From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Future directions in role-based access control., и . ACM Workshop on Role-Based Access Control, ACM, (1995)The NIST model for role-based access control: towards a unified standard., , и . ACM Workshop on Role-Based Access Control, стр. 47-63. ACM, (2000)Correction to: Factorials Experiments, Covering Arrays, and Combinatorial Testing., , , и . Math. Comput. Sci., 15 (4): 741 (2021)Security or Privacy: Can You Have Both?, , и . Computer, 53 (9): 20-30 (2020)Combinatorial and MC/DC Coverage Levels of Random Testing., , , и . QRS Companion, стр. 61-68. IEEE, (2017)Detecting Vulnerabilities in Android Applications using Event Sequences., , и . QRS, стр. 159-166. IEEE, (2019)Measuring Combinatorial Coverage at Adobe., , , , , и . ICST Workshops, стр. 194-197. IEEE, (2019)A Combinatorial Approach to Explaining Image Classifiers., , , и . ICST Workshops, стр. 35-43. IEEE, (2021)Combinatorially XSSing Web Application Firewalls., , , , , и . ICST Workshops, стр. 85-94. IEEE, (2021)Combination Frequency Differencing for Identifying Design Weaknesses in Physical Unclonable Functions., , , , и . ICST Workshops, стр. 110-117. IEEE, (2022)