Author of the publication

Design, implementation, and assessment of a usable multi-biometric continuous authentication system.

, , , and . Int. J. Crit. Comput. Based Syst., 9 (3): 215-247 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Safety-aware metrics for object detectors in autonomous driving., and . CoRR, (2022)Design, implementation, and assessment of a usable multi-biometric continuous authentication system., , , and . Int. J. Crit. Comput. Based Syst., 9 (3): 215-247 (2019)On trustworthy measurements when testing dependable systems: a discussion and experiences., and . Int. J. Crit. Comput. Based Syst., 6 (2): 154-170 (2015)Identification of critical situations via Event Processing and Event Trust Analysis., , , , , and . Knowl. Inf. Syst., 52 (1): 147-178 (2017)RGB Cameras Failures and Their Effects in Autonomous Driving Applications., and . IEEE Trans. Dependable Secur. Comput., 20 (4): 2731-2745 (July 2023)Evaluation of Anomaly Detection Algorithms Made Easy with RELOAD., , and . ISSRE, page 446-455. IEEE, (2019)Anomaly Detectors for Self-Aware Edge and IoT Devices., , , , and . QRS, page 24-35. IEEE, (2023)Challenging Anomaly Detection in Complex Dynamic Systems., , and . SRDS, page 213-214. IEEE Computer Society, (2016)On the impact of emergent properties on SoS security., , , and . SoSE, page 1-6. IEEE, (2016)On Algorithms Selection for Unsupervised Anomaly Detection., , and . PRDC, page 279-288. IEEE, (2018)