - Razi Iqbal, Shereen Ismail:
Unbiased AI for a Sovereign Digital Future: A Bias Detection Framework. 118-126 - Mona Sadik, Ahmed S. ELSayed, Sherin M. Moussa
, Zaki T. Fayed:
Sovereign Sound in Federated Learning: Secured Arabic Pronunciation Assessment for Children in Noisy Environments. 127-136 - Sadananda Behera, Neelamadhab Padhy, Rasmita Panigrahi, Sanjay Kumar Kuanar:
Crop Disease Prediction Using Deep Learning in a Federated Learning Environment: Ensuring Data Privacy and Agricultural Sustainability. 137-146 - Julia Pampus, Maritta Heisel:
Pattern-based Requirements Elicitation for Sovereign Data Sharing. 147-156 - Rituka Jaiswal, Hans Georg Schaathun:
On Human Sovereignty in a Digital Age. 157-163 - Desigan Shanmugam, Chamundeswari Arumugam:
Effective Communication Compression Framework Using Federated Learning Privacy Model for Smart Grid. 164-170 - Chamundeswari Arumugam, Kamalika Karuppuchamy C, Amarnath B. K, Jeyasuriya B:
Internal Audit Effectiveness for Data Compliance Using Privacy Federated Learning Model in Hospital Environment. 171-180 - Ibomoiye Domor Mienye, Theo G. Swart:
ChatGPT in Education: A Review of Ethical Challenges and Approaches to Enhancing Transparency and Privacy. 181-190 - Clara Maathuis, Kasper Cools
:
The Role of AI in Military Cyber Security: Data Insights and Evaluation Methods. 191-200 - Ayan Chatterjee:
Sovereignty in Automated Stroke Prediction and Recommendation System with Explanations and Semantic Reasoning. 201-210 - Ikwuazom Callistus Tochukwu, Ogwueleka Francisca Nonyelum, Sanjay Misra, Sabarathinam Chockalingam
:
Securing mobile edge computing: A survey on cyber-physical threat mitigation for digital sovereignty. 211-220 - Martha Klare, Razvan Hrestic, Aida Stelter, Ulrike Lechner:
Digital Sovereignty and Digital Transformation Practice Recommendation for the Software Life Cycle Process. 221-229 - Rohit Shorya
, Priti Jagwani:
Enhancing Digital Autonomy in Peer-to-Peer Energy Trading: A Blockchain and Predictive Analytics Approach. 230-239 - Kasturi Routray, Padmalochan Bera, Sambeet Mishra:
Efficient and Secure Fine-Grained Authorization for Fog-Enabled Cyber-Physical Systems: Towards Trust and Autonomy in Digital Sovereignty. 240-249 - Pankaj Pandey:
Digital Sovereignty and AI: Developing India's National AI Stack for Strategic Autonomy. 250-259 - Yashwant Singh Yadav:
Agile Organizing of National Cyber Defence Capabilities: Decoupling External Dependencies and Catalysing Digital Sovereignty. 260-268 - Sontaga G. Forane, Absalom E. Ezugwu, Kevin Igwe:
Digital Sovereignty through Africa-Centric Emotional Intelligence: A Proof of Concept for AI-Enhanced Mental Health Support. 269-278 - Sokratis K. Katsikas:
Towards a cybersecurity-oriented research agenda for digital sovereignty. 279-288

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.