From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An approach for aspect-oriented use case modeling., и . EA@ICSE, стр. 27-34. ACM, (2008)Software Engineering for Privacy in-the-Large., и . ICSE (2), стр. 947-948. IEEE Computer Society, (2015)ISBN 978-1-4799-1934-5 (Vol. I + II ???).Do the Privacy Policies Reflect the Privacy Controls on Social Networks?, , и . SocialCom/PASSAT, стр. 1155-1158. IEEE Computer Society, (2011)Social Networking Privacy: Understanding the Disconnect from Policy to Controls., , и . Computer, 46 (6): 60-67 (2013)Schrödinger's security: opening the box on app developers' security rationale., , , , , , , и . ICSE, стр. 149-160. ACM, (2020)Privacy Requirements: Present & Future., , и . ICSE-SEIS, стр. 13-22. IEEE Computer Society, (2017)Modélisation orientée-aspects de systèmes de ligne de produits par des cas d'utilisations., и . L'OBJET, 14 (3): 59-73 (2008)A Method for Analysing Traceability between Privacy Policies and Privacy Controls of Online Social Networks., , и . APF, том 8319 из Lecture Notes in Computer Science, стр. 187-202. Springer, (2012)Hidden in Plain Sight: Obfuscated Strings Threatening Your Privacy., , , , , , и . AsiaCCS, стр. 694-707. ACM, (2020)"So if Mr Blue Head here clicks the link..." Risk Thinking in Cyber Security Decision Making., , , , , и . ACM Trans. Priv. Secur., 24 (1): 5:1-5:29 (2020)