Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of U.S. Laws for Health Information Security & Privacy., , , and . Int. J. Inf. Secur. Priv., 6 (4): 40-54 (2012)A Method for Developing Abuse Cases and Its Evaluation., , , and . J. Softw., 11 (5): 520-527 (2016)Spatiotemporal Evolutions of the Suspended Particulate Matter in the Yellow River Estuary, Bohai Sea and Characterized by Gaofen Imagery., , , , , , , , , and . Remote. Sens., 15 (19): 4769 (October 2023)Case studies for teaching physical security and security policy., , , and . InfoSecCD, page 21-26. ACM, (2010)A Personal Software Process Tool for Eclipse Environment., , , and . Software Engineering Research and Practice, page 717-723. CSREA Press, (2005)Teaching Operating Systems Using Visualization: A Comparative Study., , , and . Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, Springer, (2008)An Automated Security Concerns Recommender Based on Use Case Specification Ontology., , , and . Autom. Softw. Eng., 29 (2): 42 (2022)Securing analysis patterns., and . ACM Southeast Regional Conference, page 288-293. ACM, (2007)Implementing a network intrusion detection system using semi-supervised support vector machine and random forest., , , , and . ACM Southeast Conference, page 180-184. ACM, (2021)Supporting Case-Based Learning in Information Security with Web-Based Technology., , and . J. Inf. Syst. Educ., 24 (1): 31-40 (2013)