Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A learning analytics tool for supporting teacher decision., , and . IISA, page 1-3. IEEE, (2015)MyCrowdCharger: Towards a crowd sourced based application for energy sharing between smartphones., and . IISA, page 1-4. IEEE, (2016)The All Seeing Eye: Web to App Intercommunication for Session Fingerprinting in Android., and . SpaCCS, volume 10656 of Lecture Notes in Computer Science, page 93-107. Springer, (2017)User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in Smartphones., , , and . ICISSP (Revised Selected Papers), volume 1221 of Communications in Computer and Information Science, page 250-271. Springer, (2019)Unravelling Security Issues of Runtime Permissions in Android., and . J. Hardw. Syst. Secur., 3 (1): 45-63 (2019)Mobile application providing accessible routes for people with mobility impairments., and . IISA, page 1-5. IEEE, (2017)Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants., , , and . CoRR, (2023)Intelligent and adaptive tutoring through a social network for higher education., , , and . New Rev. Hypermedia Multim., 26 (3-4): 138-167 (2020)Backups and the right to be forgotten in the GDPR: An uneasy relationship., , , , and . Comput. Law Secur. Rev., 34 (6): 1247-1257 (2018)Smart Tourism-The Impact of Artificial Intelligence and Blockchain, , , and . Intelligent Systems Reference Library Springer, (2024)