From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Security and Privacy in Social Networks, , и . Encyclopedia of Information Science and Technology, Second ed., VII, IGI Global, Hershey, PA, (2008)A framework to enforce access control over data streams., , , и . ACM Trans. Inf. Syst. Secur., 13 (3): 28:1-28:31 (2010)Cyber Pandemics., и . IEEE Internet Comput., 27 (2): 5-6 (марта 2023)Securing XML data in third-party distribution systems., , и . CIKM, стр. 99-106. ACM, (2005)Enforcing access control in Web-based social networks., , и . ACM Trans. Inf. Syst. Secur., 13 (1): 6:1-6:38 (2009)Risk Assessment in Social Networks Based on User Anomalous Behaviors., , и . IEEE Trans. Dependable Secur. Comput., 15 (2): 295-308 (2018)A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks., , , и . CODASPY, стр. 51-62. ACM, (2011)Privacy-Preserving Sequential Publishing of Knowledge Graphs., , и . ICDE, стр. 2021-2026. IEEE, (2021)Privacy and Security Issues for Human Digital Twins., , и . TPS-ISA, стр. 1-9. IEEE, (2022)A Risk Assessment Mechanism for Android Apps., , и . SmartIoT, стр. 237-244. IEEE, (2021)