共 50 条
- [31] 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13792 LNCS
- [32] On-the-fly inlining of dynamic dependency monitors for secure information flow Lect. Notes Comput. Sci., (55-69):
- [33] Flow based interpretation of access control: Detection of illegal information flows Lect. Notes Comput. Sci., (72-86):
- [34] Experimental Security Analysis of Sensitive Data Access by Browser Extensions WWW 2024 - Proceedings of the ACM Web Conference, : 1283 - 1294
- [35] Information Systems Security Countermeasures: An Assessment of Older Workers in Indonesian Small and Medium-Sized Businesses ProQuest Dissertations and Theses Global, 2022,
- [36] Information Security Theory and Practice: Security of Mobile and Cyber-Physical Systems - 7th IFIP WG 11.2 International Workshop, WISTP 2013, Proceedings Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7886 LNCS
- [40] Evaluation of Jif and Joana as information flow analyzers in a model-driven approach Katkalov, K. (kuzman.katkalov@informatik.uni-augsburg.de), 2013, Springer Verlag (7731 LNCS):