共 50 条
- [21] How to Define the User's Tolerance of Response Time in Using Mobile Applications 2016 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2016, : 281 - 285
- [23] Cloud Security Distributary Set (CSDS): A Policy-Based Framework to Define Multi-Level Security Structure in Clouds INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 74 - 79
- [24] Policy based security management in 3G mobile networks ICWN'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2003, : 554 - 562
- [25] Security Policy based Device Management for Supporting Various Mobile OS 2015 SECOND INTERNATIONAL CONFERENCE ON COMPUTING TECHNOLOGY AND INFORMATION MANAGEMENT (ICCTIM), 2015, : 156 - 161
- [26] Intuitive security policy configuration in mobile devices using context profiling PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012), 2012, : 471 - 480
- [27] Context-aware security policy agent for mobile Internet services' Intelligence in Communication Systems, 2005, 190 : 249 - 259
- [28] The Time for Translation of Mobile Brain and Body Imaging to People With Stroke Is Now PHYSICAL THERAPY, 2021, 101 (06):
- [29] LEGAL POLICY AND SECURITY POLICY AS ELEMENTS OF SECURITY POLICY ARCHIVES EUROPEENNES DE SOCIOLOGIE, 1984, 25 (01): : 147 - 166