Author of the publication

Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading.

, , , , , and . ACM Trans. Priv. Secur., 23 (2): 8:1-8:27 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CRESCENT+: a self-protecting framework for reliable composite web service delivery., , , and . Iran J. Comput. Sci., 1 (2): 65-87 (2018)BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning., , , , and . CoRR, (2024)Privacy Preserving Release of Mobile Sensor Data., , , , , and . CoRR, (2022)Analysing Security and Privacy Threats in the Lockdown Periods of COVID-19 Pandemic: Twitter Dataset Case Study., , , and . CoRR, (2022)Assessment Criteria for Trust Models in Cloud Computing., , , , and . GreenCom/iThings/CPScom, page 254-261. IEEE, (2013)Towards Automatic Annotation and Detection of Fake News., , , , , and . LCN, page 1-9. IEEE, (2023)Touch and You're Trapp(ck)ed: Quantifying the Uniqueness of Touch Gestures for Tracking., , , and . Proc. Priv. Enhancing Technol., 2018 (2): 122-142 (2018)EACF: extensible access control framework for cloud environments., , , and . Ann. des Télécommunications, 72 (5-6): 307-323 (2017)Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading., , , , , and . ACM Trans. Priv. Secur., 23 (2): 8:1-8:27 (2020)Don't Be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19., , , and . IEEE Access, (2023)