Unsafe at any key size; an analysis of the WEP encapsulation J Walker IEEE document 802 (00), 362, 2000 | 419 | 2000 |
Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS D Freet, R Agrawal, S John, JJ Walker Proceedings of the 7th International Conference on Management of …, 2015 | 62 | 2015 |
A layer based architecture for provenance in big data R Agrawal, A Imran, C Seay, J Walker 2014 IEEE International Conference on Big Data (Big Data), 1-7, 2014 | 30 | 2014 |
Cyber security for emergency management J Walker, BJ Williams, GW Skelton 2010 IEEE International Conference on Technologies for Homeland Security …, 2010 | 28 | 2010 |
Cyber Security Concerns for Emergency Management JJ Walker Edited by Burak Eksioglu, 39, 2012 | 25 | 2012 |
Open source cloud management platforms and hypervisor technologies: A review and comparison D Freet, R Agrawal, JJ Walker, Y Badr SoutheastCon 2016, 1-8, 2016 | 23 | 2016 |
Build it and they will come? Patron engagement via Twitter at historically black college and university libraries B Stewart, J Walker The Journal of Academic Librarianship 44 (1), 118-124, 2018 | 19 | 2018 |
Unsafe at any key size J Walker An analysis of the WEP encapsulation, 2000 | 18 | 2000 |
Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems JJ Walker, T Jones, R Blount 2011 IEEE International Conference on Technologies for Homeland Security …, 2011 | 14 | 2011 |
Scenario-based design for a cloud forensics portal C Jackson, R Agrawal, J Walker, W Grosky 2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015 | 12 | 2015 |
A layer based architecture for provenance in big data A Imran, R Agrawal, J Walker, A Gomes 2014 IEEE International Conference on Big Data (Big Data), 29-31, 2014 | 7 | 2014 |
Plan Recognition in Intrusion Detection Systems Using Logic Programming S Chintabathina, J Walker,J, J Villacis, H Gomez,R 2012 IEEE International Conference on Technologies for Homeland Security (HST), 2012 | 6 | 2012 |
Solving Task Scheduling Problem in the Cloud Using a Hybrid Particle Swarm Optimization Approach S Cheikh, JJ Walker International Journal of Applied Metaheuristic Computing (IJAMC) 13 (1), 1-25, 2022 | 5 | 2022 |
Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments JJ Walker, T Jones, M Mortazavi, R Blount Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 …, 2011 | 5 | 2011 |
The ARTSI Alliance: Recruiting Underrepresented Students to Computer Science and Robotics to Improve Society. AB Williams, DS Touretzky, LV Manning, JJ Walker, C Boonthum, ... AAAI Spring Symposium: Using AI to motivate greater participation in …, 2008 | 4 | 2008 |
E-learning using Cyberinfrastructure J Walker, S Swaid, M Mortazvi International Journal of Emerging Technologies in Learning (iJET) 7 (2), 53-56, 2012 | 3 | 2012 |
Data engineering 2.0 and United States workforce: Social implications of technology J Walker, L Rock, N Harris SoutheastCon 2018, 1-1, 2018 | 2 | 2018 |
A Study of COVID‐19 Information Behaviors among Black Americans BJ Stewart, B Ju, JJ Walker Proceedings of the Association for Information Science and Technology 60 (1 …, 2023 | 1 | 2023 |
Developing a Crisis Informatics Ecosystem for Smart Cities: Geosciences and Remote Sensing J Walker, L Rock, C Ramos, B Stewart SoutheastCon 2018, 1-1, 2018 | 1 | 2018 |
Hybrid Knowledge Mining Ecosystem R Ghosh, N Gonzalez, C Ramos, J Walker, A Gebre, M Hasan Proceedings of the 9th International Conference on Management of Digital …, 2017 | 1 | 2017 |