Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dynamic Transitions of States for Context-Sensitive Access Control Decision., , , , , and . WISE (1), volume 11233 of Lecture Notes in Computer Science, page 127-142. Springer, (2018)Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation., , and . Computing, 101 (7): 743-772 (2019)IoT streaming data integration from multiple sources., , , and . Computing, 102 (10): 2299-2329 (2020)ABC-RuleMiner: User behavioral rule-based machine learning method for context-aware intelligent services., and . J. Netw. Comput. Appl., (2020)Automated measurement of attitudes towards social distancing using social media: A COVID-19 case study., , , , and . First Monday, (2020)Towards a Framework for Acquisition and Analysis of Speeches to Identify Suspicious Contents through Machine Learning., , , , and . Complex., (2020)Dynamic user-centric access control for detection of ransomware attacks., , , , and . Comput. Secur., (2021)A Secure Mutual authentication approach to fog computing environment., , , and . Comput. Secur., (2021)RelBOSS: A Relationship-Aware Access Control Framework for Software Services., , , and . OTM Conferences, volume 8841 of Lecture Notes in Computer Science, page 258-276. Springer, (2014)ICAF: A Context-Aware Framework for Access Control., , and . ACISP, volume 7372 of Lecture Notes in Computer Science, page 442-449. Springer, (2012)