Cited By
View all- Bonakdarpour BDeshmukh JPajic M(2018)Opportunities and Challenges in Monitoring Cyber-Physical Systems SecurityLeveraging Applications of Formal Methods, Verification and Validation. Industrial Practice10.1007/978-3-030-03427-6_2(9-18)Online publication date: 5-Nov-2018
- Li YGai KMing ZZhao HQiu M(2016)Intercrossed Access Controls for Secure Financial Services on Multimedia Big Data in Cloud SystemsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/297857512:4s(1-18)Online publication date: 15-Sep-2016
- Cho JChan KAdali S(2015)A Survey on Trust ModelingACM Computing Surveys10.1145/281559548:2(1-40)Online publication date: 12-Oct-2015
- Show More Cited By