Author of the publication

Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies.

, , , and . SACMAT, page 131-144. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies., , , and . SACMAT, page 131-144. ACM, (2020)HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems., , , , , , and . CCS, page 279-291. ACM, (2020)EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems., , , and . SmartGridComm, page 1-6. IEEE, (2018)No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones., , and . MobiHoc, page 522-527. ACM, (2023)Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies., , , , and . SACMAT, page 195-206. ACM, (2019)ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems., , , and . MSCPES@CPSIoTWeek, page 1-6. IEEE, (2019)The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS., , , and . CHASE, page 94-99. ACM / IEEE, (2018)Random Test Data Generation for Java Classes Annotated with JML Specifications., and . Software Engineering Research and Practice, page 385-391. CSREA Press, (2007)SoK: Security of Programmable Logic Controllers., , , , and . CoRR, (2024)DyPolDroid: Protecting Against Permission-Abuse Attacks in Android., , , , , , and . Inf. Syst. Frontiers, 25 (2): 529-548 (April 2023)