Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Choice-Based Authentication: A Usable-Security Approach., , and . HCI (4), volume 8513 of Lecture Notes in Computer Science, page 114-124. Springer, (2014)A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks., , and . Inf. Secur. J. A Glob. Perspect., 17 (5&6): 267-277 (2008)Audio-Visual Communication Research. Journal of Educational Research, 49 (5): 321--330 (1956)On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems., and . SAINT, page 242-248. IEEE Computer Society, (2003)Proactive reputation-based defense for MANETs using radial basis function neural networks., , , and . IJCNN, page 1-6. IEEE, (2010)Rational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks., and . HCI (6), volume 8009 of Lecture Notes in Computer Science, page 165-174. Springer, (2013)FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning., , , and . ICIOT, volume 10972 of Lecture Notes in Computer Science, page 121-133. Springer, (2018)Generic Danger Detection for Mission Continuity., , , , and . NCA, page 102-107. IEEE Computer Society, (2009)Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment., and . ICCDA, page 54-59. ACM, (2017)The ISDF Framework: Towards Secure Software Development., and . J. Inf. Process. Syst., 6 (1): 91-106 (2010)