From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes., , , и . FPS, том 10128 из Lecture Notes in Computer Science, стр. 3-19. Springer, (2016)Exploiting If This Then That and Usage Control obligations for Smart Home security and management., , , , , и . Concurr. Comput. Pract. Exp., (2022)Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV., , , , и . STM, том 10547 из Lecture Notes in Computer Science, стр. 118-133. Springer, (2017)CANDY: A Social Engineering Attack to Leak Information from Infotainment System., , , и . VTC Spring, стр. 1-5. IEEE, (2018)A Comparison Among Policy Editors for Attributed Based Access Control Model., , , , , и . ETAA@ESORICS, том 12515 из Lecture Notes in Computer Science, стр. 108-123. Springer, (2020)Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , и . NetSoft, стр. 254-256. IEEE, (2019)Using IFTTT to Express and Enforce UCON Obligations., , , , и . ISPEC, том 11879 из Lecture Notes in Computer Science, стр. 213-231. Springer, (2019)Improving MQTT by Inclusion of Usage Control., , , , и . SpaCCS, том 10656 из Lecture Notes in Computer Science, стр. 545-560. Springer, (2017)Enhancing Security in ETSI Open Source MANO with Usage Control Capability., , , , , , , и . IM, стр. 25-29. IFIP, (2019)DataPAL: Data Protection and Authorization Lifecycle framework., , , , , , и . SEEDA-CECNSM, стр. 1-8. IEEE, (2021)