Author of the publication

The effectiveness of classification algorithms on IPv6 IID construction.

, , and . Int. J. Auton. Adapt. Commun. Syst., 10 (1): 15-22 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The risks, costs and possible solutions involved in setting up and running wireless local area networks.. Australian Computer, Network & Information Forensics Conference, page 130-135. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)A Model of Fluid-Structure and Biochemical Interactions with Applications to Subclinical Leaflet Thrombosis., , , , , , , and . CoRR, (2022)Firewire Forensics in Modern Operating Systems., and . Security and Management, page 635-638. CSREA Press, (2009)A Comparison Study of Wireless Network Security in Several Australasian Cities and Suburbs., and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 115-127. Springer, (2016)What Artifacts do Current BitTorrent Clients Leave Behind?.. Security and Management, page 608-613. CSREA Press, (2008)Towards Effective Algorithms for Intelligent Defense Systems., and . CSS, volume 7672 of Lecture Notes in Computer Science, page 498-508. Springer, (2012)Data Security and wireless networks: mutually exclusive?. Security and Management, page 404-409. CSREA Press, (2006)An investigation into long range detection of passive UHF RFID tags., , , and . Australian Computer, Network & Information Forensics Conference, page 84-86. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)The effectiveness of commercial erasure programs on BitTorrent activity.. Australian Computer, Network & Information Forensics Conference, page 108-114. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)Internet of Things Forensics: The Need, Process Models, and Open Issues., , , and . IT Prof., 20 (3): 40-49 (2018)