Author of the publication

A Real-Time Interactive Visualization System for DNS Amplification Attack Challenges.

, , , and . ACIS-ICIS, page 55-60. IEEE Computer Society, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Personal Software Process Tool for Eclipse Environment., , , and . Software Engineering Research and Practice, page 717-723. CSREA Press, (2005)Case studies for teaching physical security and security policy., , , and . InfoSecCD, page 21-26. ACM, (2010)Retrieving relevant CAPEC attack patterns for secure software development., , , and . CISR, page 33-36. ACM, (2014)Hybrid evolutionary motion planning using follow boundary repair for mobile robots., , , and . J. Syst. Archit., 47 (7): 635-647 (2001)LAN attacker: a visual education tool., , , , , and . InfoSecCD, page 118-123. ACM, (2006)The Design and Implementation of a Cryptographic Education Tool., , , and . CSEDU (1), page 193-198. SciTePress, (2011)Developed and Taught Course Modules to Enhance Cloud Computing Education., , , and . CSEDU (2), page 167-175. SciTePress, (2014)A Visualization based Simulator for SYN Flood Attacks., , , , and . IMAGAPP/IVAPP, page 251-255. SciTePress, (2011)Developing Abuse Cases Based on Threat Modeling and Attack Patterns., , , and . J. Softw., 10 (4): 491-498 (2015)Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies., , , , , , , and . J. Inf. Syst. Educ., 28 (1): 11-20 (2017)