Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital Forensics | 0 | 0.34 | 2021 |
Design And Evaluation Of Cofelet-Based Approaches For Cyber Security Learning And Training | 0 | 0.34 | 2021 |
Evaluation Of Hacklearn Cofelet Game User Experience For Cybersecurity Education | 0 | 0.34 | 2021 |
Ontology-Based Modelling For Cyber Security E-Learning And Training | 0 | 0.34 | 2019 |
Conceptual Framework for Developing Cyber Security Serious Games | 0 | 0.34 | 2019 |
Conceptualization of Game Based Approaches for Learning and Training on Cyber Security. | 0 | 0.34 | 2017 |
Conceptual analysis of cyber security education based on live competitions. | 0 | 0.34 | 2017 |
Access Control Issues In Utilizing Fog Computing For Transport Infrastructure | 5 | 0.47 | 2015 |
Information infrastructure risk prediction through platform vulnerability analysis | 3 | 0.38 | 2015 |
Security policy verification for multi-domains in cloud systems | 11 | 0.64 | 2014 |
GARS: Real-time system for identification, assessment and control of cyber grooming attacks. | 1 | 0.35 | 2014 |
A method to calculate social networking hazard probability in definite time. | 1 | 0.36 | 2013 |
Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems | 1 | 0.35 | 2013 |
A Methodology for the Development and Verification of Access Control Systems in Cloud Computing. | 1 | 0.37 | 2013 |
Utilizing Survival Analysis for Modeling Child Hazards of Social Networking. | 0 | 0.34 | 2012 |
Towards Use-Based Usage Control | 0 | 0.34 | 2012 |
Artemis: Protection from Sexual Exploitation Attacks via SMS | 2 | 0.52 | 2012 |
Quantifying and measuring metadata completeness. | 7 | 0.67 | 2012 |
domRBAC: An access control model for modern collaborative systems | 9 | 0.58 | 2012 |
Challenging issues of UCON in modern computing environments | 1 | 0.36 | 2012 |
A Use-Based Approach for Enhancing UCON. | 0 | 0.34 | 2012 |
Towards Colored Petri Net Modeling of Expanded C-TMAC. | 0 | 0.34 | 2011 |
Deploying Privacy Improved RBAC in Web Information Systems | 0 | 0.34 | 2011 |
A methodology for evaluating web-based educational systems using statistical multidimensional analysis | 2 | 0.49 | 2011 |
X-EDCA: A cross-layer MAC-centric mechanism for efficient multimedia transmission in congested IEEE 802.11e infrastructure networks | 3 | 0.41 | 2011 |
Role-based secure inter-operation and resource usage management in mobile grid systems | 1 | 0.36 | 2011 |
An ICT Security Management Framework | 0 | 0.34 | 2010 |
A Study on User Behavior and Acceptance of Electronic Banking Services. | 0 | 0.34 | 2010 |
Towards Differentiated Utilization of Attribute Mutability for Access Control in Ubiquitous Computing. | 2 | 0.42 | 2010 |
Surveying Privacy Leaks Through Online Social Network. | 6 | 0.74 | 2010 |
A Fine-Grained Metric System for the Completeness of Metadata. | 1 | 0.36 | 2009 |
A Foundation for Defining Security Requirements in Grid Computing | 1 | 0.36 | 2009 |
Evolving Challenges In Information Security Compliance. | 0 | 0.34 | 2009 |
On the Definition of Access Control Requirements for Grid and Cloud Computing Systems. | 4 | 0.42 | 2009 |
How E-Learning Systems May Benefit From Ontologies And Recommendation Methods To Efficiently Personalise Resources | 3 | 0.56 | 2009 |
A conceptual framework for metadata quality assessment | 18 | 1.32 | 2008 |
Supporting dynamic administration of RBAC in web-based collaborative applications during run-time. | 1 | 0.36 | 2008 |
Identifying Inference Rules for Automatic Metadata Generation from Pre-existing Metadata of Related Resources | 0 | 0.34 | 2007 |
Implementation and Evaluation of TCP Enhancements over Satellite Links | 0 | 0.34 | 2006 |
Web Services And Multimedia In M-Business Applications: Opportunities And Concerns | 2 | 0.37 | 2006 |
Healthcare teams over the Internet: programming a certificate-based approach | 6 | 0.74 | 2003 |
Towards Dynamically Administered Role-Based Access Control | 6 | 0.48 | 2003 |
Flexible team-based access control using contexts | 133 | 6.71 | 2001 |
A Secure Payment System for Electronic Commerce | 4 | 0.43 | 1999 |
eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features | 4 | 1.24 | 1999 |
Design of Secure Distributed Medical Database Systems | 1 | 0.45 | 1998 |