Denis Trček
#108,204
Most Influential Person Now
Slovene computer scientist and university professor
Denis Trček's AcademicInfluence.com Rankings
Denis Trčekcomputer-science Degrees
Computer Science
#10177
World Rank
#10673
Historical Rank
Database
#9754
World Rank
#10325
Historical Rank

Download Badge
Computer Science
Denis Trček's Degrees
- PhD Computer Science University of Ljubljana
- Masters Computer Science University of Ljubljana
- Bachelors Computer Science University of Ljubljana
Similar Degrees You Can Earn
Why Is Denis Trček Influential?
(Suggest an Edit or Addition)According to Wikipedia, Denis Trček is a Slovenian computer scientist and university professor. Trček graduated in 1988 at the Faculty of Electrical Engineering at the University of Ljubljana where he received in 1995 also his Ph.D. degree in communication security.
Denis Trček's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Qualitative trust modeling in SOA (2009) (56)
- Managing information systems security and privacy (2005) (54)
- Decision making matters: A better way to evaluate trust models (2013) (48)
- A formal apparatus for modeling trust in computing environments (2009) (46)
- Information systems security and human behaviour (2007) (43)
- Towards Run-Time Verification of Adaptive Security for IoT in eHealth (2014) (26)
- Advanced Framework for Digital Forensic Technologies and Procedures * (2010) (25)
- Hard and soft security provisioning for computationally weak pervasive computing systems in E-health (2013) (24)
- Trust Management in the Pervasive Computing Era (2011) (21)
- Slovene smart card and IP based health-care information system infrastructure (2001) (19)
- Using systems dynamics for human resources management in information systems security (2006) (16)
- Towards trust management standardization (2004) (15)
- Predicting Exploitations of Information Systems Vulnerabilities Through Attackers’ Characteristics (2017) (14)
- Security policy conceptual modeling and formalization for networked information systems (2000) (14)
- Security policy management for networked information systems (2000) (11)
- Formal language for security services base modelling and analysis (1995) (9)
- Security Models: Refocusing on the Human Factor (2006) (9)
- Lightweight protocols and privacy for all-in-silicon objects (2013) (8)
- An Integrative Architecture for a Sensor-Supported Trust Management System (2012) (8)
- Using System Dynamics for Managing Risks in Information Systems (2008) (8)
- Wireless Sensors Grouping Proofs for Medical Care and Ambient Assisted-Living Deployment (2016) (8)
- Pricing and QoS (2003) (7)
- Trust Management Methodologies for the Web (2011) (7)
- Mobility-aware cross-layer routing for peer-to-peer networks (2019) (7)
- QADE: a novel trust and reputation model for handling false trust values in e–commerce environments with subjectivity consideration (2015) (7)
- Security Metrics Foundations for Computer Security (2010) (6)
- Formal apparatus for measurement of lightweight protocols (2009) (6)
- U-Sphere: Strengthening scalable flat-name routing for decentralized networks (2015) (5)
- Driving Digital Transformation Through e-Government (2019) (5)
- A Brief Overview of Trust and Reputation over Various Domains (2018) (5)
- Cultural heritage preservation by using blockchain technologies (2022) (4)
- Merging data sources based on semantics, contexts and trust (2010) (4)
- Qualitative trust model with a configurable method to aggregate ordinal data (2014) (4)
- Ergonomie trust management in pervasive computing environments — Qualitative assessment dynamics (2010) (4)
- MAC Based Lightweight Protocols for Strong Authentication and Key Exchange (2005) (4)
- Computational Trust Management, QAD, and Its Applications (2014) (3)
- Managing trust in services oriented architectures (2008) (3)
- System Dynamics Based Risk Management for Distributed Information Systems (2009) (3)
- CERTIFICATION INFRASTRUCTURE REFERENCE PROCEDURES (1999) (3)
- The evaluation of Qualitative Assessment Dynamics (QAD) methodology for managing trust in pervasive computing environments (2011) (3)
- Proper Incentives for Proper IT Security Management - A System Dynamics Approach (2017) (3)
- Computationally Supported Quantitative Risk Management for Information Systems (2011) (3)
- Orde ab Chao Method for Disruptive Innovations Creation (With COVID-19 Pandemic Case Application) (2021) (2)
- Using GMB methodology on a large crisis model (2010) (2)
- Security and Privacy in RFID Based Wireless Networks (2008) (2)
- A methodology for sustainable monitoring of micro locations at remote, hard-to-access and unsafe places (2015) (2)
- A METHODOLOGY FOR PROVISION OF SUSTAINABLE INFORMATION SYSTEMS SECURITY (2012) (2)
- Driving Information Systems Security through Innovations—First Indications (2014) (2)
- Trust and Reputation Management Systems (2018) (2)
- Minimising the risk of electronic document forgery (1998) (2)
- E-Government 4.0: Managing APIs as Facilitators for Digital Transformation (2022) (2)
- Next-Generation Communication Systems for PPDR: the SALUS Perspective (2015) (2)
- A Tool for Support of Key Distribution and Validity Certificate Check in Global Directory Service (1994) (2)
- APIs and emerging economy - driving digital transformation through e-government (2019) (2)
- Qualitative Assessment Dynamics - Complementing Trust Methods for Decision Making (2014) (2)
- sonicLamination - from a concept to artistic binding of visual and sound domains by using advanced technology (2019) (2)
- E-Business Systems Security for Intelligent Enterprise (2005) (1)
- HeriLedger—A New Generation of Blockchains for Cultural Heritage Preservation (2022) (1)
- 3D Digital Preservation, Presentation, and Interpretation of Wooden Cultural Heritage on the Example of Sculptures of the FormaViva Kostanjevica Na Krki Collection (2022) (1)
- Certificates handling and their support within X.500 system (1993) (1)
- Trust Management for Pervasive Computing Environments (2009) (1)
- Trust Management in E-business Systems - From Taxonomy to Trust Engine Architecture (2002) (1)
- Anomaly Detection in IoT Networks: From Architectures to Machine Learning Transparency (2021) (1)
- E-Business Systems Security in Intelligent Organizations (2009) (1)
- COMPUTATIONAL TRUST MANAGEMENT IN ECONOMICS PHENOMENA RESEARCH (2018) (1)
- Qualitative trust dynamics algebra for trust management in pervasive computing environments (2009) (1)
- Deployment of Trust Management System in Environment of e-Commerce (2012) (1)
- Security policy space definition and structuring (1996) (1)
- Computational Trust and Reputation Management (2018) (1)
- Application of PKI in Health Care - Needs, Ambitions, Prospects (2003) (1)
- Smart Structures for Cost Effective Cultural Heritage Preservation (2015) (0)
- A Systematic Approach for WBAN Security Based on Wireless Networked Moving Objects (2013) (0)
- Qualitative trust model with a configurable method to aggregate ordinal data (2013) (0)
- Trust Management by Computer Simulation: Towards a Fair, Responsible and Sustainable Economy (2014) (0)
- Towards Quantitative Risk Management for Next Generation Networks (2012) (0)
- Adaptive Safety for Internet of Things in e-Health (2022) (0)
- Trust management - from pervasive computing environments to mathematical economy and sociology (2011) (0)
- Mobile Code Security in Contemporary Information Systems -Past, Present and Trends (2011) (0)
- Certification Authorities in a Global Network - Procedures and Guidelines for a Public Key Infrastructure (1997) (0)
- Techno-Economics in Communications and Media: Looking Ahead into Selected Key Aspects (2009) (0)
- Qualitative Assessment Dynamics: QAD (2013) (0)
- Proceedings of the 2011 international conference on Computers and computing (2011) (0)
- Trust Management Methodology and Agents Simulations Framework for Conflict Research (2023) (0)
- Trust Managementfor Pervasive Computing Environments (2010) (0)
- The Graphical Interface for Secure Mail (1995) (0)
- Qualitative Assessment Dynamics For Trust Management in e-Business Environments (2011) (0)
- Trust and Reputation Systems: Conclusions (2018) (0)
- Understanding the Importance of Proper Incentives for Critical Infrastructures Management - How System Dynamics Can Help (2016) (0)
- Mollitia: Toward Standardization of Resilience Provisioning in IoT/CPS Structures (2021) (0)
- Plenary lecture I: managing trust in services oriented architectures (2008) (0)
- Chapter 6 — Pricing and QoS — (2003) (0)
- Proceedings of the 2011 international conference on Applied & computational mathematics (2011) (0)
- Slovenian national health insurance card: The next step (1999) (0)
- Plenary lecture 1: qualitative judgment dynamics for trust management in pervasive computing environments (2009) (0)
- Provably Unclonable Functions for Future Internet Security Provisioning (2016) (0)
- An Implementation Roadmap (2018) (0)
- Cruxes for visual domain sonification in digital arts (2021) (0)
- Proceedings of the 10th WSEAS international conference on Telecommunications and informatics and microelectronics, nanoelectronics, optoelectronics, and WSEAS international conference on Signal processing (2011) (0)
- Agent-oriented Engineering of Trust Management Systems (2012) (0)
- Anticipated Uses of the Presented Tools (2018) (0)
- Plenary lecture 1: trust management in pervasive computing environments - from cyber environments to mathematical economy and sociology (2011) (0)
- Trust formalization - from taxonomy to modeling and simulation framework (2004) (0)
This paper list is powered by the following services:
Other Resources About Denis Trček
What Schools Are Affiliated With Denis Trček?
Denis Trček is affiliated with the following schools: