Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 5 results
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Emil H Salib, James Madison University; Ryan Lutz, James Madison University
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Northwest Missouri State University; Eugene Vasserman, Kansas State University; Eleanor C Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chris Foreman, Purdue University, West Lafayette; Matthew Turner, Purdue University (Statewide Technology); Karl Perusich, Purdue Statewide Technology DO NOT USE DUPE
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Kristine Donate, Florida Atlantic University; Ravi T. Shankar, Florida Atlantic University; Diana Mitsova, Florida Atlantic University; Francis Xavier McAfee, Florida Atlantic University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Ching-Kuang Shene, Michigan Technological University; Chaoli Wang, University of Notre Dame; Jun Tao, Michigan Technological University; Melissa Sue Keranen, Michigan Technological University; Jun Ma, Michigan Technological University; Jean Mayo, Michigan Technological University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology