1. A systematic survey of self-protecting software systems;Eric;ACM Trans Auton Adapt Syst (TAAS),2014
2. Requirements-driven adaptive security: protecting variable assets at runtime;Mazeiar,2012
3. Run-time generation, transformation, and verification of access control models for self-protection;Christopher,2014
4. Rumpole: an introspective break-glass access control language;Srdjan;ACM Trans Inf Syst Secur(TISSEC),2014
5. Detecting web spams using evidence theory;Moitrayee,2018