Joseph S. Sherif

According to our database1, Joseph S. Sherif authored at least 20 papers between 1992 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
A dynamic traffic allocation model of voice over internet protocol and public switched telephone network.
Kybernetes, 2012

Human resources in an enriched environment of business intelligence.
Kybernetes, 2012

Global human resources (HR) information systems.
Kybernetes, 2012

Managing homeland security: deployment, vigilance and persistence.
Kybernetes, 2012

2011
Cryptography: A security pillar of privacy, integrity and authenticity of data communication.
Kybernetes, 2011

2008
The semantic web: a catalyst for future e-business.
Kybernetes, 2008

2007
Strategies for successful CRM implementation.
Inf. Manag. Comput. Secur., 2007

2006
Effects of unsolicited e-mail on the virtual business world.
Kybernetes, 2006

Software faults: A quantifiable definition.
Adv. Eng. Softw., 2006

2003
Deployment of anti-virus software: a case study.
Inf. Manag. Comput. Secur., 2003

Intrusion detection: the art and the practice. Part I.
Inf. Manag. Comput. Secur., 2003

Intrusion detection: methods and systems. Part II.
Inf. Manag. Comput. Secur., 2003

Software Security Checklist for the Software Life Cycle.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

2002
Intrusion Detection: Systems and Models.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002

2000
Using Simulation To Evaluate Resource Utilization Strategies.
Simul., 2000

1998
Metrics for object-oriented software projects.
J. Syst. Softw., 1998

1997
Software-Engineering Process Simulation model (SEPS).
J. Syst. Softw., 1997

Object-oriented software design utilizing Quality Function Deployment.
J. Syst. Softw., 1997

1995
Development and application of composite complexity models and a relative complexity metric in a software maintenance environment.
J. Syst. Softw., 1995

1992
An analysis of defect densities found during software inspections.
J. Syst. Softw., 1992


  Loading...