Author of the publication

CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS

, , , , , and . International Journal on Foundations of Computer Science & Technology (IJFCST), 5 (6): 17 (November 2015)
DOI: 10.5121/ijfcst.2015.5606

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Facial image reconstruction using polygon approximation., , , , and . SIP, page 565-569. IASTED/ACTA Press, (2005)A federated network online network traffics analysis engine for cybersecurity., , , , and . IJCNN, page 1-8. IEEE, (2015)Swarm Intelligent Compressive Routing in Wireless Sensor Networks., , and . Comput. Intell., 31 (3): 513-531 (2015)Identify Website Personality by Using Unsupervised Learning Based on Quantitative Website Elements., , and . ICONIP (1), volume 9489 of Lecture Notes in Computer Science, page 522-530. Springer, (2015)GRAFIX: Automated Rule-Based Post Editing System to Improve English-Persian SMT Output., , and . COLING (Posters), page 873-882. Indian Institute of Technology Bombay, (2012)Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern Recognition., , , and . PST, page 1-2. IEEE Computer Society, (2018)COR-Honeypot: Copy-On-Risk, Virtual Machine as Honeypot in the Cloud., , , , and . CLOUD, page 908-912. IEEE Computer Society, (2016)A survey on internet usage and cybersecurity awareness in students., , and . PST, page 223-228. IEEE, (2016)"How do you know that I don't understand?" A look at the future of intelligent tutoring systems., , , , and . Comput. Hum. Behav., 24 (4): 1342-1363 (2008)A training-based speech regeneration approach with cascading mapping models., , , , , and . Comput. Electr. Eng., (2017)