Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Shape of Crimeware to Come (review of Crimeware: Understanding New Attacks and Defenses by M. Jacobsson and Z. Ramzan) Book reviews.. IEEE Secur. Priv., 6 (5): 5 (2008)Progress and Prospects for the Development of Computer Generated Actors for Military Simulation, Part 3 - The Road Ahead., and . Presence Teleoperators Virtual Environ., 12 (6): 629-643 (2003)The Solar System Modeler., , and . IEEE Computer Graphics and Applications, 17 (5): 47-57 (1997)The Virtual SpacePlane., , , , and . IEEE Computer Graphics and Applications, 21 (2): 42-52 (2001)The distributed mission training integrated threat environment system architecture and design., and . ACM Trans. Model. Comput. Simul., 11 (1): 106-133 (2001)Statistically optimal interslice value interpolation in 3D medical imaging: theory and implementation., , , and . CBMS, page 276-283. IEEE Computer Society, (1992)Considering Defense in Depth for Software Applications.. IEEE Secur. Priv., 2 (1): 72-75 (2004)Three-dimensional medical image analysis using local dynamic algorithm selection on a multiple-instruction, multiple-data architecture.. University of Michigan, USA, (1989)A virtual cockpit for a distributed interactive simulation., , , , and . IEEE Computer Graphics and Applications, 14 (1): 49-54 (1994)Recognition and categorization considerations for information assurance requirements development and speficication., , and . Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security, volume 7344 of SPIE Proceedings, page 73440K. SPIE, (2009)