


default search action
Peter Bertók
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c49]Mahawaga Arachchige Pathum Chamikara
, Dongxi Liu, Seyit Camtepe
, Surya Nepal
, Marthie Grobler
, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning. ESORICS (1) 2022: 195-216 - [i8]M. A. P. Chamikara, Dongxi Liu, Seyit Camtepe, Surya Nepal, Marthie Grobler, Peter Bertók, Ibrahim Khalil:
Local Differential Privacy for Federated Learning in Industrial Settings. CoRR abs/2202.06053 (2022) - 2021
- [j25]Mahawaga Arachchige Pathum Chamikara
, Peter Bertók, Ibrahim Khalil
, Dongxi Liu, Seyit Camtepe
:
Privacy preserving distributed machine learning with federated learning. Comput. Commun. 171: 112-125 (2021) - [j24]Mahawaga Arachchige Pathum Chamikara
, Peter Bertók, Ibrahim Khalil
, Dongxi Liu, Seyit Camtepe
:
PPaaS: Privacy Preservation as a Service. Comput. Commun. 173: 192-205 (2021) - 2020
- [j23]Mahawaga Arachchige Pathum Chamikara
, Peter Bertók
, Ibrahim Khalil
, Dongxi Liu, Seyit Camtepe
:
Privacy Preserving Face Recognition Utilizing Differential Privacy. Comput. Secur. 97: 101951 (2020) - [j22]Mahawaga Arachchige Pathum Chamikara
, Peter Bertók
, Ibrahim Khalil
, Dongxi Liu, Seyit Camtepe
, Mohammed Atiquzzaman
:
Local Differential Privacy for Deep Learning. IEEE Internet Things J. 7(7): 5827-5842 (2020) - [j21]Mahawaga Arachchige Pathum Chamikara
, Peter Bertók
, Dongxi Liu, Seyit Ahmet Çamtepe
, Ibrahim Khalil
:
Efficient privacy preservation of big data for accurate data mining. Inf. Sci. 527: 420-443 (2020) - [j20]Mahawaga Arachchige Pathum Chamikara
, Peter Bertók
, Ibrahim Khalil
, Dongxi Liu, Seyit Camtepe
, Mohammed Atiquzzaman
:
A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems. IEEE Trans. Ind. Informatics 16(9): 6092-6102 (2020) - [i7]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Distributed Machine Learning with Federated Learning. CoRR abs/2004.12108 (2020) - [i6]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Face Recognition Utilizing Differential Privacy. CoRR abs/2005.10486 (2020) - [i5]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
PPaaS: Privacy Preservation as a Service. CoRR abs/2007.02013 (2020)
2010 – 2019
- 2019
- [j19]Mahawaga Arachchige Pathum Chamikara
, Peter Bertók
, Dongxi Liu, Seyit Ahmet Çamtepe
, Ibrahim Khalil
:
An efficient and scalable privacy preserving algorithm for big data and data streams. Comput. Secur. 87 (2019) - [i4]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient privacy preservation of big data for accurate data mining. CoRR abs/1906.08149 (2019) - [i3]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
An Efficient and Scalable Privacy Preserving Algorithm for Big Data and Data Streams. CoRR abs/1907.13498 (2019) - [i2]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Local Differential Privacy for Deep Learning. CoRR abs/1908.02997 (2019) - 2018
- [j18]Mohannad J. Alhanahnah, Peter Bertók
, Zahir Tari
, Sahel Alouneh
:
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers. Future Gener. Comput. Syst. 79: 488-499 (2018) - [j17]Mahawaga Arachchige Pathum Chamikara
, Peter Bertók
, Dongxi Liu, Seyit Camtepe
, Ibrahim Khalil
:
Efficient data perturbation for privacy preserving and accurate data stream mining. Pervasive Mob. Comput. 48: 1-19 (2018) - [c48]Zahir Tari, A. Thompson, N. Almusalam, Peter Bertók
, A. Mahmood:
MicroGRID: An Accurate and Efficient Real-Time Stream Data Clustering with Noise. PAKDD (2) 2018: 483-494 - [i1]Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Camtepe, Ibrahim Khalil:
Efficient Data Perturbation for Privacy Preserving and Accurate Data Stream Mining. CoRR abs/1806.06151 (2018) - 2017
- [j16]Mohannad J. Alhanahnah, Peter Bertók
, Zahir Tari
:
Trusting Cloud Service Providers: Trust Phases and a Taxonomy of Trust Factors. IEEE Cloud Comput. 4(1): 44-54 (2017) - 2016
- [j15]Abdullah Alamri
, Peter Bertók
, James A. Thom
, Adil Fahad:
The mediator authorization-security model for heterogeneous semantic knowledge bases. Future Gener. Comput. Syst. 55: 227-237 (2016) - [j14]Saadia Kedjar, Abdelkamel Tari, Peter Bertók
:
Access Control and Information Flow Control for Web Services Security. Int. J. Inf. Technol. Web Eng. 11(1): 44-76 (2016) - 2015
- [j13]Zahir Tari
, Xun Yi
, Uthpala Subodhani Premarathne, Peter Bertók
, Ibrahim Khalil
:
Security and Privacy in Cloud Computing: Vision, Trends, and Challenges. IEEE Cloud Comput. 2(2): 30-38 (2015) - [j12]Abdullah Alamri, Peter Bertók
, Adil Fahad:
Towards an architecture for managing semantic knowledge in semantic repositories. Int. J. Parallel Emergent Distributed Syst. 30(5): 411-425 (2015) - 2014
- [j11]Gaya K. Jayasinghe, J. Shane Culpepper
, Peter Bertók
:
Efficient and effective realtime prediction of drive-by download attacks. J. Netw. Comput. Appl. 38: 135-149 (2014) - [c47]Kalpana Singh, Jian Zhong, Lynn Margaret Batten, Peter Bertók:
A solution for privacy-preserving, remote access to sensitive data. ISITA 2014: 309-313 - [c46]Charles Thevathayan, Peter Bertók
, George Fernandez:
Synthesising End-to-End Security Protocols. TrustCom 2014: 440-447 - 2013
- [j10]Vinod Mirchandani, Peter Bertók
:
Optimized Energy Management for Mixed Uplink Traffic in LTE UE. J. Networks 8(3): 537-551 (2013) - [j9]Abdullah Alamri, Peter Bertók
, James A. Thom
:
Authorization Control for a Semantic Data Repository through an Inference Policy Engine. IEEE Trans. Dependable Secur. Comput. 10(6): 328-340 (2013) - [c45]Charles Thevathayan, James Harland
, Peter Bertók
:
An Endorsement Trust Model. TrustCom/ISPA/IUCC 2013: 829-836 - 2012
- [j8]Vidura Gamini Abhaya, Zahir Tari
, Peter Bertók
:
Building Web services middleware with predictable execution times. World Wide Web 15(5-6): 685-744 (2012) - [c44]Kalpana Singh, Jian Zhong, Vinod Mirchandani, Lynn Margaret Batten, Peter Bertók
:
Securing Data Privacy on Mobile Devices in Emergency Health Situations. MobiSec 2012: 119-130 - [c43]Jian Zhong, Vinod Mirchandani, Peter Bertók, James Harland:
µ-Fractal Based Data Perturbation Algorithm For Privacy Protection. PACIS 2012: 148 - 2011
- [c42]Anshuman Mukherjee, Zahir Tari
, Peter Bertók
:
A Spring Based Framework for Verification of Service Composition. IEEE SCC 2011: 258-265 - [c41]Jian Zhong, Peter Bertók, Vinod Mirchandani, Zahir Tari
:
Privacy-Aware Granular Data Access Control For Cross-Domain Data Sharing. PACIS 2011: 226 - 2010
- [c40]Anshuman Mukherjee, Zahir Tari, Peter Bertók:
Memory efficient state-space analysis in software model-checking. ACSC 2010: 23-32 - [c39]Vidura Gamini Abhaya, Zahir Tari, Peter Bertók
:
Using Real-Time Scheduling Principles in Web Service Clusters to Achieve Predictability of Service Execution. ICSOC 2010: 197-212 - [c38]Jian Zhong, Peter Bertók
, Zahir Tari:
Security, Privacy and Interoperability in Heterogeneous Systems. PRO-VE 2010: 713-721 - [c37]Fariborz Azimi, Peter Bertók
:
An analytical model of TCP flow in multi-hop wireless networks. LCN 2010: 88-95 - [c36]Jian Zhong, Peter Bertók, Zahir Tari
:
Pair-Wise Privilege Control for Cross-Domain Private Data Sharing. PACIS 2010: 166 - [c35]Vidura Gamini Abhaya, Zahir Tari, Peter Bertók
:
Building Web Services Middleware with Predictable Service Execution. WISE 2010: 23-37
2000 – 2009
- 2009
- [j7]Xuan Dau Hoang
, Jiankun Hu
, Peter Bertók
:
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference. J. Netw. Comput. Appl. 32(6): 1219-1228 (2009) - [c34]Vidura Gamini Abhaya, Zahir Tari, Peter Bertók
:
Achieving Predictability and Service Differentiation in Web Services. ICSOC/ServiceWave 2009: 364-372 - [c33]Peter Bertók
, Abdelkamel Tari, Saadia Kedjar:
Information Flow Control for Cooperation Support in Virtual Enterprises. PRO-VE 2009: 581-590 - [c32]Anshuman Mukherjee, Zahir Tari
, Peter Bertók
:
Modeling of BPEL Composite Services Using Clustered Coloured Petri-Nets. SERVICES II 2009: 55-62 - 2008
- [j6]Khoi Anh Phan, Zahir Tari
, Peter Bertók
:
Similarity-Based SOAP Multicast Protocol to Reduce Bandwith and Latency in Web Services. IEEE Trans. Serv. Comput. 1(2): 88-103 (2008) - [c31]Peter Bertók
, Stephen Reynolds:
Dynamic Adaptation, Composition and Orchestration of Web Services in Virtual Environments. Virtual Enterprises and Collaborative Networks 2008: 501-508 - [c30]Vaidyanathan Ramany, Peter Bertók
:
Replication of location-dependent data in mobile ad hoc networks. MobiDE 2008: 39-46 - 2007
- [c29]Khoi Anh Phan, Zahir Tari
, Peter Bertók:
eSMP: A Multicast Protocol to Minimize SOAP Network Traffic in Low Bandwidth Environments. LCN 2007: 95-106 - [c28]Khoi Anh Phan, Peter Bertók
, Andrew Fry, Caspar Ryan:
Minimal Traffic-Constrained Similarity-Based SOAP Multicast Routing Protocol. OTM Conferences (1) 2007: 558-576 - 2006
- [j5]Kwong Yuen Lai, Zahir Tari
, Peter Bertók
:
An analytical study of cache invalidation algorithms in mobile environments. Int. J. Pervasive Comput. Commun. 2(1): 3-14 (2006) - [j4]Bilal Ahmad Choudry, Peter Bertók
, Jinli Cao
:
Cost based web services transaction management. Int. J. Web Grid Serv. 2(2): 198-220 (2006) - [j3]Zahir Tari
, Peter Bertók
, D. Simic:
A Dynamic Label Checking Approach for Information Flow Control in Web Services. Int. J. Web Serv. Res. 3(1): 1-28 (2006) - [c27]Thi Khoi Anh Phan, Zahir Tari
, Peter Bertók
:
Optimizing Web Services Performance by Using Similarity-Based Multicast Protocol. ECOWS 2006: 119-128 - [c26]Thi Khoi Anh Phan, Zahir Tari
, Peter Bertók
:
A benchmark on soap's transport protocols performance for mobile applications. SAC 2006: 1139-1144 - 2005
- [j2]Kwong Yuen Lai, Zahir Tari
, Peter Bertók
:
Supporting user mobility through cache relocation. Mob. Inf. Syst. 1(4): 275-307 (2005) - [c25]Kwong Yuen Lai, Zahir Tari
, Peter Bertók:
Supporting disconnection operations through cooperative hoarding. ICCCN 2005: 35-42 - [c24]Kwong Yuen Lai, Zahir Tari
, Peter Bertók
:
Improving Data Accessibility For Mobile Clients Through Cooperative Hoarding. ICDE 2005: 415-416 - [c23]Gennadi Oumanski, Peter Bertók
:
Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc Behaviour. ICITA (2) 2005: 334-337 - [c22]Bilal Ahmad Choudry, Peter Bertók, Jinli Cao:
A Cost Based Coordination Model for Long Running Transactions in Web Services. iiWAS 2005: 97-108 - [c21]Craig Pearce, Peter Bertók, Ron G. van Schyndel:
Protecting Consumer Data in Composite Web Services. SEC 2005: 19-34 - [c20]Shrikant Sundaram, Peter Bertók, Benjamin A. Burton:
Secure Group Communication with Distributed Generation of Private Keys in Ad-hoc Networks. SEC 2005: 477-492 - 2004
- [c19]Kwong Yuen Lai, Zahir Tari
, Peter Bertók:
Location-aware cache replacement for mobile environments. GLOBECOM 2004: 3441-3447 - [c18]Kwong Yuen Lai, Zahir Tari
, Peter Bertók:
Improving Cache Performance in Mobile Computing Networks through Dynamic Object Relocation. ICPADS 2004: 37-45 - [c17]Mario Gerla, Zahir Tari
, Peter Bertók:
An analytical study of object relocation strategies for wireless environments. ISCC 2004: 1091-1097 - [c16]Kwong Yuen Lai, Zahir Tari
, Peter Bertók:
Mobility-Aware Cache Replacement for Users of Location-Dependent Services. LCN 2004: 50-58 - [c15]Abhinav Vora, Zahir Tari
, Peter Bertók
:
An Hoarding Approach for Supporting Disconnected Write Operations in Mobile Environments. SRDS 2004: 276-288 - [c14]Xin-Jian Xu, Peter Bertók:
Integration of Heterogeneous Web Service Components. WSMAI 2004: 87-94 - 2003
- [c13]Kwong Yuen Lai, Zahir Tari, Peter Bertók
:
An Analytical Study of Broadcast Based Cache Invalidation in Mobile Computing Networks. OTM 2003: 554-572 - [c12]Abhinav Vora, Zahir Tari, Peter Bertók
:
A Variable Cache Consistency Protocol for Mobile Systems Using Time Locks. DAIS 2003: 153-166 - [c11]Xuan Dau Hoang, Jiankun Hu, Peter Bertók:
Intrusion Detection Based on Data Mining. ICEIS (3) 2003: 341-346 - [c10]Xuan Dau Hoang
, Jiankun Hu
, Peter Bertók
:
A multi-layer model for anomaly intrusion detection using program sequences of system calls. ICON 2003: 531-536 - [c9]Kwong Yuen Lai, Zahir Tari
, Peter Bertók
:
Cost Efficient Broadcast Based Cache Invalidation for Mobile Environments. SAC 2003: 871-877 - 2002
- [c8]Abhinav Vora, Zahir Tari
, Peter Bertók
, Kwong Yuen Lai:
A Mobile Cache Consistency Protocol Using Shareable Read/Write Time Locks. ICPADS 2002: 284- - 2001
- [c7]Saluka R. Kodituwakku, Peter Bertók, Liping Zhao:
APLRAC: A Pattern Language for Designing and Implementing Role-Based Access Control. EuroPLoP 2001: 331-346 - [c6]Peter Bertók, Saluka R. Kodituwakku:
Data Access Control in Virtual Organizations - Role-Based Access Control Patterns. PROLAMAT 2001: 394-405 - [e2]George L. Kovács, Peter Bertók, Géza Haidegger:
Digital Enterprise Challenges: Life-Cycle Approach to Management and Production, IFIP TC5 / WG5.2 & WG5.3 Eleventh International PROLAMAT Conference on Digital Enterprise - New Challenges, November 7-10, 2001, Budapest, Hungary. IFIP Conference Proceedings 205, Kluwer 2001, ISBN 0-7923-7556-4 [contents] - 2000
- [c5]Peter Bertók, John P. T. Mo, Stuart Woodman:
Collaboration and Application Integration: Distributed Design with Virtual CAD. DIISM 2000: 403-410 - [c4]Peter Bertók, John P. T. Mo:
Software Technology for Design System Integration. DIISM 2000: 472-479
1990 – 1999
- 1997
- [c3]Peter Bertók:
Introduction. WETICE 1997: 2 - [c2]Peter Bertók, Martti Mäntylä, Jim McGovern, George Fernandez:
Working Group Report on Information Infrastructure for Global and Virtual Enterprises. WETICE 1997: 62-67 - 1996
- [c1]Laszlo Nemes, Peter Bertók:
Cooperative design on the Internet. IFIP World Conference on IT Tools 1996: 419-428 - 1993
- [j1]István Mezgár, Peter Bertók:
Ifip/Ifac International Working Conference On Knowledge-Based Hybrid Systems In Engineering And Manufacturing. Robotica 11(6): 583-584 (1993) - [e1]István Mezgár, Peter Bertók:
Knowledge Based Hybrid Systems, Proceedings of the IFIP TC5/WG5.3/IFAC International Working Conference on Knowledge Based Hybrid Systems in Engineering and Manufacturing, KNOWHSEM '93, Budapest, Hungary, 20-22 April, 1993. IFIP Transactions B-11, North-Holland 1993, ISBN 0-444-81484-1 [contents]
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint