Author of the publication

What Do People Expect from a Financial Awareness Platform? Insights from an Online Survey.

, , , , , , , , and . IFIN/ISEM@INSCI, volume 10078 of Lecture Notes in Computer Science, page 9-56. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Global Communications Newsletter., , , , , , , and . IEEE Communications Magazine, 53 (12): 1-4 (2015)ADLU: a novel anomaly detection and location-attribution algorithm for UWB wireless sensor networks., and . EURASIP J. Information Security, (2014)Fake Review Detection via Exploitation of Spam Indicators and Reviewer Behavior Characteristics., , and . SOFSEM, volume 10706 of Lecture Notes in Computer Science, page 581-595. Springer, (2018)Evaluating selfishness impact on MANETs., , and . TEMU, page 64-68. IEEE, (2014)Routing in Wireless Sensor Networks: An approach using Stackelberg games., and . WiMob, page 322-327. IEEE Computer Society, (2014)An energy-aware self-organizing clustering algorithm for UWB wireless sensor networks., , and . PIMRC, page 1-5. IEEE, (2008)MAC protocols for ultra-wideband ad hoc and sensor networking: A survey., , , and . ICUMT, page 834-841. IEEE, (2012)An in-depth study of asynchronous MAC protocols with Low Power Listening., , , and . ICUMT, page 790-795. IEEE, (2010)EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs., , , and . WMNC, page 103-109. IEEE, (2016)Applying classification techniques on temporal trace data for shaping student behavior models., , and . LAK, page 299-303. ACM, (2016)