Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral Classes., , , and . FPS, volume 10128 of Lecture Notes in Computer Science, page 3-19. Springer, (2016)Exploiting If This Then That and Usage Control obligations for Smart Home security and management., , , , , and . Concurr. Comput. Pract. Exp., (2022)A Comparison Among Policy Editors for Attributed Based Access Control Model., , , , , and . ETAA@ESORICS, volume 12515 of Lecture Notes in Computer Science, page 108-123. Springer, (2020)Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV., , , , and . STM, volume 10547 of Lecture Notes in Computer Science, page 118-133. Springer, (2017)CANDY: A Social Engineering Attack to Leak Information from Infotainment System., , , and . VTC Spring, page 1-5. IEEE, (2018)Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , and . NetSoft, page 254-256. IEEE, (2019)Using IFTTT to Express and Enforce UCON Obligations., , , , and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 213-231. Springer, (2019)Improving MQTT by Inclusion of Usage Control., , , , and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 545-560. Springer, (2017)DataPAL: Data Protection and Authorization Lifecycle framework., , , , , , and . SEEDA-CECNSM, page 1-8. IEEE, (2021)Privacy Preserving Distributed Computation of Private Attributes for Collaborative Privacy Aware Usage Control Systems., , , , and . SMARTCOMP, page 315-320. IEEE Computer Society, (2018)