Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Utilizing Computer Vision, Clustering and Neural Networks for Melanoma Categorization., , , and . ACM Southeast Regional Conference, page 322-323. ACM, (2020)Graphical Representation of Text Semantics., and . ACM Southeast Regional Conference, page 318-319. ACM, (2020)Design and Implementation of an ERC-20 Smart Contract on the Ethereum Blockchain., , , , and . IEEE Big Data, page 2334-2338. IEEE, (2023)Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection., , , , , , , and . IEEE Big Data, page 5715-5720. IEEE, (2022)Promote Self-efficacy in Learning of Mobile App and Security with real-world Relevant Laboratory (Abstract Only)., , , and . SIGCSE, page 691. ACM, (2016)A new curriculum for hardware-based network intrusion detection., , , and . ACM Southeast Regional Conference, page 318-319. ACM, (2011)A Combination of Active and Passive Video Steganalysis to Fight Sensitive Data Exfiltration through Online Video., and . COMPSAC Workshops, page 371-376. IEEE Computer Society, (2016)978-1-4673-8845-0.Protecting Data in Android External Data Storage., , , , , and . COMPSAC (1), page 924-925. IEEE, (2019)Improving the Prediction Accuracy with Feature Selection for Ransomware Detection., , , , and . COMPSAC, page 424-425. IEEE, (2022)Scalable Machine Learning Using PySpark., , , , , , , , , and . COMPSAC, page 454-455. IEEE, (2022)