Author of the publication

A Cloud-based Cyberlearning Environment for Introductory Computing Programming Education.

, , , , , and . ICALT, page 12-13. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs., , , , and . ITiCSE, page 343. ACM, (2014)Mobile device based authentic learning for computer network and security., , , , and . ITiCSE, page 335. ACM, (2013)A hybrid approach for mobile security threat analysis., , , , , and . WISEC, page 28:1-28:2. ACM, (2015)Web Service-Enabled Spam Filtering with Naïve Bayes Classification., , , , , and . BigDataService, page 99-104. IEEE Computer Society, (2015)Security Data Mining in an Ontology for Vulnerability Management., and . IJCBS, page 597-603. IEEE Computer Society, (2009)Design of Online Runtime and Testing Environment for Instant Java Programming Assessment., , and . ITNG, page 1102-1106. IEEE Computer Society, (2010)Mechanism Design Based Secure Data Object Replication., and . TrustCom, page 580-587. IEEE Computer Society, (2012)Towards Robustness against Unsuspicious Adversarial Examples., , , and . CoRR, (2020)Learning Mobile Security with Labware., , , , and . IEEE Secur. Priv., 12 (1): 69-72 (2014)Mechanism Design for Replica Placement in Peer-Assisted Content Delivery Networks with Heterogeneous Behavior Models., and . COMPSAC, page 500-501. IEEE Computer Society, (2016)