Niels A. Nijdam
Cited by
Cited by
Mapping emotion to color
NA Nijdam
Book Mapping emotion to color, 2-9, 2009
Ghost-safe-guarding home IoT environments with personalised real-time risk control
A Collen, NA Nijdam, J Augusto-Gonzalez, SK Katsikas, KM Giannoutakis, ...
Springer-Verlag Berlin, 2018
Using blockchains to strengthen the security of internet of things
CS Kouzinopoulos, G Spathoulas, KM Giannoutakis, K Votis, P Pandey, ...
Security in Computer and Information Sciences: First International ISCIS …, 2018
A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective
HA Abdulghani, NA Nijdam, A Collen, D Konstantas
Symmetry 11 (6), 774, 2019
Salsa dance learning evaluation and motion analysis in gamified virtual reality environment
S Senecal, NA Nijdam, A Aristidou, N Magnenat-Thalmann
Multimedia Tools and Applications 79, 24621-24643, 2020
A blockchain solution for enhancing cybersecurity defence of IoT
KM Giannoutakis, G Spathoulas, CK Filelis-Papadopoulos, A Collen, ...
2020 IEEE International Conference on Blockchain (Blockchain), 490-495, 2020
From internet of threats to internet of things: A cyber security architecture for smart homes
J Augusto-Gonzalez, A Collen, S Evangelatos, M Anagnostopoulos, ...
2019 IEEE 24th International Workshop on Computer Aided Modeling and Design …, 2019
Training guidance with KDD cup 1999 and NSL-KDD data sets of ANIDINR: Anomaly-based network intrusion detection system
BM Serinelli, A Collen, NA Nijdam
Procedia Computer Science 175, 560-565, 2020
Implementing a forms of consent smart contract on an IoT-based blockchain to promote user trust
CS Kouzinopoulos, KM Giannoutakis, K Votis, D Tzovaras, A Collen, ...
2018 Innovations in Intelligent Systems and Applications (INISTA), 1-6, 2018
The CaMeLi framework—a multimodal virtual companion for older adults
C Tsiourti, J Quintas, M Ben-Moussa, S Hanke, NA Nijdam, D Konstantas
Intelligent Systems and Applications: Extended and Selected Results from the …, 2018
A context-aware adaptive rendering system for user-centric pervasive computing environments
NA Nijdam, S Han, B Kevelham, N Magnenat-Thalmann
Melecon 2010-2010 15th IEEE Mediterranean Electrotechnical Conference, 790-795, 2010
On the analysis of open source datasets: validating IDS implementation for well-known and zero day attack detection
BM Serinelli, A Collen, NA Nijdam
Procedia Computer Science 191, 192-199, 2021
Rapid development of distributed applications using high-level communication support
M Lim, B Kevelham, N Nijdam, N Magnenat-Thalmann
Journal of Network and Computer Applications 34 (1), 172-182, 2011
Motion analysis and classification of salsa dance using music-related motion features
S Senecal, NA Nijdam, NM Thalmann
Proceedings of the 11th ACM SIGGRAPH Conference on Motion, Interaction and …, 2018
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments
M Benyahya, A Collen, S Kechagia, NA Nijdam
Computers & Security 122, 102904, 2022
Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in GHOST Smart Contracts
G Spathoulas, A Collen, P Pandey, NA Nijdam, S Katsikas, ...
2018 Innovations in Intelligent Systems and Applications (INISTA), 1-8, 2018
Towards automated threat based risk assessment for cyber security in smart homes
P Pandey, A Collen, N Nijdam, M Anagnostopoulos, S Katsikas, ...
Proceedings of the 18th European Conference on Cyber Warfare and Security …, 2019
Collaborative telemedicine for interactive multiuser segmentation of volumetric medical images
S Han, NA Nijdam, J Schmid, J Kim, N Magnenat-Thalmann
The Visual Computer 26, 639-648, 2010
Interactive segmentation of volumetric medical images for collaborative telemedicine
J Schmid, N Nijdam, S Han, J Kim, N Magnenat-Thalmann
Modelling the Physiological Human: 3D Physiological Human Workshop, 3DPH …, 2009
Can I Sleep Safely in My Smarthome? A Novel Framework on Automating Dynamic Risk Assessment in IoT Environments
A Collen, NA Nijdam
Electronics 11 (7), 1123, 2022
The system can't perform the operation now. Try again later.
Articles 1–20