Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SIMADL: Simulated Activities of Daily Living Dataset., , , and . Data, 3 (2): 11 (2018)Video analysis for Yellow Box Junction violation: Requirements, challenges and solutions., , and . ISC2, page 1-7. IEEE, (2016)Spectral-360: A Physics-Based Technique for Change Detection., , and . CVPR Workshops, page 405-408. IEEE Computer Society, (2014)A self-aware paradigm for autonomous architectural systems within the Internet of Things., , , and . Int. J. Parallel Emergent Distributed Syst., 32 (Supplemet): S15-S25 (2017)Autoencoders: A Low Cost Anomaly Detection Method for Computer Network Data Streams., , and . ICCBDC, page 58-62. ACM, (2020)HTM Based Anomaly Detecting Model for Traffic Congestion., , , and . ICCBDC, page 97-101. ACM, (2020)Exploring the Adoption of Physical Security Controls in Smartphones., , , , and . HCI (22), volume 9190 of Lecture Notes in Computer Science, page 287-298. Springer, (2015)SIMCD: SIMulated crowd data for anomaly detection and prediction., , , , and . Expert Syst. Appl., (2022)OpenSHS: Open Smart Home Simulator., , , , and . Sensors, 17 (5): 1003 (2017)Reviews in Online Data Stream and Active Learning for Cyber Intrusion Detection - A Systematic Literature Review., , and . FMEC, page 1-6. IEEE, (2021)