Author of the publication

Static compliance checking beyond separation of duty constraints.

, , , and . Int. J. Embed. Syst., 10 (5): 423-436 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GHSCN: A Graph Neural Network-Based API Popularity Prediction Method in Service Ecosystem., , , , and . IEEE Access, (2020)A Computer Network Defense Policy Refinement Method., , , , and . ICoC, volume 401 of Communications in Computer and Information Science, page 122-133. Springer, (2013)An Evaluation Model of CNO Intelligence Information Confidence., , , , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 400-412. Springer, (2009)HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis., , , , and . IEEE Trans. Netw. Sci. Eng., 8 (4): 3257-3274 (2021)FedHGCDroid: An Adaptive Multi-Dimensional Federated Learning for Privacy-Preserving Android Malware Classification., , , and . Entropy, 24 (7): 919 (2022)Static Compliance Checking beyond Separation of Duty Constraints., , , and . 3PGCIC, page 171-178. IEEE Computer Society, (2014)Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for Network Survivability., , , , and . Web Intelligence, page 694-701. IEEE Computer Society, (2012)Design and Implementation of Bus Net Routing Algorithm., , , , and . CIS, page 1474-1478. IEEE Computer Society, (2011)The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation., , and . IEEE Communications Letters, 19 (7): 1169-1172 (2015)BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model., , , and . CoRR, (2023)