Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Disciplinary Variation in the Use of Theme in Undergraduate Essays. Applied Linguistics, (2005)Client-Side Detection of SQL Injection Attack., , and . CAiSE Workshops, volume 148 of Lecture Notes in Business Information Processing, page 512-517. Springer, (2013)Information Theoretic XSS Attack Detection in Web Applications., , , and . Int. J. Secur. Softw. Eng., 5 (3): 1-15 (2014)Exchanging and countering points of view: a linguistic perspective on school students' use of electronic conferencing., , and . J. Comput. Assist. Learn., 25 (1): 85-98 (2009)CS++: expanding CS curriculum via open cybersecurity courseware., , , , , and . ACM Southeast Regional Conference, page 24:1-24:7. ACM, (2014)Design and development of Anti-XSS proxy., , , and . ICITST, page 484-489. IEEE, (2013)‘The Voices, the Voices’: Creativity in Online Conversation. Applied Linguistics, 28 (4): 538–555 (2007)Testing of Memory Leak in Android Applications., , and . HASE, page 176-183. IEEE Computer Society, (2014)Effectiveness of Virtual Reality in the Motivational Processes of Learners.. Int. J. Virtual Real., 2 (1): 21-33 (1996)Performance analysis of brain-computer interfaces in aerial drone., , , , , , , , , and . ACM Southeast Regional Conference, page 16:1-16:5. ACM, (2018)