Securing AI Agent Execution Authors: Christoph Bühler, Matteo Biagiola, Luca Di Grazia, Guido Salvaneschi | Published: 2025-10-24 | Updated: 2025-10-29 Indirect Prompt InjectionModel Extraction AttackDynamic Access Control 2025.10.24 2025.10.31 Literature Database
Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures Authors: Sina Ahmadi | Published: 2025-01-10 Zero TrustUser Activity AnalysisDynamic Access Control 2025.01.10 2025.05.27 Literature Database
Android Private Compute Core Architecture Authors: Eugenio Marchiori, Sarah de Haas, Sergey Volnov, Ronnie Falcon, Roxanne Pinto, Marco Zamarato | Published: 2022-09-21 | Updated: 2022-09-22 Privacy ProtectionPrivacy TechniqueDynamic Access Control 2022.09.21 2025.05.28 Literature Database
Machine Learning in Access Control: A Taxonomy and Survey Authors: Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu | Published: 2022-07-04 Dynamic Access ControlMachine Learning ApplicationFeature Selection Method 2022.07.04 2025.05.28 Literature Database
Fast Authentication and Progressive Authorization in Large-Scale IoT: How to Leverage AI for Security Enhancement? Authors: He Fang, Angie Qi, Xianbin Wang | Published: 2019-07-28 Security AnalysisUser Authentication SystemDynamic Access Control 2019.07.28 2025.05.28 Literature Database