Author of the publication

Impact Analysis of Organizational Structure of Group Companies on Privacy Policies.

, , , , and . WPES@CCS, page 159-165. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System., , , , , and . AsiaJCIS, page 48-54. IEEE Computer Society, (2017)Impact Analysis of Organizational Structure of Group Companies on Privacy Policies., , , , and . WPES@CCS, page 159-165. ACM, (2023)Generic Unpacking Method Based on Detecting Original Entry Point., , and . ICONIP (1), volume 8226 of Lecture Notes in Computer Science, page 593-600. Springer, (2013)Money Talks: Detection of Disposable Phishing Websites by Analyzing Its Building Costs., , and . TPS-ISA, page 97-106. IEEE, (2022)Analysis of Privacy Compliance by Classifying Multiple Policies on the Web., , , and . COMPSAC, page 1734-1741. IEEE, (2022)Account Discovery: Identifying Web3 SNS Accounts at Risk of De-anonymization., , , , , and . SAC, page 259-268. ACM, (2024)Fake News Detection via Biased User Profiles in Social Networking Sites., , , , , , and . WI/IAT, page 136-145. ACM, (2021)Investigations of Top-Level Domain Name Collisions in Blockchain Naming Services., , , and . WWW, page 2926-2935. ACM, (2024)Multi-query Verifiable PIR and Its Application., , , , , and . CANS (2), volume 14906 of Lecture Notes in Computer Science, page 166-190. Springer, (2024)