Author of the publication

Electronic Health Record Error Prevention Approach Using Ontology in Big Data.

, , , and . HPCC/CSS/ICESS, page 752-757. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electronic Health Record Error Prevention Approach Using Ontology in Big Data., , , and . HPCC/CSS/ICESS, page 752-757. IEEE, (2015)Individual Risk Perception and Choice using Cryptocurrency for Transactions., and . ICIS, Association for Information Systems, (2019)Model alignment of anthrax attack simulations., , , , and . Decis. Support Syst., 41 (3): 654-668 (2006)Characterization of defense mechanisms against distributed denial of service attacks., , and . Comput. Secur., 23 (8): 665-678 (2004)Understanding Nigerian e-mail scams: A computational content analysis approach., , , and . Inf. Secur. J. A Glob. Perspect., 30 (2): 88-99 (2021)An Integrated System for Connecting Cybersecurity Competency, Student Activities and Career Building., , , and . NCS, volume 310 of Lecture Notes in Networks and Systems, page 3-12. Springer, (2021)An Investigation of Decision-Making and the Tradeoffs involving Computer Security Risk., and . AMCIS, page 610. Association for Information Systems, (2009)A Hands-on Introduction to GIS with a Simple Application to Wi-Fi Security., and . AMCIS, page 75. Association for Information Systems, (2009)Teaching Web Security Using Portable Virtual Labs., and . ICALT, page 491-495. IEEE Computer Society, (2011)A dictionary-based method for detecting machine-generated domains., , and . Inf. Secur. J. A Glob. Perspect., 30 (4): 205-218 (2021)