Cited By
View all- Zhang SFong PVilela JSchulmann HLi N(2024)Mining Domain-Based PoliciesProceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy10.1145/3626232.3653265(403-414)Online publication date: 19-Jun-2024
- Bardhan S(2024)A Risk Assessment based RBAC using Attack Graphs to Mitigate Insider Threat during UAQ2024 IEEE 48th Annual Computers, Software, and Applications Conference (COMPSAC)10.1109/COMPSAC61105.2024.00190(1440-1443)Online publication date: 2-Jul-2024
- Alasow AJin PPerkowski M(2022)Quantum Algorithm for Variant Maximum SatisfiabilityEntropy10.3390/e2411161524:11(1615)Online publication date: 5-Nov-2022
- Show More Cited By