Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

NEST: NEtwork Server Tool., and . International Conference on Internet Computing, page 700. CSREA Press, (2004)Lightweight Client-Side Methods for Detecting Email Forgery., , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 254-269. Springer, (2012)LeGACy Code: Studying How (Amateur) Game Developers Used Graphic Adventure Creator., and . FDG, page 23:1-23:7. ACM, (2020)Entombed: An archaeological examination of an Atari 2600 game., and . CoRR, (2018)Army of Botnets., , and . NDSS, The Internet Society, (2007)10 Binary Games for Computer Science Education., and . SIGCSE, page 1308. ACM, (2020)A Multi-Agent Approach to Testing Anti-Spam Software., , and . DEXA Workshops, page 38-42. IEEE Computer Society, (2009)Improved Port Knocking with Strong Authentication., , and . ACSAC, page 451-462. IEEE Computer Society, (2005)spy3: A Python Subset for CS1.. WCCCE, page 6:1-6:6. ACM, (2023)Entombed: An archaeological examination of an Atari 2600 game., and . Art Sci. Eng. Program., 3 (2): 4 (2019)