Author of the publication

A Programmable MIDI Instrument Controller Emulating a Hammer Dulcimer.

, and . ICMC, Michigan Publishing, (1992)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing an Optimized Alert System Based on Geospatial Location Data., , and . HICSS, page 4159-4168. IEEE Computer Society, (2014)Internet Security: Intrusion Detection and Prevention: Minitrack Introduction., and . HICSS, IEEE Computer Society, (2004)Reflections on Operating in Hostile Environments., , and . HICSS, IEEE Computer Society, (2004)The privacy implications of stateless IPv6 addressing., , , and . CSIIRW, page 52. ACM, (2010)DHT Blind Rendezvous for Session Establishment in Network Layer Moving Target Defenses., , , and . MTD@CCS, page 77-84. ACM, (2015)Leveraging Cognitive Principles to Improve Security Visualization., , , and . NDT (2), volume 294 of Communications in Computer and Information Science, page 262-276. Springer, (2012)The Blind Man's Bluff Approach to Security Using IPv6., , , , and . IEEE Secur. Priv., 10 (4): 35-43 (2012)Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things., , , and . IEEE Wirel. Commun. Lett., 7 (4): 578-581 (2018)Utilizing the BitTorrent DHT for blind rendezvous and information exchange., , , and . MILCOM, page 1560-1565. IEEE, (2015)Mobile Device Profiling and Intrusion Detection Using Smart Batteries., , , , , and . HICSS, page 296. IEEE Computer Society, (2008)