Cited By
View all- Parkinson SKhan S(2022)A Survey on Empirical Security Analysis of Access-control Systems: A Real-world PerspectiveACM Computing Surveys10.1145/353370355:6(1-28)Online publication date: 7-Dec-2022
- Cotrini CCorinzia LWeghorn TBasin DCavallaro LKinder JWang XKatz J(2019)The Next 700 Policy MinersProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3354196(95-112)Online publication date: 6-Nov-2019
- Saenko IKotenko ITakadama K(2018)Genetic algorithms for role mining in critical infrastructure data spacesProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3205651.3208283(1688-1695)Online publication date: 6-Jul-2018
- Show More Cited By