Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Quick Outlier Detection in Wireless Body Area Networks., and . PEARC, page 54:1-54:3. ACM, (2017)Integrating Computing to STEM Curriculum via CodeBoard., , and . ICCSA (4), volume 9789 of Lecture Notes in Computer Science, page 512-529. Springer, (2016)Implement Hands-on Labs for File Integrity via Open Sources., and . ACM Southeast Regional Conference, page 265-267. ACM, (2017)A Targeted Data Extraction System for Mobile Devices., , , , , , , , , and 1 other author(s). IFIP Int. Conf. Digital Forensics, volume 569 of IFIP Advances in Information and Communication Technology, page 73-100. Springer, (2019)SDAA: Secure Data Aggregation and Authentication Using Multiple Sinks in Cluster-Based Underwater Vehicular Wireless Sensor Network., , and . Sensors, 23 (11): 5270 (2023)Secure polar coding with delayed wiretapping information., and . IET Commun., 14 (15): 2564-2575 (2020)Parallel Random Generators for Heterogeneous Computing Environments., and . IASTED PDCS, page 163-168. IASTED/ACTA Press, (2005)DeepDive: Examining Determinants of Health Disparities in COVID-19 for Improving Pandemic Health Care., , and . ICVISP, page 55:1-55:7. ACM, (2020)A framework for designing an environment science social network., and . ACM Southeast Regional Conference, page 393-394. ACM, (2012)An online game simulation environment for detecting potential deceptive insiders., , and . WSC, page 3222-3223. IEEE/ACM, (2015)