1. An overview of risk estimation techniques in risk-based access control for the Internet of Things;Atlam,2017
2. Beyond zero trust: trust is a vulnerability;Campbell;Computer,2020
3. Droidvecdeep: Android malware detection based on word2vec and deep belief network;Chen;KSII Trans. Int. Inf. Syst.,2019
4. Fuzzy multi-level security: an experiment on quantified risk-adaptive access control;Cheng,2007