From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Optimizing search for malware by hashing smaller amounts of data., и . WorldCIS, стр. 112-117. IEEE, (2013)The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians., , и . SOUPS @ USENIX Security Symposium, стр. 31-46. USENIX Association, (2018)Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation., , , и . POLICY, стр. 118-125. IEEE Computer Society, (2009)Learning based access control in online social networks., , , , и . WWW, стр. 1179-1180. ACM, (2010)Proactive Role Discovery in Mediator-Free Environments., , и . Peer-to-Peer Computing, стр. 150-159. IEEE Computer Society, (2008)Semi-Supervised Policy Recommendation for Online Social Networks., и . ASONAM, стр. 360-367. IEEE Computer Society, (2012)A learning-based approach for SELinux policy optimization with type mining., , и . CSIIRW, стр. 70. ACM, (2010)Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications., и . PAC, стр. 206-207. IEEE, (2017)MasterBlaster: Identifying Influential Players in Botnet Transactions., , и . COMPSAC, стр. 413-419. IEEE Computer Society, (2011)Web services discovery in secure collaboration environments., , и . ACM Trans. Internet Techn., 8 (1): 5 (2007)