Author of the publication

Influencing Participant Behavior Through a Notification-Based Recommendation System.

, , , , , , , , and . PERSUASIVE, volume 10809 of Lecture Notes in Computer Science, page 113-119. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influencing Participant Behavior Through a Notification-Based Recommendation System., , , , , , , , and . PERSUASIVE, volume 10809 of Lecture Notes in Computer Science, page 113-119. Springer, (2018)A New Antispoofing Approach for Biometric Devices., , , and . IEEE Trans. Biomed. Circuits Syst., 2 (4): 328-337 (2008)Investigation of Cyber Attacks on a Water Distribution System., , , and . CoRR, (2019)Hardware-Software Co-Design for Whitening using Zero-Phase Component Analysis., , and . iSES, page 36-41. IEEE, (2022)A Robust Passive Islanding Detection Technique With Zero-Non-Detection Zone for Inverter-Interfaced Distributed Generation., , , , and . IEEE Access, (2022)A Real-Time Voting Process That Redirects Facial Recognition., , , , , and . IC3I, page 1534-1537. IEEE, (2022)A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system., , and . Int. J. Crit. Infrastructure Prot., (2019)Deriving invariant checkers for critical infrastructure using axiomatic design principles., , , , and . Cybersecur., 4 (1): 6 (2021)Mitigating Adversarial Attacks on Data-Driven Invariant Checkers for Cyber-Physical Systems., , , , and . IEEE Trans. Dependable Secur. Comput., 20 (4): 3378-3391 (July 2023)A review of methodologies for class-based storage location assignment in a warehouse., , and . Int. J. Adv. Oper. Manag., 2 (3/4): 274-291 (2010)