Do (microtargeted) deepfakes have real effects on political attitudes? T Dobber, N Metoui, D Trilling, N Helberger, C De Vreese The International Journal of Press/Politics 26 (1), 69-91, 2021 | 213 | 2021 |
Recommenders with a mission: assessing diversity in news recommendations S Vrijenhoek, M Kaya, N Metoui, J Möller, D Odijk, N Helberger Proceedings of the 2021 conference on human information interaction and …, 2021 | 94 | 2021 |
DeM-CoD: novel access-control-based cash on delivery mechanism for decentralized marketplace XS Ha, HT Le, N Metoui, N Duong-Trung 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 53 | 2020 |
Risk-based privacy-aware information disclosure A Armando, M Bezzi, N Metoui, A Sabetta International Journal of Secure Software Engineering (IJSSE) 6 (2), 70-89, 2015 | 24 | 2015 |
Risk-aware information disclosure A Armando, M Bezzi, N Metoui, A Sabetta International Workshop on Data Privacy Management, 266-276, 2014 | 21 | 2014 |
Balancing trust and risk in access control A Armando, M Bezzi, F Di Cerbo, N Metoui On the Move to Meaningful Internet Systems: OTM 2015 Conferences …, 2015 | 18 | 2015 |
News won’t find me? Exploring inequalities in social media news use with tracking data L Merten, N Metoui, M Makhortykh, D Trilling, J Moeller International Journal of Communication 16, 1127-1147, 2022 | 17 | 2022 |
(Tar) getting you: The use of online political targeted messages on Facebook S Kruikemeier, S Vermeer, N Metoui, T Dobber, B Zarouali Big Data & Society 9 (2), 20539517221089626, 2022 | 14 | 2022 |
Risk-based privacy-aware access control for threat detection systems N Metoui, M Bezzi, A Armando Transactions on Large-Scale Data-and Knowledge-Centered Systems XXXVI …, 2017 | 12 | 2017 |
Differential privacy based access control N Metoui, M Bezzi On the Move to Meaningful Internet Systems: OTM 2016 Conferences …, 2016 | 12 | 2016 |
Trust and risk-based access control for privacy preserving threat detection systems N Metoui, M Bezzi, A Armando Future Data and Security Engineering: Third International Conference, FDSE …, 2016 | 11 | 2016 |
EPIC: a methodology for evaluating privacy violation risk in cybersecurity systems S Mascetti, N Metoui, A Lanzi, C Bettini Transactions on Data Privacy 11 (3), 239-277, 2018 | 8 | 2018 |
Privacy-aware risk-based access control systems N Metoui University of Trento, 2018 | 6 | 2018 |
Risk-Based Privacy-Aware Information Disclosure A Armando, M Bezzi, N Metoui, A Sabetta Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and …, 2019 | 1 | 2019 |
(Tar) getting you: The use of online political targeted messages on Facebook B Zarouali, T Dobber, N Metoui, S Vermeer, S Kruikemeier | | 2022 |
Protecting the bytes of the past: Information security and digital-born cultural heritage M Makhortykh, N Metoui | | 2019 |
News won’t find me? Exploring potential digital inequalities in social media news use L Merten, N Metoui, M Makhortykh, D Trilling, J Moeller | | 2019 |
Protecting past and future choices: Identifying and evaluating functional vulnerabilities in recommender systems N Metoui, M Makhortykh | | 2019 |
When Digital Manuscripts Burn: Information Security and Digital Heritage in Eastern Europe M Makhortykh, N Metoui | | 2019 |