Your selections:
Graph representation of access controls for managing privacy, trust and security requirements
- Miller, Mirka, Skinner, Geoff
The rise of ransomware and emerging security challenges in the internet of things
- Yaqoob, Ibrar, Ahmed, Ejaz, Rehman, Muhammad, Ahmed, Abdelmuttlib, Imran, Muhammad
Are you sure you would like to clear your session, including search history and login status?