Author of the publication

Human Subject Evaluation of Computer-Security Training Recommender.

, , , and . COMPSAC, page 251-256. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Low-power, high-throughput deblocking filter for H.264/AVC., , , , , and . SoC, page 93-98. IEEE, (2010)Guided Web Content Mining Approach for Automated Meta-Rule Extraction and Information Retrieval., and . DMIN, page 619-625. CSREA Press, (2008)Optimal Secure Information using Digital Watermarking and Fuzzy Rule base., , , and . Multimedia Tools Appl., 78 (6): 7691-7712 (2019)Construction of highly non linear component of block cipher based on mclaurin series and mellin transformation with application in image encryption., , , , and . Multim. Tools Appl., 83 (3): 7159-7177 (January 2024)A Modified Residual Power Series Method for the Approximate Solution of Two-Dimensional Fractional Helmholtz Equations., , , , and . Symmetry, 15 (12): 2152 (December 2023)Memory management of safety-critical hard real-time systems designed in SystemJ., , , and . Microprocess. Microsystems, (2019)A Novel Construction of Substitution Box Based on Polynomial Mapped and Finite Field With Image Encryption Application., , , , , , and . IEEE Access, (2022)On Wide-Area Control of Solar-Integrated DAE Models of Power Grids., , and . ACC, page 4495-4500. IEEE, (2023)High false positive detection of security vulnerabilities: a case study., , and . ACM Southeast Regional Conference, page 359-360. ACM, (2012)Solitary Wave Solutions of Conformable Time Fractional Equations Using Modified Simplest Equation Method., , , , , and . Complex., (2022)