Search for persons
X
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
1
Mitigating Privilege Misuse in Access Control through Anoma..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
2
A Comprehensive Study on Third-Party User Tracking in Mobil..:
, In:
?
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing ,
4
Towards A High-interaction Physics-aware Honeynet for Indus..:
, In:
?
Proceedings of the 18th International Conference on Availability, Reliability and Security ,
5
HoneyICS: A High-interaction Physics-aware Honeynet for Ind..:
, In:
?
Data and Applications Security and Privacy XXXV; Lecture Notes in Computer Science ,
6
Verifiable Hierarchical Key Assignment Schemes:
, In:
?
Proceedings of the 15th International Conference on Availability, Reliability and Security ,
8
A real world study on employees' susceptibility to phishing..:
, In:
?
Lecture Notes in Computer Science; Emerging Technologies for Authorization and Authentication ,
9
IFTTT Privacy Checker:
, In:
?
Living in the Internet of Things (IoT 2019) ,
13
Towards an integrated privacy protection framework for IoT:..:
, In:
?
2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) ,
14