From post

Extraction and Accumulation of Identity Attributes from the Internet of Things.

, и . Open Identity Summit, том P-312 из LNI, стр. 179-192. Gesellschaft für Informatik e.V., (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Improving Phishing Detection with the Grey Wolf Optimizer., , и . ICEIC, стр. 1-6. IEEE, (2022)Modelling privacy harms of compromised personal medical data - beyond data breach., и . ARES, стр. 133:1-133:9. ACM, (2022)Identity Management as a target in cyberwar.. Open Identity Summit, том P-305 из LNI, стр. 61-70. Gesellschaft für Informatik e.V., (2020)Identification collapse - contingency in Identity Management.. Open Identity Summit, том P-305 из LNI, стр. 15-26. Gesellschaft für Informatik e.V., (2020)Extraction and Accumulation of Identity Attributes from the Internet of Things., и . Open Identity Summit, том P-312 из LNI, стр. 179-192. Gesellschaft für Informatik e.V., (2021)An Overview of Artificial Intelligence Used in Malware., , и . NAIS, том 1650 из Communications in Computer and Information Science, стр. 41-51. Springer, (2022)Aktuelle Hinderungsgründe für den kommerziellen Erfolg von Location-Based-Service-Angeboten., и . MCTA, том P-59 из LNI, стр. 143-156. GI, (2005)Security and privacy engineering for corporate use of social community platforms.. GI-Jahrestagung, том P-192 из LNI, стр. 416. GI, (2011)App-generated digital identities extracted through Android permission-based data access - a survey of app privacy., и . Sicherheit, том P-301 из LNI, стр. 15-28. Gesellschaft für Informatik e.V., (2020)Towards AI-powered Cybersecurity Attack Modeling with Simulation Tools: Review of Attack Simulators., и . 3PGCIC, том 571 из Lecture Notes in Networks and Systems, стр. 249-257. Springer, (2022)