Author of the publication

A Secure Future for Open-Source Computational Science and Engineering.

, , , and . Comput. Sci. Eng., 24 (4): 65-69 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

VANET applications: Past, present, and future., and . Veh. Commun., (2021)Applying static analysis to high-dimensional malicious application detection., , , and . ACM Southeast Regional Conference, page 31:1-31:5. ACM, (2013)A dimensional transformation scheme for power grid cyber event detection., , and . CISR, page 13-16. ACM, (2014)Using Executable Slicing to Improve Rogue Software Detection Algorithms., , , , and . Int. J. Secur. Softw. Eng., 2 (2): 53-64 (2011)Comparing CPU Performance Between and Within Processor Families., , and . Int. CMG Conference, page 421-430. Computer Measurement Group, (2000)Digital forensics on a virtual machine., and . ACM Southeast Regional Conference, page 326-327. ACM, (2011)An Experimental Analysis of Windows Log Events Triggered by Malware., and . ACM Southeast Regional Conference, page 195-198. ACM, (2017)Advancing Short-Term Traffic Congestion Prediction: Navigating Challenges in Learning-Based Approaches., , and . ICAI (2), volume 2015 of Communications in Computer and Information Science, page 3-13. Springer, (2023)Evaluation of Firefox Browser Forensics Tools., and . ACM Southeast Regional Conference, page 5-12. ACM, (2017)A Comparison of Features for Android Malware Detection., , and . ACM Southeast Regional Conference, page 63-68. ACM, (2017)