共 50 条
- [41] A simple R-UAV permission-based distributed mutual exclusion in FANET Wireless Networks, 2022, 28 : 779 - 795
- [45] Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android 2012 PROCEEDINGS OF THE 27TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2012, : 274 - 277
- [46] Permission-based Analysis of Android Applications Using Categorization and Deep Learning Scheme ENGINEERING APPLICATION OF ARTIFICIAL INTELLIGENCE CONFERENCE 2018 (EAAIC 2018), 2019, 255
- [48] Injecting a Permission-based Delegation Model to Secure Web-based Workflow Systems ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 101 - 106
- [50] Trustless, Censorship-Resilient and Scalable Votings in the Permission-Based Blockchain Model EURO-PAR 2020: PARALLEL PROCESSING WORKSHOPS, 2021, 12480 : 54 - 65