FAYE, S., LOUVETON, N., GHEORGHE, G., & ENGEL, T. (September 2016). A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 7 (3). Peer reviewed |
GHEORGHE, G., LOUVETON, N., Martin, B., Viraize, B., Mougin, L., FAYE, S., & ENGEL, T. (2016). Heat is in the Eye of the Beholder: Towards Better Authenticating on Smartglasses. In Proceedings of the 9th International Conference on Human System Interaction (HSI'16). doi:10.1109/HSI.2016.7529679 Peer reviewed |
Pecci, I., Martin, B., Kacem, I., Maamria, I., FAYE, S., LOUVETON, N., GHEORGHE, G., & ENGEL, T. (2016). Not a Tile Out of Place: Toward Creating Context-Dependent User Interfaces on Smartglasses. In Proceedings of the 9th International Conference on Human System Interaction (HSI'16). doi:10.1109/HSI.2016.7529680 Peer reviewed |
FAYE, S., LOUVETON, N., GHEORGHE, G., & ENGEL, T. (2016). Toward a Characterization of Human Activities using Smart Devices: A Micro/Macro Approach. In Proceedings of the 7th IEEE INFOCOM International Workshop on Mobility Management in the Networks of the Future World. doi:10.1109/INFCOMW.2016.7562162 Peer reviewed |
Ghatpande, S., & GHEORGHE, G. (2015). Towards more secure and usable cloud storage for E-Health. Luxembourg, Luxembourg: University of Luxembourg. https://orbilu.uni.lu/handle/10993/21956 |
Avanesov, T., GHEORGHE, G., PALATTELLA, M. R., KANTOR, M., Popoviciu, C., & ENGEL, T. (2015). Network troubleshooting with SDN-RADAR (demo paper). In Proc. of IFIP/IEEE International Symposium on Integrated Network Management (IM). Peer reviewed |
GHEORGHE, G., Avanesov, T., PALATTELLA, M. R., ENGEL, T., & Popoviciu, C. (2015). SDN-RADAR: Network troubleshooting combining user experience and SDN capabilities. In Proc. of IEEE Conf. on Network Softwarization (NetSoft). Peer reviewed |
BARTOLINI, C., GHEORGHE, G., GIURGIU, A., SABETZADEH, M., & SANNIER, N. (11 March 2015). Assessing IT Security Standards Against the Upcoming GDPR for Cloud Systems [Poster presentation]. Grande Region Security and Reliability Day 2015, Trier, Germany. |
GHEORGHE, G., & ENGEL, T. (2015). Towards Reinventing Online Privacy. In B. Berendt, T. ENGEL, D. Ikonomou, D. Le Métayer, ... S. Schiffner (Eds.), LNCS - Annual Privacy Forum 2015 - Bridging the gap between research and policy. Springer. Peer reviewed |
Bouchenak, S., Chockler, G., Chockler, H., GHEORGHE, G., Santos, N., & Shraer, A. (2013). Verifying cloud services: present and future. ACM SIGOPS: Operating Systems Review, 47, 6-19. |
GHEORGHE, G., & Neuhaus, S. (2013). POSTER: Preserving Privacy and Accountability for Personal Devices [Poster presentation]. 20th ACM Conference on Computer and Communications Security, Berlin, Germany. |
Neuhaus, S., & GHEORGHE, G. (2013). POSTER: Critique of the CISSP Common Body of Knowledge of Cryptography [Poster presentation]. 20th ACM Conference on Computer and Communications Security. |
GHEORGHE, G., Neuhaus, S., Massacci, F., & Pretschner, A. (2009). GoCoMM: a governance and compliance maturity model. In GoCoMM: a governance and compliance maturity model. Peer reviewed |
Nair, S. K., Tanenbaum, A., GHEORGHE, G., & Crispo, B. (2008). Enforcing DRM policies across applications. In Proceedings of the 8th ACM workshop on Digital rights management, October 2008. Peer reviewed |