Author of the publication

A Policy Model and Framework for Context-Aware Access Control to Information Resources†.

, , , , , and . Comput. J., 62 (5): 670-705 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Controlling astroturfing on the internet: a survey on detection techniques and research challenges., , , and . IJWGS, 15 (2): 139-158 (2019)Context-Aware Access Control with Imprecise Context Characterization Through a Combined Fuzzy Logic and Ontology-Based Approach., , , , and . OTM Conferences (1), volume 10573 of Lecture Notes in Computer Science, page 132-153. Springer, (2017)Context-aware access control with imprecise context characterization for cloud-based data resources., , , , and . Future Gener. Comput. Syst., (2019)COVID-19 Rumor Detection Using Psycho-Linguistic Features., , and . IEEE Access, (2022)Network Traffic Analysis for Threat Detection in the Internet of Things., , , , , , , and . IEEE Internet Things Mag., 3 (4): 40-45 (2020)Special Issue "Security Threats and Countermeasures in Cyber-Physical Systems"., , , , and . J. Sens. Actuator Networks, 10 (3): 54 (2021)Towards Developing a Framework to Analyze the Qualities of the University Websites., , , , , and . Comput., 10 (5): 57 (2021)Detection of Harassment Type of Cyberbullying: A Dictionary of Approach Words and Its Impact., , and . Secur. Commun. Networks, (2021)Trust Modeling for Blockchain-Based Wearable Data Market., , , , , , and . CloudCom, page 411-417. IEEE, (2019)A Survey on Mining Program-Graph Features for Malware Analysis., , , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 220-236. Springer, (2014)