Author of the publication

Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control.

, , , , , and . Future Gener. Comput. Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

REPLOT: REtrieving Profile Links On Twitter for malicious campaign discovery., , , , and . AI Commun., 29 (1): 107-122 (2016)Human-centered strategies for cyber-physical systems security., , and . EAI Endorsed Trans. Security Safety, 4 (14): e5 (2018)Rapid Anomaly Detection Using Integrated Prudence Analysis (IPA)., , , and . PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 137-141. Springer, (2018)Modelling the Efficacy of Auto-Internet Warnings to Reduce Demand for Child Exploitation Materials.. PAKDD (Workshops), volume 11154 of Lecture Notes in Computer Science, page 318-329. Springer, (2018)Young people, child pornography, and subcultural norms on the Internet., , , and . J. Assoc. Inf. Sci. Technol., 64 (5): 992-1000 (2013)Controlling information behaviour: the case for access control., and . Behav. Inf. Technol., 35 (4): 268-276 (2016)Automated measurement of attitudes towards social distancing using social media: A COVID-19 case study., , , , and . First Monday, (2020)The Maximum Degree & Diameter-Bounded Subgraph and its Applications., , , and . J. Math. Model. Algorithms, 11 (3): 249-268 (2012)A methodology for estimating the tangible cost of data breaches., and . J. Inf. Secur. Appl., 19 (6): 321-330 (2014)Automatically determining phishing campaigns using the USCAP methodology., , and . eCrime, page 1-8. IEEE, (2010)