Seda Gurses
Seda Gurses
FWO Post-Doctoral Researcher COSIC/KU Leuven, Assistant Professor TPM, TU Delft (starting May, 2019)
Geverifieerd e-mailadres voor kuleuven.be - Homepage
TitelGeciteerd doorJaar
FPDetective: dusting the web for fingerprinters
G Acar, M Juarez, N Nikiforakis, C Diaz, S Gürses, F Piessens, B Preneel
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2242013
A comparison of security requirements engineering methods
B Fabian, S Gürses, M Heisel, T Santen, H Schmidt
Requirements engineering 15 (1), 7-40, 2010
2052010
Engineering privacy by design
S Gürses, C Gonzalez Troncoso, C Diaz
Computers, Privacy & Data Protection, 2011
2022011
Ubiquitous social networks: Opportunities and challenges for privacy-aware user modelling
S Preibusch, B Hoser, S Gürses, B Berendt
DIW Discussion Papers, 2007
1202007
Emerging markets for RFID traces
M Bauer, B Fabian, M Fischmann, S Gürses
arXiv preprint cs/0606018, 2006
642006
Two tales of privacy in online social networks
S Gürses, C Diaz
IEEE Security & Privacy 11 (3), 29-37, 2013
572013
Multilateral Privacy Requirements Analysis in Online Social Networks
S Gürses, CS HMDB, E COSIC
Ph. D. Thesis, HMDB, Department of Computer Science, KU Leuven, Belgium, May, 2010
56*2010
A critical review of 10 years of privacy technology
G Danezis, S Gürses
Proceedings of Surveillance Cultures: A Global Surveillance Society, 2010
542010
Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
SF Gürses, R Rizk, O Günther
ICIS, 90, 2008
432008
Multilateral security requirements analysis for preserving privacy in ubiquitous environments
F Guerses, B Berendt, T Santen
Proceedings of the UKDU Workshop, 51-64, 2006
422006
Privacy engineering: Shaping an emerging field of research and practice
S Gürses, JM del Alamo
IEEE Security & Privacy 14 (2), 40-46, 2016
372016
Hero or Villain: The Data Controller in Privacy Law and Technologies
C Diaz, O Tene, S Gurses
Ohio St. LJ 74, 923-1335, 2013
362013
Eliciting confidentiality requirements in practice
S Gürses, JH Jahnke, C Obry, A Onabajo, T Santen, M Price
Proceedings of the 2005 conference of the Centre for Advanced Studies on …, 2005
362005
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
S Gürses
Communications of the ACM 57 (8), 20-23, 2014
272014
Understanding the landscape of privacy technologies
C Diaz, S Gürses
Extended abstract of invited talk in proceedings of the Information Security …, 2012
252012
The social web and privacy: Practices, reciprocity and conflict detection in social networks
FS Gürses, B Berendt
Privacy-Aware Knowledge Discovery. Chapman & Hall/CRC Press, New York, NY …, 2010
212010
The Social Web and Privacy: Practice, Reciprocity and Conflicts in Social Networks
S Gürses, B Berendt
Privacy-Aware Knowledge Discovery: Novel Applications and New Techiques …, 2009
21*2009
Crypto and empire: the contradictions of counter-surveillance advocacy
S Gürses, A Kundnani, J Van Hoboken
Media, Culture & Society 38 (4), 576-590, 2016
202016
Contextualizing Security Goals: A Method for Multilateral Security Requirements Elicitation.
SF Gürses, T Santen
Sicherheit 6, 42-53, 2006
192006
Engineering privacy by design reloaded
S Gürses, C Troncoso, C Diaz
Amsterdam Privacy Conference, 1-21, 2015
162015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20