access control
http://www.yso.fi/onto/yso/p15780
Related publications and other outputs
- Exploring Azure Active Directory Attack Surface : Enumerating Authentication Methods with Open-Source Intelligence Tools (2022) Syynimaa, Nestori; A4; OA
- Family Matters : Abusing Family Refresh Tokens to Gain Unauthorised Access to Microsoft Cloud Services Exploratory Study of Azure Active Directory Family of Client IDs (2022) Cobb, Ryan; et al.; A4; OA
- Nanovised Control Flow Attestation (2022) Ben Yehuda, Raz; et al.; A1; OA
- The emergence of liminal cyberspace : challenges for the ontological work in cybersecurity (2022) Vuorinen, Jukka; et al.; A4; OA; 978-989-8704-40-5
- Disadvantaged by Disability : Examining the Accessibility of Cyber Security (2021) Furnell, Steven; et al.; A4; 978-3-030-78092-0
- Efficient DLP-visor : An efficient hypervisor-based DLP (2021) Kiperberg, Michael; et al.; A4; 978-1-7281-9586-5
- Applications of hypervisors in security (2019) Leon, Roee Shimon; G5; OA; 978-951-39-7854-9
- Who Would you Like to be Today? : Impersonation by Fake Azure Active Directory Identity Federation (2018) Syynimaa, Nestori; A4
- Anomaly detection approach to keystroke dynamics based user authentication (2017) Ivannikova, Elena; et al.; A4; OA
- System for Executing Encrypted Java Programs (2017) Kiperberg, Michael; et al.; A4