Author of the publication

Personalizing Context-Aware Access Control on Mobile Platforms.

, , and . CIC, page 107-116. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Mining Web Access Logs., and . ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, page 63-69. (2000)Secrecy outage of cooperative relay network with and without eavesdropper's direct link., , and . NCC, page 1-6. IEEE, (2017)A Reactive Service Composition Architecture for Pervasive Computing Environments., , , , and . PWC, volume 234 of IFIP Conference Proceedings, page 53-62. Kluwer, (2002)Volume 106 at Springer.Semantic analytics on social networks: experiences in addressing the problem of conflict of interest detection., , , , , , , , and . WWW, page 407-416. ACM, (2006)Query distribution estimation and predictive caching in mobile ad hoc networks., , , and . MobiDE, page 24-30. ACM, (2008)Two-stream indexing for spoken web search., , , , , , and . WWW (Companion Volume), page 503-512. ACM, (2011)@i seek 'fb.me': identifying users across multiple online social networks., , and . WWW (Companion Volume), page 1259-1268. International World Wide Web Conferences Steering Committee / ACM, (2013)Swoogle: a search and metadata engine for the semantic web., , , , , , , , and . CIKM, page 652-659. ACM, (2004)Phishing in an Academic Community: A Study of User Susceptibility and Behavior., , and . CoRR, (2018)Using DAML+OIL to classify intrusive behaviours., , , and . Knowl. Eng. Rev., 18 (3): 221-241 (2003)