default search action
Niels A. Nijdam
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Teri Lenard, Anastasija Collen, Meriem Benyahya, Niels Alexander Nijdam, Béla Genge:
Exploring Trust Modeling and Management Techniques in the Context of Distributed Wireless Networks: A Literature Review. IEEE Access 11: 106803-106832 (2023) - [j9]Hezam Akram Abdulghani, Anastasija Collen, Niels Alexander Nijdam:
Guidance Framework for Developing IoT-Enabled Systems' Cybersecurity. Sensors 23(8): 4174 (2023) - [c19]Meriem Benyahya, Teri Lenard, Anastasija Collen, Niels Alexander Nijdam:
A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles. ARES 2023: 99:1-99:10 - [c18]Teri Lenard, Anastasija Collen, Niels A. Nijdam, Béla Genge:
A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform Module. EuroS&P Workshops 2023: 329-335 - [c17]Teri Lenard, Béla Genge, Anastasija Collen, Niels A. Nijdam:
LOKI-2: An Improved Lightweight Cryptographic Key Distribution Protocol for Automotive Systems. ICCP 2023: 187-194 - 2022
- [j8]Hezam Akram Abdulghani, Niels Alexander Nijdam, Dimitri Konstantas:
Analysis on Security and Privacy Guidelines: RFID-Based IoT Applications. IEEE Access 10: 131528-131554 (2022) - [j7]Meriem Benyahya, Anastasija Collen, Sotiria Kechagia, Niels Alexander Nijdam:
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments. Comput. Secur. 122: 102904 (2022) - [j6]Anastasija Collen, Ioan-Cosmin Szanto, Meriem Benyahya, Béla Genge, Niels Alexander Nijdam:
Integrating Human Factors in the Visualisation of Usable Transparency for Dynamic Risk Assessment. Inf. 13(7): 340 (2022) - 2021
- [c16]Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam:
On the analysis of open source datasets: validating IDS implementation for well-known and zero day attack detection. FNC/MobiSPC 2021: 192-199 - 2020
- [j5]Simon Senecal, Niels A. Nijdam, Andreas Aristidou, Nadia Magnenat-Thalmann:
Salsa dance learning evaluation and motion analysis in gamified virtual reality environment. Multim. Tools Appl. 79(33-34): 24621-24643 (2020) - [c15]Konstantinos M. Giannoutakis, Georgios P. Spathoulas, C. K. Filelis-Papadopoulos, Anastasija Collen, Marios Anagnostopoulos, Konstantinos Votis, Niels A. Nijdam:
A Blockchain Solution for Enhancing Cybersecurity Defence of IoT. Blockchain 2020: 490-495 - [c14]Benedetto Marco Serinelli, Anastasija Collen, Niels Alexander Nijdam:
Training Guidance with KDD Cup 1999 and NSL-KDD Data Sets of ANIDINR: Anomaly-Based Network Intrusion Detection System. FNC/MobiSPC 2020: 560-565
2010 – 2019
- 2019
- [j4]Hezam Akram Abdulghani, Niels Alexander Nijdam, Anastasija Collen, Dimitri Konstantas:
A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest Perspective. Symmetry 11(6): 774 (2019) - [c13]Javier Augusto-Gonzalez, Anastasija Collen, Spyridon C. Evangelatos, Marios Anagnostopoulos, Georgios P. Spathoulas, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras, Béla Genge, Erol Gelenbe, Niels A. Nijdam:
From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes. CAMAD 2019: 1-6 - [c12]Simon Senecal, Niels A. Nijdam, Nadia Magnenat-Thalmann:
Classification of Salsa Dance Level using Music and Interaction based Motion Features. VISIGRAPP (1: GRAPP) 2019: 100-109 - 2018
- [c11]Anastasija Collen, Niels A. Nijdam, Javier Augusto-Gonzalez, Sokratis K. Katsikas, Konstantinos M. Giannoutakis, Georgios P. Spathoulas, Erol Gelenbe, Konstantinos Votis, Dimitrios Tzovaras, Navid Ghavami, Melanie Volkamer, Piroska Haller, Alvaro Sánchez, Miltiadis Dimas:
GHOST - Safe-Guarding Home IoT Environments with Personalised Real-Time Risk Control. Euro-CYBERSEC 2018: 68-78 - [c10]Charalampos S. Kouzinopoulos, Georgios P. Spathoulas, Konstantinos M. Giannoutakis, Konstantinos Votis, Pankaj Pandey, Dimitrios Tzovaras, Sokratis K. Katsikas, Anastasija Collen, Niels A. Nijdam:
Using Blockchains to Strengthen the Security of Internet of Things. Euro-CYBERSEC 2018: 90-100 - [c9]Charalampos S. Kouzinopoulos, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras, Anastasija Collen, Niels A. Nijdam, Dimitri Konstantas, Georgios P. Spathoulas, Pankaj Pandey, Sokratis K. Katsikas:
Implementing a Forms of Consent Smart Contract on an IoT-based Blockchain to promote user trust. INISTA 2018: 1-6 - [c8]Georgios P. Spathoulas, Anastasija Collen, Pankaj Pandey, Niels A. Nijdam, Sokratis K. Katsikas, Charalampos S. Kouzinopoulos, Maher Ben Moussa, Konstantinos M. Giannoutakis, Konstantinos Votis, Dimitrios Tzovaras:
Towards Reliable Integrity in Blacklisting: Facing Malicious IPs in GHOST Smart Contracts. INISTA 2018: 1-8 - [c7]Simon Senecal, Niels A. Nijdam, Nadia Magnenat-Thalmann:
Motion analysis and classification of salsa dance using music-related motion features. MIG 2018: 11:1-11:10 - 2016
- [j3]Matthias Becker, Niels A. Nijdam, Nadia Magnenat-Thalmann:
Coupling strategies for multi-resolution deformable meshes: expanding the pyramid approach beyond its one-way nature. Int. J. Comput. Assist. Radiol. Surg. 11(5): 695-705 (2016) - 2014
- [b1]Niels A. Nijdam:
Context-Aware 3D rendering for User-Centric Pervasive Collaborative computing environments. University of Geneva, Switzerland, 2014 - 2013
- [c6]Niels A. Nijdam, Yvain Tisserand, Nadia Magnenat-Thalmann:
Refurbish a single user 3D application into a multi-user distributed service: a case study. VRST 2013: 193-200 - 2012
- [c5]Niels A. Nijdam, Bart Kevelham, Seunghyun Han, Nadia Magnenat-Thalmann:
An application framework for adaptive distributed simulation and 3D rendering services. VRCAI 2012: 103-110 - 2011
- [j2]Mingyu Lim, Bart Kevelham, Niels A. Nijdam, Nadia Magnenat-Thalmann:
Rapid development of distributed applications using high-level communication support. J. Netw. Comput. Appl. 34(1): 172-182 (2011) - 2010
- [j1]Seunghyun Han, Niels A. Nijdam, Jérôme Schmid, Jinman Kim, Nadia Magnenat-Thalmann:
Collaborative telemedicine for interactive multiuser segmentation of volumetric medical images. Vis. Comput. 26(6-8): 639-648 (2010) - [c4]Seunghyun Han, Niels A. Nijdam, Nadia Magnenat-Thalmann:
An Application Framework for Seamless Synchronous Collaboration Support in Ubiquitous Computing Environments. UCMedia 2010: 141-149
2000 – 2009
- 2009
- [c3]Jérôme Schmid, Niels A. Nijdam, Seunghyun Han, Jinman Kim, Nadia Magnenat-Thalmann:
Interactive Segmentation of Volumetric Medical Images for Collaborative Telemedicine. 3DPH 2009: 13-24 - [c2]Nadia Magnenat-Thalmann, Niels A. Nijdam, Seunghyun Han, Dimitrios Protopsaltou:
InterMedia: Towards Truly User-Centric Convergence of Multimedia. UCMedia 2009: 3-10 - 2008
- [c1]Mingyu Lim, Niels A. Nijdam, Nadia Magnenat-Thalmann:
A general collaborative platform for mobile multi-user applications. ETFA 2008: 1346-1353
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint