Author of the publication

Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.

, , , , and . MTD@CCS, page 39-49. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

dbling: Identifying extensions installed on encrypted web thin clients., , , and . Digit. Investig., (2016)Diagnosis of soybean bacterial blight progress stage based on deep learning in the context of data-deficient., , , , , , , , , and 3 other author(s). Comput. Electron. Agric., (September 2023)Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter., , , , , , , and . ASONAM, page 103-107. ACM, (2023)State-aware Network Access Management for Software-Defined Networks., , , , , , and . SACMAT, page 1-11. ACM, (2016)Optimization design of fragment-type filtering matching network for continuous inverse class-F power amplifier., , , , , , , and . IEICE Electron. Express, 19 (14): 20220043 (2022)DDoS family: A novel perspective for massive types of DDoS attacks., , , , , , , and . Comput. Secur., (March 2024)A Formal Analysis of the FIDO UAF Protocol., , , and . NDSS, The Internet Society, (2021)Game theoretic analysis of multiparty access control in online social networks., , , and . SACMAT, page 93-102. ACM, (2014)Federated Access Management for Collaborative Network Environments: Framework and Case Study., , , and . SACMAT, page 125-134. ACM, (2015)Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory., , , , , and . CCS, page 3636-3638. ACM, (2023)