Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Instructional Media Research: Past, Present, and Future. AV Communication Review, 19 (1): 5--18 (1971)Rational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks., and . HCI (6), volume 8009 of Lecture Notes in Computer Science, page 165-174. Springer, (2013)Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment., and . ICCDA, page 54-59. ACM, (2017)The ISDF Framework: Towards Secure Software Development., and . J. Inf. Process. Syst., 6 (1): 91-106 (2010)FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning., , , and . ICIOT, volume 10972 of Lecture Notes in Computer Science, page 121-133. Springer, (2018)RAAODV: a reputation-aware AODV for mobile ad hoc networks., and . ACM Southeast Regional Conference, page 6:1-6:6. ACM, (2014)Usablity and security trade-off: a design guideline., and . ACM Southeast Regional Conference, page 21:1-21:6. ACM, (2014)Generic Danger Detection for Mission Continuity., , , , and . NCA, page 102-107. IEEE Computer Society, (2009)Proactive reputation-based defense for MANETs using radial basis function neural networks., , , and . IJCNN, page 1-6. IEEE, (2010)Choice-Based Authentication: A Usable-Security Approach., , and . HCI (4), volume 8513 of Lecture Notes in Computer Science, page 114-124. Springer, (2014)