Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study of User Attitudes toward Persistent Cookies., , and . J. Comput. Inf. Syst., 41 (3): 1-7 (2001)The Communications Decency Act Is not as Dead as You Think., , and . Commun. ACM, 42 (1): 15-17 (1999)Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware., , , , , and . SIGCSE (2), page 1153. ACM, (2022)The Threat of Long-Arm Jurisdiction to Electronic Commerce., , and . Commun. ACM, 41 (12): 15-20 (1998)Enemy at the gate: threats to information security.. Commun. ACM, 46 (8): 91-95 (2003)The enemy is still at the gates: threats to information security revisited., and . InfoSecCD, page 95-96. ACM, (2010)IT divergence in reengineering support: Performance expectations vs. perceptions.. Inf. Manag., 30 (5): 239-250 (1996)An examination of cross-national differences., , , and . SIGCAS Comput. Soc., 28 (4): 22-28 (1998)Authentic Learning Approach for Artificial Intelligence Systems Security and Privacy., , , , , , and . COMPSAC, page 1010-1012. IEEE, (2023)Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms., , , , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 469-474. IEEE, (2020)