Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting the Performance of Synchronous Discrete Event Simulation Systems., and . ICCAD, page 18-. IEEE Computer Society, (2001)A Survey of U.S. Laws for Health Information Security & Privacy., , , and . IJISP, 6 (4): 40-54 (2012)An Overhead Reducing Technique for Time Warp., and . DS-RT, page 95-102. IEEE Computer Society, (2002)Adversarial authorship, interactive evolutionary hill-climbing, and author CAAT-III., , , and . SSCI, page 1-8. IEEE, (2017)Case studies for teaching physical security and security policy., , , and . InfoSecCD, page 21-26. ACM, (2010)Authorship Attribution via Evolutionary Hybridization of Sentiment Analysis, LIWC, and Topic Modeling Features., , , , , , , and . SSCI, page 933-940. IEEE, (2018)Analysis of a Single Hemodialysis on Phosphate Removal of the Internal Fistula Patients by Mathematical and Statistical Methods., , , , , , and . Comp. Math. Methods in Medicine, (2013)Visualization Tools for Teaching Computer Security., , , , , and . TOCE, 9 (4): 20:1-20:28 (2010)Performance Evaluation of Machine Learning Algorithms in Apache Spark for Intrusion Detection., , , and . ITNAC, page 1-6. IEEE Computer Society, (2018)Enhancing Cybersecurity Education Using POGIL (Abstract Only)., , , , , and . SIGCSE, page 719. ACM, (2017)