Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semi-supervised policy recommendation for online social networks., , and . Soc. Netw. Anal. Min., 6 (1): 61:1-61:12 (2016)Security and Privacy in Social Networks., , and . IEEE Internet Comput., 15 (3): 10-12 (2011)Adaptive Reordering and Clustering-Based Framework for Efficient XACML Policy Evaluation., , , and . IEEE Trans. Serv. Comput., 4 (4): 300-313 (2011)Web services discovery in secure collaboration environments., , and . ACM Trans. Internet Techn., 8 (1): 5 (2007)Optimizing search for malware by hashing smaller amounts of data., and . WorldCIS, page 112-117. IEEE, (2013)The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians., , and . SOUPS @ USENIX Security Symposium, page 31-46. USENIX Association, (2018)Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation., , , and . POLICY, page 118-125. IEEE Computer Society, (2009)Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications., and . PAC, page 206-207. IEEE, (2017)Semi-Supervised Policy Recommendation for Online Social Networks., and . ASONAM, page 360-367. IEEE Computer Society, (2012)Proactive Role Discovery in Mediator-Free Environments., , and . Peer-to-Peer Computing, page 150-159. IEEE Computer Society, (2008)