Personensuche
X
?
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies ,
1
WiP: Enhancing the Comprehension of XACML Policies:
, In:
?
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies ,
4
A Bargaining-Game Framework for Multi-Party Access Control:
, In:
?
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems ,
5
The Influence of Human Factors on the Intention to Report P..:
, In:
?
Formal Techniques for Distributed Objects, Components, and Systems; Lecture Notes in Computer Science ,
6
Impact Analysis of Coordinated Cyber-Physical Attacks via S..:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
7
ICS Honeypot Interactions: A Latitudinal Study:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
8
Data Sharing in Social Networks:
, In:
?
Foundations and Practice of Security; Lecture Notes in Computer Science ,
9
A Decision-Support Tool for Experimentation on Zero-Hour Ph..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
10
A Comprehensive Study on Third-Party User Tracking in Mobil..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
11
Mitigating Privilege Misuse in Access Control through Anoma..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
12
Towards Obfuscation of Programmable Logic Controllers:
, In:
?
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies ,
13
Privacy-Preserving Multi-Party Access Control for Third-Par..:
, In:
?
2023 IEEE/ACM 20th International Conference on Mining Software Repositories (MSR) ,
14
Investigating the Resolution of Vulnerable Dependencies wit..:
, In:
?
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing ,
15