共 50 条
- [31] Measurement and Early Detection of Third-Party Application Abuse on Twitter WEB CONFERENCE 2019: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW 2019), 2019, : 448 - 458
- [32] Third-Party Authentication Using Secure-Engine 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
- [33] A Third-party Extension Support Framework Using Patterns 2015 22ND ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2015), 2015, : 198 - 205
- [34] Evaluating Third-Party Bad Neighborhood Blacklists for Spam Detection 2013 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2013), 2013, : 252 - 259
- [35] CHAL 47-Protecting your intellectual property against third party infringers and third party patents ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2006, 232
- [36] Toward Automatic Proof Generation for Information Flow Policies in Third-Party Hardware IP 2015 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2015, : 163 - 168
- [40] Measuring Personal Privacy Breaches Using Third-Party Trackers 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1615 - 1618