Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Java based component identification tool for measuring the strength of circuit protections., , , and . CSIIRW, page 26. ACM, (2010)A Systems Approach to Cyber Assurance Education., and . InfoSecCD, page 13-19. ACM, (2013)Evaluating component hiding techniques in circuit topologies., , , and . ICC, page 1138-1143. IEEE, (2012)A Method for Developing Abuse Cases and Its Evaluation., , , and . J. Softw., 11 (5): 520-527 (2016)Software Security and Randomization through Program Partitioning and Circuit Variation., , and . MTD@CCS, page 79-86. ACM, (2014)Phase space power analysis for PC-based rootkit detection., , , and . ACM Southeast Regional Conference, page 82-90. ACM, (2022)Mobile Agent Data Integrity Using Multi-agent Architecture., , and . PDCS, page 536-542. ISCA, (2004)Introduction to the Minitrack on Cyber Operations, Defense, and Forensics., , and . HICSS, page 6601-6602. ScholarSpace, (2023)Enhanced Operating System Protection to Support Digital Forensic Investigations., , , , and . TrustCom/BigDataSE/ICESS, page 650-659. IEEE Computer Society, (2017)Foundations for Security Aware Software Development Education., and . HICSS, IEEE Computer Society, (2006)