default search action
Micha Moffie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j7]Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash:
Data minimization for GDPR compliance in machine learning models. AI Ethics 2(3): 477-491 (2022) - [c17]Abigail Goldsteen, Ariel Farkash, Micha Moffie, Ron Shmelkin:
Applying Artificial Intelligence Privacy Technology in the Healthcare Domain. MIE 2022: 121-122 - 2021
- [j6]Xabier Larrucea, Micha Moffie, Dan Mor:
Enhancing GDPR compliance through data sensitivity and data hiding tools. J. Univers. Comput. Sci. 27(7): 650-666 (2021) - [c16]Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash:
Anonymizing Machine Learning Models. DPM/CBT@ESORICS 2021: 121-136 - [c15]Micha Moffie, Dan Mor, Sigal Asaf, Ariel Farkash:
Next Generation Data Masking Engine. DPM/CBT@ESORICS 2021: 152-160 - 2020
- [j5]Xabier Larrucea, Micha Moffie, Sigal Asaf, Izaskun Santamaría:
Towards a GDPR compliant way to secure European cross border Healthcare Industry 4.0. Comput. Stand. Interfaces 69: 103408 (2020) - [i2]Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash:
Anonymizing Machine Learning Models. CoRR abs/2007.13086 (2020) - [i1]Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash:
Data Minimization for GDPR Compliance in Machine Learning Models. CoRR abs/2008.04113 (2020)
2010 – 2019
- 2019
- [c14]Sigal Asaf, Ariel Farkash, Micha Moffie:
Multi-value Classification of Ambiguous Personal Data. MEDI Workshops 2019: 202-208 - 2016
- [c13]Torsten Bandyszak, Micha Moffie, Abigail Goldsteen, Panos Melas, Bassem I. Nasser, Costas Kalogiros, Gabriele Barni, Sandro Hartenstein, Giorgos Giotis, Thorsten Weyer:
Supporting Coordinated Maintenance of System Trustworthiness and User Trust at Runtime. IFIPTM 2016: 96-112 - 2015
- [c12]Nazila Gol Mohammadi, Torsten Bandyszak, Abigail Goldsteen, Costas Kalogiros, Thorsten Weyer, Micha Moffie, Bassem I. Nasser, Mike Surridge:
Combining Risk-Management and Computational Approaches for Trustworthiness Evaluation of Socio-Technical Systems. CAiSE Forum 2015: 237-244 - [c11]Abigail Goldsteen, Micha Moffie, Torsten Bandyszak, Nazila Gol Mohammadi, Xiaoyu Chen, Symeon Meichanetzoglou, Sotiris Ioannidis, Panos Chatziadam:
A Tool for Monitoring and Maintaining System Thrustworthiness at Runtime. REFSQ Workshops 2015: 142-147 - [c10]Torsten Bandyszak, Nazila Gol Mohammadi, Mohamed Bishr, Abigail Goldsteen, Micha Moffie, Bassem I. Nasser, Sandro Hartenstein, Symeon Meichanetzoglou:
Cyber-Physical Systems Design for Runtime Thrustworthiness Maintenance Supported by Tools. REFSQ Workshops 2015: 148-155 - 2014
- [c9]Nazila Gol Mohammadi, Torsten Bandyszak, Micha Moffie, Xiaoyu Chen, Thorsten Weyer, Costas Kalogiros, Bassem I. Nasser, Mike Surridge:
Maintaining Trustworthiness of Socio-Technical Systems at Run-Time. TrustBus 2014: 1-12 - 2011
- [j4]Fatemeh Azmandian, Micha Moffie, Malak Alshawabkeh, Jennifer G. Dy, Javed A. Aslam, David R. Kaeli:
Virtual machine monitor-based lightweight intrusion detection. ACM SIGOPS Oper. Syst. Rev. 45(2): 38-53 (2011) - [c8]Fatemeh Azmandian, Micha Moffie, Jennifer G. Dy, Javed A. Aslam, David R. Kaeli:
Workload Characterization at the Virtualization Layer. MASCOTS 2011: 63-72 - 2010
- [c7]Malak Alshawabkeh, Micha Moffie, Fatemeh Azmandian, Javed A. Aslam, Jennifer G. Dy, David R. Kaeli:
Effective Virtual Machine Monitor Intrusion Detection Using Feature Selection on Highly Imbalanced Data. ICMLA 2010: 823-827
2000 – 2009
- 2007
- [j3]Gill Barequet, Micha Moffie:
On the complexity of Jensen's algorithm for counting fixed polyominoes. J. Discrete Algorithms 5(2): 348-355 (2007) - [c6]Diego Rivera, Dana Schaa, Micha Moffie, David R. Kaeli:
Exploring Novel Parallelization Technologies for 3-D Imaging Applications. SBAC-PAD 2007: 26-33 - 2006
- [c5]Micha Moffie, Winnie Cheng, David R. Kaeli, Qin Zhao:
Hunting Trojan Horses. ASID 2006: 12-17 - 2005
- [j2]Derek Uluski, Micha Moffie, David R. Kaeli:
Characterizing antivirus workload execution. SIGARCH Comput. Archit. News 33(1): 90-98 (2005) - [j1]Micha Moffie, David R. Kaeli:
ASM: application security monitor. SIGARCH Comput. Archit. News 33(5): 21-26 (2005) - 2004
- [c4]Gill Barequet, Micha Moffie:
The Complexity of Jensen's Algorithm for Counting Polyominoes. ALENEX/ANALC 2004: 161-169 - [c3]Roni Rosner, Yoav Almog, Micha Moffie, Naftali Schwartz, Avi Mendelson:
Power Awareness through Selective Dynamically Optimized Traces. ISCA 2004: 162-175 - 2003
- [c2]Roni Rosner, Micha Moffie, Yiannakis Sazeides, Ronny Ronen:
Selecting long atomic traces for high coverage. ICS 2003: 2-11 - [c1]Roni Rosner, Yoav Almog, Micha Moffie, Naftali Schwartz, Avi Mendelson:
PARROT: Power Awareness Through Selective Dynamically Optimized Traces. PACS 2003: 196-214
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint