Author of the publication

Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment.

, and . ICCDA, page 54-59. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Choice-Based Authentication: A Usable-Security Approach., , and . HCI (4), volume 8513 of Lecture Notes in Computer Science, page 114-124. Springer, (2014)Audio-Visual Communication Research. Journal of Educational Research, 49 (5): 321--330 (1956)A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks., , and . Inf. Secur. J. A Glob. Perspect., 17 (5&6): 267-277 (2008)On the Self-similarity of Synthetic Traffic for the Evaluation of Intrusion Detection Systems., and . SAINT, page 242-248. IEEE Computer Society, (2003)Proactive reputation-based defense for MANETs using radial basis function neural networks., , , and . IJCNN, page 1-6. IEEE, (2010)FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning., , , and . ICIOT, volume 10972 of Lecture Notes in Computer Science, page 121-133. Springer, (2018)RAAODV: a reputation-aware AODV for mobile ad hoc networks., and . ACM Southeast Regional Conference, page 6:1-6:6. ACM, (2014)Usablity and security trade-off: a design guideline., and . ACM Southeast Regional Conference, page 21:1-21:6. ACM, (2014)The ISDF Framework: Towards Secure Software Development., and . J. Inf. Process. Syst., 6 (1): 91-106 (2010)Rational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks., and . HCI (6), volume 8009 of Lecture Notes in Computer Science, page 165-174. Springer, (2013)