default search action
Heather Molyneaux
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani:
A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective. Comput. Commun. 213: 61-77 (2024) - [j9]Alireza Zohourian, Sajjad Dadkhah, Heather Molyneaux, Euclides Carlos Pinto Neto, Ali A. Ghorbani:
IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks. Comput. Secur. 146: 104034 (2024) - [j8]Priscilla Kyei Danso, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Alireza Zohourian, Heather Molyneaux, Rongxing Lu, Ali A. Ghorbani:
Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification. IEEE Internet Things J. 11(2): 2322-2335 (2024) - 2023
- [j7]Alireza Zohourian, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Hassan Mahdikhani, Priscilla Kyei Danso, Heather Molyneaux, Ali A. Ghorbani:
IoT Zigbee device security: A comprehensive review. Internet Things 22: 100791 (2023) - [c20]Priscilla Kyei Danso, Heather Molyneaux, Alireza Zohourian, Euclides Carlos Pinto Neto, Derrick Whalen, Sajjad Dadkhah, Ali A. Ghorbani:
Human-Centric Machine Learning: The Role of Users in the Development of IoT Device Identification and Vulnerability Assessment. HCI (35) 2023: 622-642 - 2022
- [j6]Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a robust and trustworthy machine learning system development: An engineering perspective. J. Inf. Secur. Appl. 65: 103121 (2022) - [j5]Miraqa Safi, Sajjad Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, Ali A. Ghorbani:
A Survey on IoT Profiling, Fingerprinting, and Identification. ACM Trans. Internet Things 3(4): 26:1-26:39 (2022) - [c19]Hélène Fournier, Heather Molyneaux, Irina Kondratova:
Designing for Privacy and Technology Adoption by Older Adults. HCI (37) 2022: 506-515 - 2021
- [j4]Muhammad Salman Khan, Rene Richard, Heather Molyneaux, Danick Cote-Martel, Henry Jackson Kamalanathan Elango, Steve Livingstone, Manon Gaudet, Dave Trask:
Cyber Threat Hunting: A Cognitive Endpoint Behavior Analytic System. Int. J. Cogn. Informatics Nat. Intell. 15(4): 1-23 (2021) - [c18]Aniqa Alam, Heather Molyneaux, Elizabeth Stobert:
Authentication Management of Home IoT Devices. HCI (27) 2021: 3-21 - [c17]Miraqa Safi, Barjinder Kaur, Sajjad Dadkhah, Farzaneh Shoeleh, Arash Habibi Lashkari, Heather Molyneaux, Ali A. Ghorbani:
Behavioural Monitoring and Security Profiling in the Internet of Things (IoT). HPCC/DSS/SmartCity/DependSys 2021: 1203-1210 - [i1]Pulei Xiong, Scott Buffett, Shahrear Iqbal, Philippe Lamontagne, Mohammad Saiful Islam Mamun, Heather Molyneaux:
Towards a Robust and Trustworthy Machine Learning System Development. CoRR abs/2101.03042 (2021) - 2020
- [c16]Hélène Fournier, Heather Molyneaux, Irina Kondratova:
Remote Home Healthcare Services and Tools for Supporting Aging in Place. AHFE (17) 2020: 882-891 - [c15]Jean-François Lapointe, Heather Molyneaux, Mohand Saïd Allili:
A Literature Review of AR-Based Remote Guidance Tasks with User Studies. HCI (11) 2020: 111-120 - [c14]Heather Molyneaux, Elizabeth Stobert, Irina Kondratova, Manon Gaudet:
Security Matters ... Until Something Else Matters More: Security Notifications on Different Form Factors. HCI (30) 2020: 189-205 - [c13]Hélène Fournier, Irina Kondratova, Heather Molyneaux:
Designing Digital Technologies and Safeguards for Improving Activities and Well-Being for Aging in Place. HCI (44) 2020: 524-537 - [c12]Elizabeth Stobert, Tina Safaie, Heather Molyneaux, Mohammad Mannan, Amr M. Youssef:
ByPass: Reconsidering the Usability of Password Managers. SecureComm (1) 2020: 446-466
2010 – 2019
- 2019
- [c11]Heather Molyneaux, Irina Kondratova, Elizabeth Stobert:
Understanding Perceptions: User Responses to Browser Warning Messages. HCI (29) 2019: 164-175 - [c10]Hélène Fournier, Heather Molyneaux, Rita Kop:
Human Factors in New Personal Learning Ecosystems: Challenges, Ethical Issues, and Opportunities. HCI (35) 2019: 230-238 - 2018
- [c9]Irina Kondratova, Heather Molyneaux, Hélène Fournier:
Supporting Trust and Engagement in Personalized Learning. HCI (25) 2018: 44-59 - 2017
- [j3]Irina Kondratova, Hélène Fournier, Heather Molyneaux:
An Overview of Competency Management for Learning and Performance Support: A Canadian Perspective. Int. J. Adv. Corp. Learn. 10(2): 47-62 (2017) - [c8]Irina Kondratova, Heather Molyneaux, Hélène Fournier:
Design Considerations for Competency Functionality Within a Learning Ecosystem. HCI (25) 2017: 124-136 - 2016
- [c7]Jean-François Lapointe, Heather Molyneaux, Irina Kondratova, Aida Freixanet Viejo:
Learning and Performance Support - Personalization Through Personal Assistant Technology. HCI (23) 2016: 223-232 - 2015
- [c6]Cosmin Munteanu, Heather Molyneaux, Wendy Moncur, Mario Romero, Susan O'Donnell, John Vines:
Situational Ethics: Re-thinking Approaches to Formal Ethics Requirements for Human-Computer Interaction. CHI 2015: 105-114 - 2014
- [j2]Cosmin Munteanu, Heather Molyneaux, Susan O'Donnell:
Fieldwork with vulnerable populations. Interactions 21(1): 50-53 (2014) - [j1]Cosmin Munteanu, Heather Molyneaux, Julie Maitland, Daniel McDonald, Rock Leung, Hélène Fournier, Joanna Lumsden:
Hidden in plain sight: low-literacy adults in a developed country overcoming social and educational challenges through mobile learning support tools. Pers. Ubiquitous Comput. 18(6): 1455-1469 (2014) - 2012
- [c5]Cosmin Munteanu, Heather Molyneaux, Julie Maitland, Daniel McDonald, Rock Leung:
Tale of two studies: challenges in field research with low-literacy adult learners in a developed country. CHI Extended Abstracts 2012: 489-504 - 2011
- [c4]Cosmin Munteanu, Heather Molyneaux, Daniel McDonald, Joanna Lumsden, Rock Leung, Hélène Fournier, Julie Maitland:
"Showing off" your mobile device: adult literacy learning in the classroom and beyond. Mobile HCI 2011: 95-104
2000 – 2009
- 2009
- [c3]Deanne C. Simms, Susan O'Donnell, Heather Molyneaux:
The Use of Virtual Reality in the Treatment of Posttraumatic Stress Disorder (PTSD). HCI (13) 2009: 615-624 - 2008
- [c2]Sandy Liu, Heather Molyneaux, Brad Matthews:
A technical implementation guide for multi-site videoconferencing. ISTAS 2008: 1-8 - [c1]Heather Molyneaux, Susan O'Donnell, Hélène Fournier, Kerri Gibson:
Participatory videoconferencing for groups. ISTAS 2008: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint