Author of the publication

Runtime verification using policy-based approach to control information flow.

. Int. J. Secur. Networks, 8 (4): 212-230 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bytecode instrumentation mechanism for monitoring mobile application information flow.. Int. J. Secur. Networks, 10 (3): 191-206 (2015)Preserving Privacy of Integrated E-Government Information: Architecture Approach., , and . MENACOMM, page 1-5. IEEE, (2019)Proposing New Mobile Learning (M-Learning) Adoption Model for Higher Education Providers., , , and . IMCL, volume 725 of Advances in Intelligent Systems and Computing, page 69-76. Springer, (2017)Human Factors Considerations in Mobile Learning Management Systems., , , and . IMCL, volume 725 of Advances in Intelligent Systems and Computing, page 372-383. Springer, (2017)CUPA: A Configurable User Privacy Approach For Android Mobile Application., , and . CSCloud/EdgeCom, page 216-221. IEEE, (2020)Assisted-Fog-Based Framework for IoT-Based Healthcare Data Preservation., and . Int. J. Cloud Appl. Comput., 11 (2): 1-16 (2021)Neural network approach to predict mobile learning acceptance., , and . Educ. Inf. Technol., 23 (5): 1805-1824 (2018)Development and validation of Mobile Learning Acceptance Measure., , and . Interact. Learn. Environ., 25 (7): 847-858 (2017)Runtime verification using policy-based approach to control information flow.. Int. J. Secur. Networks, 8 (4): 212-230 (2013)Mobile learning key influencing factors adoption based on analytic hierarchy process., , and . IJIDS, 9 (4): 387-404 (2017)