From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards enforcing on-the-fly policies in BYOD environments., , , и . IAS, стр. 61-65. IEEE, (2013)Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , и . NetSoft, стр. 254-256. IEEE, (2019)MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention., , , и . IEEE Trans. Dependable Secur. Comput., 15 (1): 83-97 (2018)Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project., , , и . IEEE Secur. Priv., 20 (1): 33-44 (2022)Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV., , , , и . STM, том 10547 из Lecture Notes in Computer Science, стр. 118-133. Springer, (2017)A Multi-criteria-Based Evaluation of Android Applications., , , , , и . INTRUST, том 7711 из Lecture Notes in Computer Science, стр. 67-82. Springer, (2012)Fast and Effective Clustering of Spam Emails Based on Structural Similarity., , , , и . FPS, том 9482 из Lecture Notes in Computer Science, стр. 195-211. Springer, (2015)Phylogenetic Analysis for Ransomware Detection and Classification into Families., , , и . ICETE (2), стр. 732-737. SciTePress, (2018)Enhancing Android permission through usage control: a BYOD use-case., , и . SAC, стр. 2049-2056. ACM, (2016)Towards General Scheme for Data Sharing Agreements Empowering Privacy-Preserving Data Analysis of Structured CTI., , и . CyberICPS/SECPRE@ESORICS, том 11387 из Lecture Notes in Computer Science, стр. 192-212. Springer, (2018)