Author of the publication

Implementing Cybersecurity into the Wisconsin K-12 Classroom.

, , and . COMPSAC (2), page 312-317. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Perouli, Debbie
add a person with the name Perouli, Debbie
 

Other publications of authors with the same name

Detecting the unintended in BGP policies., , , , , and . ICNP, page 1-2. IEEE Computer Society, (2012)Implementing Cybersecurity into the Wisconsin K-12 Classroom., , and . COMPSAC (2), page 312-317. IEEE, (2019)Towards a Framework for Evaluating BGP Security., , , , , and . CSET, USENIX Association, (2012)Dependable Public Ledger for Policy Compliance, a Blockchain Based Approach., , and . ICDCS, page 1891-1900. IEEE, (2019)Detecting unsafe BGP policies in a flexible world., , , , , , and . ICNP, page 1-10. IEEE Computer Society, (2012)Using Embedded Xinu and the Raspberry Pi 3 to Teach Parallel Computing in Assembly Programming., , and . IPDPS Workshops, page 334-341. IEEE, (2019)A Case Study on the Cybersecurity of Social Robots., , and . HRI (Companion), page 195-196. ACM, (2018)Detecting Anomalous Behavior of Socially Assistive Robots in Geriatric Care Facilities., and . HRI, page 582-583. IEEE, (2019)10 Lessons from 10 Years of Measuring and Modeling the Internet's Autonomous Systems., , , , and . IEEE Journal on Selected Areas in Communications, 29 (9): 1810-1821 (2011)An Experimental Framework for BGP Security Evaluation., , , , , and . it - Information Technology, 55 (4): 147-154 (2013)