Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SIGCSE/CSA 1978 technical symposium report.. ACM SIGCSE Bull., 10 (2): 8-9 (1978)Algorithms on Block-Complete Graphs., and . Great Lakes Computer Science Conference, volume 507 of Lecture Notes in Computer Science, page 34-40. Springer, (1989)Integrating online social networks for enhancing reputation systems of e-commerce., , , , and . ISI, page 384-389. IEEE, (2011)A Visualization based Simulator for SYN Flood Attacks., , , , and . IMAGAPP/IVAPP, page 251-255. SciTePress, (2011)Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies., , , , , , , and . J. Inf. Syst. Educ., 28 (1): 11-20 (2017)Developing Faculty Expertise in Information Assurance through Case Studies and Hands-On Experiences., , , , , , , and . HICSS, page 4938-4945. IEEE Computer Society, (2014)A generalized database directory for nondense attributes., and . Inf. Process. Manag., 24 (2): 161-171 (1988)On Bandwidth for the Tensor Product of Paths and Cycles., and . Discret. Appl. Math., 73 (2): 133-141 (1997)An experimental course in advanced programming methods.. ACM SIGCSE Bull., 8 (4): 15-18 (1976)Cloud Computing Threats and Provider Security Assessment., , and . ICA3PP (Workshops and Symposiums), volume 9532 of Lecture Notes in Computer Science, page 238-250. Springer, (2015)