Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 5 results
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Kansas State University; Eugene Y. Vasserman, Kansas State University; Eleanor C. Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jane LeClair, National Cybersecurity Institute at Excelsior College; Denise Pheils, National Cybersecurity Institute
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Janusz Zalewski, Florida Gulf Coast University; Andrew J. Kornecki, Embry-Riddle Aeronautical Univ., Daytona Beach; Bogdan Denny Czejdo, Fayetteville State University; Fernando Garcia Gonzalez, Florida Gulf Coast University; Nary Subramanian, University of Texas, Tyler; Dawid Trawczynski, Advanced Micro Devices
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Manghui Tu, Purdue University Calumet; Shiming Xue, Purdue University Calumet
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Usman Ghani, DeVry University; Ahmed S. Khan, DeVry University, DuPage
Tagged Divisions
Computing & Information Technology