Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 13 of 13)
Clustering and Recommendation Techniques for Access Control Policy Management
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
EXPLORING VARIED APPROACHES FOR COUNTERING THE PRIVACY AND SECURITY RISKS OF THIRD-PARTY MOBILE APPLICATIONS
Evaluating Co-Creation In Collaborative Drawing Using Creative Thinking Modes
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
SYSTEMATIC POLICY ANALYSIS AND MANAGEMENT
User Centric Policy Management
User-centric secure cross-site interaction framework for online social networking services
Evaluating Risk Appeal Approaches Based on PMT Towards Making Secure Decisions
Towards Effective Third-Party Application Dialogs: Solutions for Improved Attention and Comprehension
Developing Privacy Enhancing Technology For DNA Data Sharing In Public Genealogy Platforms