Author of the publication

Log generation for coding behavior analysis: For focusing on how kids are coding not what they are coding.

, , , and . SANER, page 575-576. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Level Indicating Data Leakage Prevention System., , , and . KSII Trans. Internet Inf. Syst., 7 (3): 558-575 (2013)Enriching Security Education Hands-on Labs with Practical Exercises., , , , and . ICSSA, page 100-103. IEEE, (2017)A Study on SES-Based Information Security Framework for Autonomous Vehicle Controlling Environment., and . AsiaSim, volume 1636 of Communications in Computer and Information Science, page 68-73. Springer, (2021)Experimental dataset for the Performance Evaluation for Geographically Distributed Blockchain-based Services in a Cloud Computing Environment., and . (January 2022)NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack., , and . AIS, volume 3397 of Lecture Notes in Computer Science, page 90-99. Springer, (2004)A Study on Document Password Management using the Trust-Chain Based SPT (Work-in-Progress)., and . ICSSA, page 30-33. IEEE, (2018)System Specification-based Design of Cloud Data Centre and DEVS Simulation for Availability Evaluatio., and . J. Res. Pract. Inf. Technol., (2014)A modeling methodology for cyber-security simulation., and . WSC, page 374:1-374:2. WSC, (2012)Vulnerability Modeling and Simulation for DNS Intrusion Tolerance System Construction.. AIS, volume 3397 of Lecture Notes in Computer Science, page 81-89. Springer, (2004)Design of internal information leakage detection system considering the privacy violation., and . ICTC, page 480-481. IEEE, (2010)