Cited By
View all- Al Lail MPinto DAlmanza LSalazar FRizzi C(2024)Beyond Traditional Methods: Deep Learning with Data Augmentation for Robust Access Control2024 33rd International Conference on Computer Communications and Networks (ICCCN)10.1109/ICCCN61486.2024.10637533(1-6)Online publication date: 29-Jul-2024
- Zhu SZhang Y(2024)Probabilistic Access Policies with Automated Reasoning SupportComputer Aided Verification10.1007/978-3-031-65633-0_20(443-466)Online publication date: 24-Jul-2024
- Blundo CCimato SSiniscalchi L(2022)Heuristics for constrained role mining in the post-processing frameworkJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-021-03648-114:8(9925-9937)Online publication date: 25-Jan-2022
- Show More Cited By