default search action
Andrew Hutchison
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Cathy Mengying Fang, Valdemar Danry, Nathan Whitmore, Andria Bao, Andrew Hutchison, Cayden Pierce, Pattie Maes:
PhysioLLM: Supporting Personalized Health Insights with Wearables and Large Language Models. CoRR abs/2406.19283 (2024)
2010 – 2019
- 2019
- [c28]Andre Lopes, Andrew Hutchison:
Experimenting with Machine Learning in Automated Intrusion Response. IDC 2019: 505-514 - 2017
- [c27]Andrew Hutchison:
Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models. MMM-ACNS 2017: 16-27 - 2013
- [c26]Stefan Asanger, Andrew Hutchison:
Experiences and Challenges in Enhancing Security Information and Event Management Capability Using Unsupervised Anomaly Detection. ARES 2013: 654-661 - [c25]Markus Goldstein, Stefan Asanger, Matthias Reif, Andrew Hutchison:
Enhancing Security Event Management Systems with Unsupervised Anomaly Detection. ICPRAM 2013: 530-538 - 2012
- [c24]Roland Rieke, Luigi Coppolino, Andrew Hutchison, Elsa Prieto, Chrystel Gaber:
Security and Reliability Requirements for Advanced Security Event Management. MMM-ACNS 2012: 171-180 - [c23]Roland Rieke, Julian Schütte, Andrew Hutchison:
Architecting a security strategy measurement and management system. MDsec@MoDELS 2012: 2 - [c22]Roland Rieke, Elsa Prieto, Rodrigo Diaz, Hervé Debar, Andrew Hutchison:
Challenges for Advanced Security Monitoring - The MASSIF Project. TrustBus 2012: 222-223 - 2011
- [c21]Robert Koletka, Andrew Hutchison:
An Architecture for Secure Searchable Cloud Storage. ISSA 2011 - 2010
- [c20]Alapan Arnab, Tobias Martin, Andrew Hutchison:
Practical Experiences with Purenet, a Self-Learning Malware Prevention System. iNetSec 2010: 56-69
2000 – 2009
- 2008
- [j3]Andrew Hutchison:
Making the Water Move: Techno-Historic Limits in the Game Aesthetics of Myst and Doom. Game Stud. 8(1) (2008) - 2007
- [c19]Andrew Hutchison:
Back to the Holodeck: new life for virtual reality? DIMEA 2007: 98-104 - [c18]Min Chew Lim, Tele Tan, Andrew Hutchison, Ling Li, Mihai M. Lazarescu:
Chameleon art: a platform for interactive art production. DIMEA 2007: 183 - [c17]Alapan Arnab, Andrew Hutchison:
Persistent access control: a formal model for DRM. Digital Rights Management Workshop 2007: 41-53 - [c16]Alapan Arnab, Andrew Hutchison:
Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. SEC 2007: 277-288 - 2006
- [c15]Alapan Arnab, Andrew Hutchison:
Verifiable digital object identity system. Digital Rights Management Workshop 2006: 19-26 - [c14]Alapan Arnab, Andrew Hutchison:
Ticket Based Identity System for DRM. ISSA 2006: 1-10 - 2005
- [c13]Alapan Arnab, Andrew Hutchison:
Fairer usage contracts for DRM. Digital Rights Management Workshop 2005: 1-7 - [c12]Alapan Arnab, Andrew Hutchison:
Requirement Analysis of Enterprise DRM Systems. ISSA 2005: 1-14 - 2003
- [j2]Elton Saul, Andrew Hutchison:
Enhanced security protocol engineering through a unified multidimensional framework. IEEE J. Sel. Areas Commun. 21(1): 62-76 (2003) - 2001
- [c11]Elton Saul, Andrew Hutchison:
Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II. Conference on Information Security Management & Small Systems Security 2001: 73-86 - [c10]Marc G. Welz, Andrew Hutchison:
Interfacing Trusted Applications with Intrusion Detection Systems. Recent Advances in Intrusion Detection 2001: 37-53 - 2000
- [c9]Elton Saul, Andrew Hutchison:
A Generic Graphical Specification Environment for Security Protocol Modelling. SEC 2000: 311-320
1990 – 1999
- 1999
- [c8]Andrew Hutchison, Marc G. Welz:
Incremental Security in Open, Untrusted Networks. FTDCS 1999: 151-154 - [c7]Matthem Berry, Andrew Hutchison, Elton Saul:
Predicting the Performance of Transactional Electronic Commerce Protocols. Conference on Information Security Management & Small Systems Security 1999: 161-178 - 1997
- [c6]Andrew Hutchison:
gGSS-API: a group enhanced generic security service. SEC 1997: 101-110 - 1996
- [j1]Andrew Hutchison, Matthias Kaiserswerth, Michael Moser, Andreas Schade:
Electronic data interchange for health care. IEEE Commun. Mag. 34(7): 28-34 (1996) - [c5]Andrew Hutchison, Matthias Kaiserswerth, Peter Trommler:
Secure World Wide Web Access to Server Groups. Communications and Multimedia Security 1996: 234-243 - [c4]Andrew Hutchison, Kurt Bauknecht:
Cryptographic key distribution and authentication protocols for secure group communication. SEC 1996: 492-493 - 1995
- [c3]Christian Sauter, Othmar Morger, Thomas Mühlherr, Andrew Hutchison, Stephanie Teufel:
CSCW for Strategic Management in Swiss Enterprises: an Empirical Study. ECSCW 1995: 115- - [c2]Andrew Hutchison, Othmar Morger, Christian Sauter, Stephanie Teufel:
Current Usage and Potential of Computer Supported Cooperative Work in Swiss Banks: An Empirical Study. ICIS 1995: 313-324 - 1994
- [c1]Andrew Hutchison:
CSCW as opportunity for business process re-engineering. Business Process Re-Engineering 1994: 309-318
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-25 19:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint