Author:
Wickramaarachchi Guneshi T.,Qardaji Wahbeh H.,Li Ninghui
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQ;2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC);2024-07-02
2. Mining Domain-Based Policies;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19
3. Quantum Algorithm for Variant Maximum Satisfiability;Entropy;2022-11-05
4. Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis;ACM Transactions on Privacy and Security;2021-08-31
5. Chapter 24. Maximum Satisfiabiliy;Frontiers in Artificial Intelligence and Applications;2021-02-02