Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A secure architecture design based on application isolation, code minimization and randomization., , and . CNS, page 423-429. IEEE, (2013)A formal proximity model for RBAC systems., , and . CollaborateCom, page 1-10. ICST / IEEE, (2012)Marlin: Mitigating Code Reuse Attacks Using Code Randomization., , , and . IEEE Trans. Dependable Sec. Comput., 12 (3): 326-337 (2015)Misinformation in Social Networks: Analyzing Twitter During Crisis Events., and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Characterizing Pedophile Conversations on the Internet using Online Grooming, , and . CoRR, (2012)Semantic approach to automating management of big data privacy policies., , , , , and . BigData, page 482-491. IEEE Computer Society, (2016)Marlin: making it harder to fish for gadgets., , , and . ACM Conference on Computer and Communications Security, page 1016-1018. ACM, (2012)PeerSense: Who is near you?, , , , and . PerCom Workshops, page 516-518. IEEE Computer Society, (2012)Conference Rubric Development for STEM Librarians’ Publications, , , , , , , and . Science & Technology Libraries, 41 (4): 432–439 (May 2022)A formal proximity model for RBAC systems., , and . Computers & Security, (2014)