Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SCS: Securing the Future of Simulation.. Simulation, 84 (12): 575-576 (2008)Student Educational Learning Experience Through Cooperative Research., , and . NCS, volume 310 of Lecture Notes in Networks and Systems, page 22-27. Springer, (2021)How Ada object orientation works., and . SIGAda, page 5-6. ACM, (2009)Applying DODAF 2.0 Modeling Techniques to a Real-Time Security Analyzer., , , , and . HSC, page 222-227. The Society for Modeling and Simulation International (SCS), (2009)Agile versus CMMI - process template selection and integration with microsoft team foundation server., and . ACM Southeast Regional Conference, page 186-191. ACM, (2008)Is there a Security Mindset and Can it be Taught?, , , , , , and . CODASPY, page 335-336. ACM, (2021)The importance of information security spending: an economic approach., and . SpringSim, page 293-300. SCS/ACM, (2008)Building information assurance education partnerships with minority institutions., , and . Richard Tapia Celebration of Diversity in Computing Conference, page 58-63. ACM, (2009)Modeling unmanned aerial vehicle communications at the Auburn University Miss Center., , and . SCSC, page 1007-1014. Simulation Councils, Inc., (2007)Simulation of army unmanned aerial vehicle communications., , , , , and . WSC, page 1324-1327. WSC, (2007)