Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Watermarking Relational Databases Using Optimization-Based Techniques., , and . IEEE Trans. Knowl. Data Eng., 20 (1): 116-129 (2008)The Listening Patterns to System Events by Benign and Malicious Android Apps., and . CIC, page 546-553. IEEE Computer Society, (2016)Seniors' Media Preference for Receiving Internet Security Information: A Pilot Study., , and . CoRR, (2019)Mobile Users as Advertisers: User Perceptions of Product Sensitivity, Exposure, and Public Influence., , and . MUM, page 253-264. ACM, (2018)Access control for online social networks third party applications., , , and . Computers & Security, 31 (8): 897-911 (2012)Bio-inspired Approach to Thwart Against Insider Threats: An Access Control Policy Regulation Framework., , , and . BICT, volume 289 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 39-57. Springer, (2019)Enabling Cross-Site Content Sharing between Social Networks., , and . SocialCom/PASSAT, page 493-496. IEEE Computer Society, (2011)User Centric Policy Management in Online Social Networks., , , , and . POLICY, page 9-13. IEEE Computer Society, (2010)PERMITME: integrating android permissioning support in the IDE., and . ETX, page 15-20. ACM, (2014)Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology., , and . ARES, page 35:1-35:6. ACM, (2017)