Autor der Publikation

The effectiveness of classification algorithms on IPv6 IID construction.

, , und . Int. J. Auton. Adapt. Commun. Syst., 10 (1): 15-22 (2017)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

The risks, costs and possible solutions involved in setting up and running wireless local area networks.. Australian Computer, Network & Information Forensics Conference, Seite 130-135. School of Computer and Information Science, Edith Cowan University, Western Australia, (2004)Firewire Forensics in Modern Operating Systems., und . Security and Management, Seite 635-638. CSREA Press, (2009)A Model of Fluid-Structure and Biochemical Interactions with Applications to Subclinical Leaflet Thrombosis., , , , , , , und . CoRR, (2022)Data Security and wireless networks: mutually exclusive?. Security and Management, Seite 404-409. CSREA Press, (2006)An investigation into long range detection of passive UHF RFID tags., , , und . Australian Computer, Network & Information Forensics Conference, Seite 84-86. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)The effectiveness of commercial erasure programs on BitTorrent activity.. Australian Computer, Network & Information Forensics Conference, Seite 108-114. School of Computer and Information Science, Edith Cowan University, Western Australia, (2005)The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues, und . CoRR, (2012)Internet of Things Forensics: The Need, Process Models, and Open Issues., , , und . IT Prof., 20 (3): 40-49 (2018)Do Current BitTorrent Clients Running on Windows 7 Beta Leave Behind Meaningful Data?. Security and Management, Seite 622-617. CSREA Press, (2009)SCADA Security - Slowly Circling a Disaster Area., und . Security and Management, Seite 613-617. CSREA Press, (2009)