Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III., , , and . SSCI, page 1-8. IEEE, (2017)Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Modeling Features., , , , , , , and . SSCI, page 933-940. IEEE, (2018)Case studies for teaching physical security and security policy., , , and . InfoSecCD, page 21-26. ACM, (2010)A Survey of U.S. Laws for Health Information Security & Privacy., , , and . Int. J. Inf. Secur. Priv., 6 (4): 40-54 (2012)An Overhead Reducing Technique for Time Warp., and . DS-RT, page 95-102. IEEE Computer Society, (2002)Predicting the Performance of Synchronous Discrete Event Simulation Systems., and . ICCAD, page 18-. IEEE Computer Society, (2001)An overhead reducing technique for Time Warp., and . J. Parallel Distributed Comput., 65 (1): 65-73 (2005)PDA-PRGCN: identification of Piwi-interacting RNA-disease associations through subgraph projection and residual scaling-based feature augmentation., , , , , , , and . BMC Bioinform., 24 (1): 18 (December 2023)Using packet sniffer simulator in the class: experience and evaluation., , , , and . ACM Southeast Regional Conference, page 116-121. ACM, (2007)Assessing the Effectiveness of Experiential-Learning-Based Teaching Tools in Cybersecurity Courses (Abstract Only)., , , , and . SIGCSE, page 693. ACM, (2016)