Author of the publication

A New Distributed Chinese Wall Security Policy Model.

, , and . J. Digit. Forensics Secur. Law, 11 (4): 149-168 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering Based on Sequential Multi-Objective Games., , and . DaWaK, volume 8646 of Lecture Notes in Computer Science, page 369-381. Springer, (2014)Trust2Vec: Large-Scale IoT Trust Management System Based on Signed Network Embeddings., , , , , and . IEEE Internet Things J., 10 (1): 553-562 (2023)Customer churn prediction in telecommunications., , and . Expert Syst. Appl., 39 (1): 1414-1425 (2012)Using E-Reputation for Sentiment Analysis: Twitter as a Case Study., , and . Int. J. Cloud Appl. Comput., 11 (2): 32-47 (2021)Data analytics for crop management: a big data view., and . J. Big Data, 9 (1): 123 (2022)Winter Wheat Crop Yield Prediction on Multiple Heterogeneous Datasets using Machine Learning., , and . CoRR, (2023)Data Privacy in Its Three Forms - A Systematic Review., and . FDSE (CCIS Volume), volume 1306 of Communications in Computer and Information Science, page 425-433. Springer, (2020)Multi-objective Clustering Algorithm with Parallel Games., and . OCTA, page 1-7. IEEE, (2020)Feature Selection Parallel Technique for Remotely Sensed Imagery Classification., , , and . ICCSA (2), volume 7972 of Lecture Notes in Computer Science, page 623-634. Springer, (2013)Automatic multi-objective clustering based on game theory., , and . Expert Syst. Appl., (2017)