Jessie Walker
Jessie Walker
STEM Resources
Dirección de correo verificada de
Citado por
Citado por
Unsafe at any key size; an analysis of the WEP encapsulation
J Walker
IEEE document 802 (00), 362, 2000
Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS
D Freet, R Agrawal, S John, JJ Walker
Proceedings of the 7th International Conference on Management of …, 2015
A layer based architecture for provenance in big data
R Agrawal, A Imran, C Seay, J Walker
2014 IEEE International Conference on Big Data (Big Data), 1-7, 2014
Cyber security for emergency management
J Walker, BJ Williams, GW Skelton
2010 IEEE International Conference on Technologies for Homeland Security …, 2010
Cyber Security Concerns for Emergency Management
JJ Walker
Edited by Burak Eksioglu, 39, 2012
Open source cloud management platforms and hypervisor technologies: A review and comparison
D Freet, R Agrawal, JJ Walker, Y Badr
SoutheastCon 2016, 1-8, 2016
Build it and they will come? Patron engagement via Twitter at historically black college and university libraries
B Stewart, J Walker
The Journal of Academic Librarianship 44 (1), 118-124, 2018
Unsafe at any key size
J Walker
An analysis of the WEP encapsulation, 2000
Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems
JJ Walker, T Jones, R Blount
2011 IEEE International Conference on Technologies for Homeland Security …, 2011
Scenario-based design for a cloud forensics portal
C Jackson, R Agrawal, J Walker, W Grosky
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
A layer based architecture for provenance in big data
A Imran, R Agrawal, J Walker, A Gomes
2014 IEEE International Conference on Big Data (Big Data), 29-31, 2014
Plan Recognition in Intrusion Detection Systems Using Logic Programming
S Chintabathina, J Walker,J, J Villacis, H Gomez,R
2012 IEEE International Conference on Technologies for Homeland Security (HST), 2012
Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments
JJ Walker, T Jones, M Mortazavi, R Blount
Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 …, 2011
The ARTSI Alliance: Recruiting Underrepresented Students to Computer Science and Robotics to Improve Society.
AB Williams, DS Touretzky, LV Manning, JJ Walker, C Boonthum, ...
AAAI Spring Symposium: Using AI to motivate greater participation in …, 2008
Solving Task Scheduling Problem in the Cloud Using a Hybrid Particle Swarm Optimization Approach
S Cheikh, JJ Walker
International Journal of Applied Metaheuristic Computing (IJAMC) 13 (1), 1-25, 2022
E-learning using Cyberinfrastructure
J Walker, S Swaid, M Mortazvi
International Journal of Emerging Technologies in Learning (iJET) 7 (2), 53-56, 2012
Data engineering 2.0 and United States workforce: Social implications of technology
J Walker, L Rock, N Harris
SoutheastCon 2018, 1-1, 2018
Developing a Crisis Informatics Ecosystem for Smart Cities: Geosciences and Remote Sensing
J Walker, L Rock, C Ramos, B Stewart
SoutheastCon 2018, 1-1, 2018
Hybrid Knowledge Mining Ecosystem
R Ghosh, N Gonzalez, C Ramos, J Walker, A Gebre, M Hasan
Proceedings of the 9th International Conference on Management of Digital …, 2017
Intrusion Detection for Ubiquitous & Pervasive Environments using Plan Recognition.
JJ Walker, T Jones, R Blount, K Aydin
J. Ubiquitous Syst. Pervasive Networks 3 (1), 1-5, 2011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20