Author of the publication

Detecting Vulnerabilities in Android Applications using Event Sequences.

, , and . QRS, page 159-166. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Future directions in role-based access control., and . ACM Workshop on Role-Based Access Control, ACM, (1995)The NIST model for role-based access control: towards a unified standard., , and . ACM Workshop on Role-Based Access Control, page 47-63. ACM, (2000)A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet., , and . ACM Trans. Inf. Syst. Secur., 2 (1): 34-64 (1999)Proposed NIST standard for role-based access control., , , , and . ACM Trans. Inf. Syst. Secur., 4 (3): 224-274 (2001)A Survey of Binary Covering Arrays., , , , and . Electron. J. Comb., (2011)RBAC Standard Rationale: Comments on Ä Critique of the ANSI Standard on Role-Based Access Control"., , and . IEEE Secur. Priv., 5 (6): 51-53 (2007)Security or Privacy: Can You Have Both?, , and . Computer, 53 (9): 20-30 (2020)A quantum cryptographic protocol with detection of compromised server.. Quantum Inf. Comput., 5 (7): 551-560 (2005)Combinatorial Test Generation for Multiple Input Models With Shared Parameters., , , , , , and . IEEE Trans. Software Eng., 48 (7): 2606-2628 (2022)Correction to: Factorials Experiments, Covering Arrays, and Combinatorial Testing., , , and . Math. Comput. Sci., 15 (4): 741 (2021)