Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using a Practice Oriented Approach to Teach Web Security Course., , , , and . FECS, page 405-409. CSREA Press, (2009)Designing an SOA-Based Earthquake Forewarning System using BPMN., and . Software Engineering Research and Practice, page 593-598. CSREA Press, (2010)Effects of Evidence-Based Malware Cybersecurity Training on Employees., , , , , , and . AMCIS, Association for Information Systems, (2019)A User Study: Abuse Cases Derived from Use Case Description and CAPEC Attack Patterns., and . ICISA, volume 514 of Lecture Notes in Electrical Engineering, page 239-249. Springer, (2018)Security Labs for Software Defined Networks in CloudLab., , and . SIGCSE, page 1235. ACM, (2019)Teaching Security Management for Mobile Devices., , , and . SIGITE, page 14-19. ACM, (2016)Developing an interdisciplinary health informatics security and privacy program (abstract only)., , , and . SIGCSE, page 666. ACM, (2012)Using packet sniffer simulator in the class: experience and evaluation., , , , and . ACM Southeast Regional Conference, page 116-121. ACM, (2007)A course module on web tracking and privacy., , , , and . InfoSecCD, page 10:1-10:7. ACM, (2015)A course module on mobile malware., , , , and . InfoSecCD, page 10:1. ACM, (2014)