From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards enforcing on-the-fly policies in BYOD environments., , , и . IAS, стр. 61-65. IEEE, (2013)Demonstration of secure slicing using ETSI MANO enhanced with Usage Control Capability., , , , , , , и . NetSoft, стр. 254-256. IEEE, (2019)MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention., , , и . IEEE Trans. Dependable Secur. Comput., 15 (1): 83-97 (2018)Preserving Privacy in the Globalized Smart Home: The SIFIS-Home Project., , , и . IEEE Secur. Priv., 20 (1): 33-44 (2022)Ask a(n)droid to tell you the odds: probabilistic security-by-contract for mobile devices., , , и . Soft Comput., 25 (3): 2295-2314 (2021)Cybsersecurity Issues in Robotics., , , , , , и . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (3): 1-28 (2021)Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV., , , , и . STM, том 10547 из Lecture Notes in Computer Science, стр. 118-133. Springer, (2017)A Multi-criteria-Based Evaluation of Android Applications., , , , , и . INTRUST, том 7711 из Lecture Notes in Computer Science, стр. 67-82. Springer, (2012)Fast and Effective Clustering of Spam Emails Based on Structural Similarity., , , , и . FPS, том 9482 из Lecture Notes in Computer Science, стр. 195-211. Springer, (2015)Improving security in industry 4.0 by extending OPC-UA with usage control., , , и . ARES, стр. 96:1-96:10. ACM, (2020)