Author of the publication

Undergraduate Educational Pathways for Developing a High-Performance Computing Workforce.

, , and . PEARC, page 53:1-53:4. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Modeling Computer Networks for Vulnerability Analysis., , , , , and . DBSec, volume 256 of IFIP Conference Proceedings, page 233-244. Kluwer, (2002)A SCADA Intrusion Detection Framework that Incorporates Process Semantics., and . CISRC, page 6:1-6:5. ACM, (2016)Modeling and simulation of electric power substation employing an IEC 61850 network., , and . CISR, page 89-92. ACM, (2014)Security Policy Coordination for Heterogeneous Information Systems., , , and . ACSAC, page 219-228. IEEE Computer Society, (1999)Formal Analysis of E-Commerce Protocols., , , and . ISADS, page 19-28. IEEE Computer Society, (2001)A Taxonomy of Attacks on the DNP3 Protocol., , , and . Critical Infrastructure Protection, volume 311 of IFIP Advances in Information and Communication Technology, page 67-81. Springer, (2009)Providing Situational Awareness for Pipeline Control Operations., , , , and . Critical Infrastructure Protection, volume 311 of IFIP Advances in Information and Communication Technology, page 97-111. Springer, (2009)Automatic Generation of Attack Scripts from Attack Graphs., , , , and . ICDIS, page 267-274. IEEE, (2018)A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems., , , and . FUZZ-IEEE, page 325-330. IEEE, (2005)An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects., , , , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 385-388. Chapman & Hall, (1997)