Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Models and Methods for the Analysis of the Diffusion of Skills in Social Networks., , and . OR, page 475-481. Springer, (2015)Coordination and Security on the Internet., and . Coordination of Internet Agents: Models, Technologies, and Applications, Springer, (2001)Building Mobile Agent Applications in HiMAT., , and . PDSE, page 174-181. IEEE Computer Society, (1999)Supporting location-based conditions in access control policies., , , , and . AsiaCCS, page 212-222. ACM, (2006)Access Control in Location-Based Services., , , and . Privacy in Location-Based Applications, volume 5599 of Lecture Notes in Computer Science, page 106-126. Springer, (2009)Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research., , and . ARES, page 67:1-67:10. ACM, (2019)The Effect of Security Education and Expertise on Security Assessments: the Case of Software Vulnerabilities., , , and . CoRR, (2018)The Unknown of the Pandemic: An Agent-Based Model of Final Phase Risks., and . J. Artif. Soc. Soc. Simul., (2020)Mobile Agents Integrity for Electronic Commerce Applications., , , and . Inf. Syst., 24 (6): 519-533 (1999)Improving Hearing Healthcare with Big Data Analytics of Real-Time Hearing Aid Data., , , , and . SERVICES, page 307-313. IEEE, (2019)