Seguir
Jessie Walker
Jessie Walker
STEM Resources
Dirección de correo verificada de stem-resources.org
Título
Citado por
Citado por
Año
Unsafe at any key size; an analysis of the WEP encapsulation
J Walker
IEEE document 802 (00), 362, 2000
4162000
Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS
D Freet, R Agrawal, S John, JJ Walker
Proceedings of the 7th International Conference on Management of …, 2015
602015
A layer based architecture for provenance in big data
R Agrawal, A Imran, C Seay, J Walker
2014 IEEE International Conference on Big Data (Big Data), 1-7, 2014
302014
Cyber security for emergency management
J Walker, BJ Williams, GW Skelton
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
252010
Cyber Security Concerns for Emergency Management
JJ Walker
Edited by Burak Eksioglu, 39, 2012
242012
Open source cloud management platforms and hypervisor technologies: A review and comparison
D Freet, R Agrawal, JJ Walker, Y Badr
SoutheastCon 2016, 1-8, 2016
232016
Build it and they will come? Patron engagement via Twitter at historically black college and university libraries
B Stewart, J Walker
The Journal of Academic Librarianship 44 (1), 118-124, 2018
182018
Unsafe at any key size
J Walker
An analysis of the WEP encapsulation, 2000
182000
Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems
JJ Walker, T Jones, R Blount
2011 IEEE International Conference on Technologies for Homeland Security …, 2011
142011
Scenario-based design for a cloud forensics portal
C Jackson, R Agrawal, J Walker, W Grosky
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
122015
A layer based architecture for provenance in big data
A Imran, R Agrawal, J Walker, A Gomes
2014 IEEE International Conference on Big Data (Big Data), 29-31, 2014
72014
Plan Recognition in Intrusion Detection Systems Using Logic Programming
S Chintabathina, J Walker,J, J Villacis, H Gomez,R
2012 IEEE International Conference on Technologies for Homeland Security (HST), 2012
62012
Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments
JJ Walker, T Jones, M Mortazavi, R Blount
Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 …, 2011
42011
The ARTSI Alliance: Recruiting Underrepresented Students to Computer Science and Robotics to Improve Society.
AB Williams, DS Touretzky, LV Manning, JJ Walker, C Boonthum, ...
AAAI Spring Symposium: Using AI to motivate greater participation in …, 2008
42008
Solving Task Scheduling Problem in the Cloud Using a Hybrid Particle Swarm Optimization Approach
S Cheikh, JJ Walker
International Journal of Applied Metaheuristic Computing (IJAMC) 13 (1), 1-25, 2022
32022
E-learning using Cyberinfrastructure
J Walker, S Swaid, M Mortazvi
International Journal of Emerging Technologies in Learning (iJET) 7 (2), 53-56, 2012
32012
Data engineering 2.0 and United States workforce: Social implications of technology
J Walker, L Rock, N Harris
SoutheastCon 2018, 1-1, 2018
22018
Developing a Crisis Informatics Ecosystem for Smart Cities: Geosciences and Remote Sensing
J Walker, L Rock, C Ramos, B Stewart
SoutheastCon 2018, 1-1, 2018
12018
Hybrid Knowledge Mining Ecosystem
R Ghosh, N Gonzalez, C Ramos, J Walker, A Gebre, M Hasan
Proceedings of the 9th International Conference on Management of Digital …, 2017
12017
Intrusion Detection for Ubiquitous & Pervasive Environments using Plan Recognition.
JJ Walker, T Jones, R Blount, K Aydin
J. Ubiquitous Syst. Pervasive Networks 3 (1), 1-5, 2011
12011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20