Author:
Bradshaw J.,Carvalho M.,Diller D.,Johnson M.,Kulkarni S.,Lott J.,Sierhuis M.,Van Hoof R.,Uszok A.,Jeffers R.,Suri N.,Hayes P.,Burstein M.,Acquisti A.,Benyo B.,Breedy M.
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security Modeling of Autonomous Systems;ACM Computing Surveys;2020-09-30
2. Inferring Ontology Fragments from Semantic Role Typing of Lexical Variants;Requirements Engineering: Foundation for Software Quality;2018
3. Towards a Model of User-centered Privacy Preservation;Proceedings of the 12th International Conference on Availability, Reliability and Security;2017-08-29
4. Access control and the Resource Description Framework: A survey;Semantic Web;2016-12-06
5. Toward a framework for detecting privacy policy violations in android application code;Proceedings of the 38th International Conference on Software Engineering;2016-05-14