Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An approach for user identification for head-mounted displays., , , and . ISWC, page 143-146. ACM, (2015)Physiological value-based efficient usable security solutions for body sensor networks., and . ACM Trans. Sens. Networks, 6 (4): 31:1-31:36 (2010)A Machine Learning-based Approach for Collaborative Non-Adherence Detection during Opioid Abuse Surveillance using a Wearable Biosensor., , , , and . HEALTHINF, page 310-318. SciTePress, (2019)978-989-758-353-7.Link spamming Wikipedia for profit., , , , and . CEAS, page 152-161. ACM, (2011)PEES: physiology-based end-to-end security for mHealth., , and . Wireless Health, page 2:1-2:8. ACM, (2013)Detecting Signal Injection Attack-Based Morphological Alterations of ECG Measurements., and . DCOSS, page 127-135. IEEE Computer Society, (2016)Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks., and . NSS, volume 9408 of Lecture Notes in Computer Science, page 531-539. Springer, (2015)A honeypot system for wearable networks., , , , and . Sarnoff Symposium, page 199-201. IEEE, (2016)A New Authentication Approach for People with Upper Extremity Impairment., , , , and . PerCom Workshops, page 1-6. IEEE, (2020)Detecting malicious morphological alterations of ECG signals in body sensor networks., and . IPSN, page 342-343. ACM, (2015)