From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Comparison Among Policy Editors for Attributed Based Access Control Model., , , , , и . ETAA@ESORICS, том 12515 из Lecture Notes in Computer Science, стр. 108-123. Springer, (2020)Enhancing Usage Control for Performance: An Architecture for Systems of Systems., , , , и . CyberICPS/SECPRE@ESORICS, том 11387 из Lecture Notes in Computer Science, стр. 69-84. Springer, (2018)Managing QoS in Smart Buildings Through Software Defined Network and Usage Control., , , и . PerCom Workshops, стр. 626-632. IEEE, (2019)Risk-aware Data Usage Control.. University of Pisa, Italy, (2021)Mobile App Interventions for Parkinson's Disease, Multiple Sclerosis and Stroke: A Systematic Literature Review., , , , , , , , , и 12 other автор(ы). Sensors, 23 (7): 3396 (апреля 2023)An Affective Multi-modal Conversational Agent for Non Intrusive Data Collection from Patients with Brain Diseases., , , , , , , и . CONVERSATIONS, том 13815 из Lecture Notes in Computer Science, стр. 134-149. Springer, (2022)Enhancing Usage Control for Performance: A Proposal for Systems of Systems (Research Poster)., , , , и . HPCS, стр. 1061-1062. IEEE, (2018)Phylogenetic Analysis for Ransomware Detection and Classification into Families., , , и . ICETE (2), стр. 732-737. SciTePress, (2018)Too Long, did not Enforce: A Qualitative Hierarchical Risk-Aware Data Usage Control Model for Complex Policies in Distributed Environments., , , и . CPSS@AsiaCCS, стр. 27-37. ACM, (2018)