Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 6 results
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Pat Smith, Oklahoma Christian University of Science and Arts
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; John B. Southworth, East Carolina University
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Chengcheng Li, University of Cincinnati; Rucha Kulkarni, University of Cincinnati
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Sarah A. Cunha; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Te-Shun Chou, East Carolina University; Steve Keith Baker, East Carolina University; Miguel Vega-Herrera
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Di Ma, University of Michigan - Dearborn
Tagged Divisions
Computing & Information Technology