Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modelling the spread of mobile malware., , , , and . Int. J. Comput. Aided Eng. Technol., 2 (1): 3-14 (2010)A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client Computers., , and . ITNG, page 628-632. IEEE Computer Society, (2008)The Modeling and Analysis of the Washington Metropolitan Area Bus Network., , , , and . MSV, page 131-133. CSREA Press, (2010)Bridging the Divide: Developing Culturally-Responsive Curriculum for K-12 Computer Science Education (Abstract Only)., , , , and . SIGCSE, page 707. ACM, (2015)Alternate Routing in Tandem Traffic-Groomed Optical Networks., and . J. Networks, 2 (5): 69-77 (2007)Analysis of a Traffic-Groomed Optical Network with Alternate Routing., and . ITNG, page 854-862. IEEE Computer Society, (2007)Modeling of Military Networks Using Group Mobility Models., and . ITNG, page 1670-1671. IEEE Computer Society, (2009)Epidemic Modeling of Military Networks Using Group and Entity Mobility Models., and . ITNG, page 1303-1304. IEEE Computer Society, (2008)RESPECT 2019: Yes, We Still Need to Talk About Diversity in Computing., , , , , and . Comput. Sci. Eng., 21 (1): 79-83 (2019)ERDR: Achieving Event Reliability in Wireless Sensor Networks Using Distributed Data Redundancy., , and . ICWN, page 439-443. CSREA Press, (2007)