Author of the publication

Designing a computer forensics concentration for cross-disciplinary undergraduate students.

, , and . InfoSecCD, page 52-57. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Framework for Smart Trusted Indicators for Browsers (STIB)., and . Security and Management, page 361-367. CSREA Press, (2010)Teaching Secure Coding Practices to STEM Students., , and . InfoSecCD, page 42-48. ACM, (2013)An investigation of privacy protocols in location-based service., and . InfoSecCD, page 15:1-15:7. ACM, (2015)Design insider threat hands-on labs., and . InfoSecCD, page 17:1. ACM, (2014)Integrate mobile devices into CS security education.. InfoSecCD, page 1:1-1:4. ACM, (2015)Generating Parallel Random Sequences via Parameterizing EICGs for Heterogeneous Computing Environments., and . ICCSA (4), volume 6019 of Lecture Notes in Computer Science, page 409-417. Springer, (2010)On the Scrambled Halton Sequence., and . Monte Carlo Methods Appl., 10 (3-4): 435-442 (2004)Proof of Non-stationary Channel Polarization., , and . ICCCS, page 492-497. IEEE, (2022)Targeted Data Extraction and Deepfake Detection with Blockchain Technology., , and . UV, page 1-7. IEEE, (2022)A framework for access control model in enterprise healthcare via SAML., and . ACM Southeast Regional Conference, page 113. ACM, (2010)