1. Agir, B., Calbimonte, J.-P., Aberer, K.: Semantic and sensitivity aware location privacy protection for the Internet of things. In: Proceedings of the Privon 2014 Workshop on Society, Privacy and the Semantic Web—Policy and Technology, CEUR-WS.org, 2014, pp. 58–63 (2014)
2. Bonatti, P.A., Kirrane, S., Polleres, A., Wenning, R.: Transparent personal data processing: the road ahead. In: Proceedings of Computer Safety, Reliability, and Security (SAFECOMP 2017), Workshops, ASSURE, DECSoS, SASSUR, TELERISE, and TIPS, Trento, Italy, September 12, 2017. Lecture Notes in Computer Science, vol. 10489, pp. 337–349. Springer, Cham (2017).
https://doi.org/10.1007/978-3-319-66284-8_28
3. Cardellino, C., Villata, S., Gandon, F., Governatori, G., Lam, H., Rotolo, A.: Licentia: a tool for supporting users in data licensing on the web of data. In: Proceedings of the ISWC 2014 Posters & Demonstrations Track a Track Within the 13th International Semantic Web Conference, ISWC 2014. Riva del Garda, Italy, October 21, 2014. Horridge, M., Rospocher, M., van Ossenbruggen, J. (eds.) CEUR Workshop Proceedings, CEUR-WS.org, vol. 1272, pp. 277–280 (2014).
http://ceur-ws.org/Vol-1272/paper_54.pdf
4. Carvalho, R., Goldsmith, M., Creese, S.: Malware investigation using semantic technologies (2016).
https://iesd2016.wordpress.com/program/
5. Cebula, J.J., Popeck, M.E., Young, L.R.: A taxonomy of operational cyber security risks version 2. Technical Report, Carnegie–Mellon University Pittsburgh, PA, Software Engineering Institute (2014).
https://doi.org/10.13140/rg.2.2.23973.91363