Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Event-Based Method for Detecting Trojan Horses in Mobile Devices., , , , and . MobiSec, volume 47 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 153-162. Springer, (2010)Trojan horses in mobile devices., , , , and . Comput. Sci. Inf. Syst., 7 (4): 813-822 (2010)The huggable: a new type of therapeutic robotic companion., , , , , , , , , and 1 other author(s). SIGGRAPH Sketches, page 14. ACM, (2006)A similarity measure between videos using alignment, graphical and speech features., , , and . Expert Syst. Appl., 39 (11): 10278-10282 (2012)A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services., , , , and . KSII Trans. Internet Inf. Syst., 5 (8): 1457-1471 (2011)The huggable: a therapeutic robotic companion for relational, affective touch., , , , , , , , , and 3 other author(s). SIGGRAPH Emerging Technologies, page 15. ACM, (2006)Online motion recognition using an accelerometer in a mobile device., , , and . Expert Syst. Appl., 39 (3): 2461-2465 (2012)SAR.IoT: Secured Augmented Reality for IoT Devices Management., , , , , and . Sensors, 21 (18): 6001 (2021)IndoorCare: Low-Cost Elderly Activity Monitoring System through Image Processing., , , , , , , and . Sensors, 21 (18): 6051 (2021)LECOMP: Low Energy COnsumption Mesh Protocol in WSN., , , and . ISAmI, volume 92 of Advances in Intelligent and Soft Computing, page 205-212. Springer, (2011)