厨师 发表于 2025-3-23 11:36:40

http://reply.papertrans.cn/24/2339/233834/233834_11.png

Commentary 发表于 2025-3-23 15:30:21

http://reply.papertrans.cn/24/2339/233834/233834_12.png

dithiolethione 发表于 2025-3-23 21:42:25

P2Onto: Making Privacy Policies Transparentacy policy, and generation of rules for privacy risks assessment based on the proposed ontology. The applicability of the proposed approach and ontology is demonstrated on the case study for IoT device.

支形吊灯 发表于 2025-3-23 23:53:58

Conference proceedings 2020hysical Systems, CyberICPS 2020, the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2020, and the Third International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2020, held in Guildford, UK, in September 2020 in conjunction with the 25th Eur

阻碍 发表于 2025-3-24 05:47:00

https://doi.org/10.1007/978-3-030-64330-0access control; artificial intelligence; authentication; communication systems; computer crime; privacy; c

Mitigate 发表于 2025-3-24 10:28:30

978-3-030-64329-4Springer Nature Switzerland AG 2020

Hiatal-Hernia 发表于 2025-3-24 14:26:45

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/c/image/233834.jpg

V切开 发表于 2025-3-24 17:45:23

http://reply.papertrans.cn/24/2339/233834/233834_18.png

Armada 发表于 2025-3-24 20:26:46

http://reply.papertrans.cn/24/2339/233834/233834_19.png

deficiency 发表于 2025-3-24 23:20:50

http://reply.papertrans.cn/24/2339/233834/233834_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Computer Security; ESORICS 2020 Interna Sokratis Katsikas,Frédéric Cuppens,Steven Furnell Conference proceedings 2020 Springer Nature Switz