From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The TweetBeat of the City: Microblogging Used for Discovering Behavioural Patterns during the MWC2012., , , и . CitiSens, том 7685 из Lecture Notes in Computer Science, стр. 43-56. Springer, (2012)Geolocation-Based Trust for Vanet's Privacy., , и . IAS, стр. 287-290. IEEE Computer Society, (2008)Trustworthy communications in Vehicular Ad Hoc NETworks., , , и . WF-IoT, стр. 247-252. IEEE Computer Society, (2014)CARMA: Composable-Adaptive Resource Management Authorization for ubiquitous environments., , , и . IAS, стр. 234-239. IEEE, (2010)Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences., , , и . DPM/CBT@ESORICS, том 10436 из Lecture Notes in Computer Science, стр. 107-123. Springer, (2017)Challenges in Detecting Privacy Revealing Information in Unstructured Text., , и . PrivOn@ISWC, том 1750 из CEUR Workshop Proceedings, CEUR-WS.org, (2016)A Policy-based Authorization Scheme for Resource Sharing in Pervasive Environments., , и . ISSE, стр. 271-279. Vieweg+Teubner, (2010)Personalised Privacy by Default Preferences - Experiment and Analysis., , , и . ICISSP, стр. 53-62. SciTePress, (2016)pQUANT: A User-Centered Privacy Risk Analysis Framework., , , и . CRiSIS, том 12026 из Lecture Notes in Computer Science, стр. 3-16. Springer, (2019)Benchmarking IP blacklists for financial botnet detection., , , , и . IAS, стр. 62-67. IEEE, (2010)