Author of the publication

High Level Design of a Home Autonomous System Based on Cyber Physical System Modeling.

, and . ICDCS Workshops, page 45-52. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison and Performance Analysis of Machine Learning Algorithms for the Prediction of Human Actions in a Smart Home Environment., and . ICCDA, page 54-59. ACM, (2017)Rational Interfaces for Effective Security Software: Polite Interaction Guidelines for Secondary Tasks., and . HCI (6), volume 8009 of Lecture Notes in Computer Science, page 165-174. Springer, (2013)Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation.. IEEE Secur. Priv., 5 (4): 65-67 (2007)The ISDF Framework: Towards Secure Software Development., and . J. Inf. Process. Syst., 6 (1): 91-106 (2010)FPGA Hardware Implementation of Smart Home Autonomous System Based on Deep Learning., , , and . ICIOT, volume 10972 of Lecture Notes in Computer Science, page 121-133. Springer, (2018)RAAODV: a reputation-aware AODV for mobile ad hoc networks., and . ACM Southeast Regional Conference, page 6:1-6:6. ACM, (2014)Usablity and security trade-off: a design guideline., and . ACM Southeast Regional Conference, page 21:1-21:6. ACM, (2014)Instructional Media Research: Past, Present, and Future. AV Communication Review, 19 (1): 5--18 (1971)Generic Danger Detection for Mission Continuity., , , , and . NCA, page 102-107. IEEE Computer Society, (2009)A Peer-to-Peer System for Small Group Collaboration., and . Web Technologies, Applications, and Services, page 123-128. IASTED/ACTA Press, (2005)