Search Constraints
Search Results
Select an image to start the slideshow
Exploring Processes for Individuals with I/DD to Report Abuse
1 of 23
I.D.D. Abuse Reporting App: Design Features and Concepts
2 of 23
Mitigations for the Prevention of the Reporting of Abuse of People with Intellectual or Developmental Disorders
3 of 23
Designing an Authentication System for Augmented Reality Devices
4 of 23
Secure Key Agreement for Wearable Medical Devices
5 of 23
An Identification System for Head Mounted Displays
6 of 23
Authentication for Implantable Devices
7 of 23
Designing a Data-Driven Framework for Smart and Autonomous Freight Farming
8 of 23
Enhancing Plug and Play Capabilities in Body Area Network Protocols
9 of 23
Passive Biometric Authentication via Head Mounted Display using Ballistocardiography
10 of 23
Safety or Security: What do we Notice?
11 of 23
Safety or Security: What do we Notice?
12 of 23
SCREAM: Sensory Channel Remote Execution Attack Methods
13 of 23
Smart-phone-based Platform for Patient Medical Compliance
14 of 23
Wearable Honeypot
15 of 23
Wearable Honeypot
16 of 23
Wireless Bandwidth Aggregation for Internet Traffic
17 of 23
Understanding the Use of Electronic Communication
18 of 23
An Approach for Deliberate Non-Compliance Detection during Opioid Abuse Surveillance by a Wearable Biosensor
19 of 23
Detecting Data Manipulation Attacks on Physiological Sensor Measurements in Wearable Medical Systems
20 of 23
Ballistocardiography-based Authentication using Convolutional Neural Networks
21 of 23
Using Ballistocardiography to Perform Key Distribution in Wearable IoT Networks
22 of 23
Systematic Vulnerability Evaluation of Interoperable Medical Device System using Attack Trees
23 of 23