Kendall E. Nygard

According to our database1, Kendall E. Nygard authored at least 81 papers between 1983 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning - A Review.
J. Cybersecur. Priv., July, 2022

NLP Text Analysis on Influential Factors of Persistence for Female Computer Science Undergraduates: A Comparative Study.
Proceedings of the International Conference on Information and Communication Technology for Development for Africa, 2022

2021
Enhancing Machine Learning Prediction in Cybersecurity Using Dynamic Feature Selector.
J. Cybersecur. Priv., March, 2021

2020
Threats and Alert Analytics in Autonomous Vehicles.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

Convolutional Neural Networks with LSTM for Intrusion Detection.
Proceedings of 35th International Conference on Computers and Their Applications, 2020

2019
A Survey on Cyber Security Threats and Challenges in Modem Society.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

Prediction Model Using Recurrent Neural Networks.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

Fuzzy Logic Approach Based on User behavior Trust in Cloud Security.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

Data Driven Analytics of Road Quality.
Proceedings of 34th International Conference on Computers and Their Applications, 2019

Software Engineering Principles and Security Vulnerabilities.
Proceedings of 34th International Conference on Computers and Their Applications, 2019

User Behavior and Trust Evaluation in Cloud Computing.
Proceedings of 34th International Conference on Computers and Their Applications, 2019

2018
Machine Learning Approach to Cyber Security in Aviation.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

2017
Test Focus Selection for Integration Testing.
Int. J. Softw. Eng. Knowl. Eng., 2017

Deception in cyberspace: An empirical study on a con man attack.
Proceedings of the IEEE International Conference on Electro Information Technology, 2017

Predicting Stock Close Price Using Microsoft Azure.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2015
A Behavior Marker for Measuring Non-Technical Skills of Software Professionals: An Empirical Study.
Int. J. Softw. Eng. Knowl. Eng., 2015

Hybridisation of classical unidimensional search with ABC to improve exploitation capability.
Int. J. Artif. Intell. Soft Comput., 2015

A Behavior Marker tool for measurement of the Non-Technical Skills of Software Professionals: An Empirical Investigation.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

2014
Measurement of the Non-Technical Skills of Software Professionals: An Empirical Investigation.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

2013
Heuristic clustering with secured routing in Heterogeneous Sensor Networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Genetic algorithm for instrument placement in smart grid.
Proceedings of the Fifth World Congress on Nature and Biologically Inspired Computing, 2013

Meta heuristics for prime factorization problem.
Proceedings of the Fifth World Congress on Nature and Biologically Inspired Computing, 2013

Energy efficient approach with integrated key management scheme for wireless sensor networks: c.2.2 [network protocols].
Proceedings of the second ACM MobiHoc workshop on Airborne networks and communications, 2013

Towards Test Focus Selection for Integration Testing Using Method Level Software Metrics.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

2012
Adapting Web Page Tables on Mobile Devices.
Int. J. Handheld Comput. Res., 2012

Social sensitivity and classroom team projects: an empirical investigation.
Proceedings of the 43rd ACM technical symposium on Computer science education, 2012

Key Management Scheme for Routing in Clustered Heterogeneous Sensor Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

Using Tabu-Voronoi clustering heuristics with key management scheme for heterogeneous sensor networks.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

Social sensitivity correlations with the effectiveness of team process performance: an empirical study.
Proceedings of the International Computing Education Research Conference, 2012

A QoS based Heuristics for Clustering in Two-Tier Sensor Networks.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012

Limiting transmit power of antennas in Heterogeneous Sensor Networks.
Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, 2012

2011
Lightweight Source Anonymity in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

UML Design Patters in Smart Grid.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011

Adjusted Voronoi Clusters in Two-Tier Sensor Networks.
Proceedings of the ISCA 26th International Conference on Computers and Their Applications, 2011

2010
Defending Malicious Collision Attacks in Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Interference-Aware Robust Topology Design in Multi-Channel Wireless Mesh Networks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Self-Protecting Networking Using Dynamic p-Cycle Construction Within Link Capacity Constraint.
Proceedings of IEEE International Conference on Communications, 2009

Genetic Algorithm for Clustering in Wireless Adhoc Sensor Networks.
Proceedings of the GeoSensor Networks, Third International Conference, 2009

REPARE: Regenerator Placement and Routing Establishment in Translucent Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

An Efficient Post-Deployment Key Establishment Scheme for Heterogeneous Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Adaptive Configuration of Pervasive Computing System with QoS Consideration.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Aspect-oriented specification of threat-driven security requirements.
Int. J. Comput. Appl. Technol., 2008

Performance Comparison of Ad Hoc Routing Protocols: An Implementation Study.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Multi-agent designs for ambient systems.
Proceedings of the 1st International ICST Conference on Ambient Media and Systems, 2008

2007
Self-healing sensor networks with distributed decision making.
Int. J. Sens. Networks, 2007

Software Engineering in Computer Science Capstone Projects.
Proceedings of the International Conference on Software Engineering Theory and Practice, 2007

An Efficient Public-Key-Based Heterogeneous Sensor Network Key Distribution Scheme.
Proceedings of the Global Communications Conference, 2007

2006
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets.
IEEE Trans. Software Eng., 2006

Distributed Decision Making Algorithm for Self-Healing Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

An Aspect-Oriented Approach to Security Requirements Analysis.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

Adaptive coverage in heterogeneous sensor network.
Proceedings of the ISCA 19th International Conference on Computer Applications in Industry and Engineering, 2006

2005
A State-Based Approach to Testing Aspect-Oriented Programs.
Proceedings of the 17th International Conference on Software Engineering and Knowledge Engineering (SEKE'2005), 2005

Clustering-Based Method for Data Envelopment Analysis.
Proceedings of The 2005 International Conference on Modeling, 2005

A threat-driven approach to modeling and verifying secure software.
Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering (ASE 2005), 2005

Simulation Study of Multiple Black Holes Attack on Mobile Ad Hoc Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

ANTS with Firefly Communication.
Proceedings of the 2005 International Conference on Artificial Intelligence, 2005

Fuzzy Petri net for UAV decision making.
Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005

2004
A Petri Net Based Software Architecture for UAV Simulation.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004

Neuro-Dynamic Programming for Task Allocation to Unmanned Aerial Vehicles.
Proceedings of the ISCA 13th International Conference on Intelligent and Adaptive Systems and Software Engineering, 2004

2003
Synchronized multi-point attack by autonomous reactive vehicles with simple local communication.
Proceedings of the 2003 IEEE Swarm Intelligence Symposium, 2003

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2003

Decentralized Search by Unmanned Air Vehicles Using Local Communication.
Proceedings of the International Conference on Artificial Intelligence, 2003

POMDP Planning for High Level UAV Decisions: Search vs. Strike.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

Genetic Algorithm to Improve a Solution for a General Assignment Problem.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

An Agent Based Framework for Modeling UAV's.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

Agent-Aided Executive Project Control.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

2002
Complexity in UAV cooperative control.
Proceedings of the American Control Conference, 2002

Multiple Task Allocation Problems with Team Formation.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002

An Agent-based Framework for UAV Collaboration.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002

2001
Measured average cell rate-based congestion avoidance scheme.
Int. J. Commun. Syst., 2001

Combinatorial Trading Mechanism for Task Allocation.
Proceedings of the 14th International Conference on Computer Applications in Industry and Engineering, 2001

Dynamic network flow optimization models for air vehicle resource allocation.
Proceedings of the American Control Conference, 2001

1998
Congestion avoidance with dynamic rate control in ATM networks.
Int. J. Commun. Syst., 1998

1993
Dynamic Trajectory Routing Using an Adaptive Search Method.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

The Effects of Initial Population in Genetic Search for Time Constrained Traveling Salesman Problems.
Proceedings of the ACM 21th Conference on Computer Science, 1993

1992
Conversational statistical comparison of routing algorithms.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

Genetic Algorithms for the Traveling Salesman Problem with Time Windows.
Proceedings of the Computer Science and Operations Research, 1992

1990
Neural Networks for Selective Vehicle Routing Heuristics.
INFORMS J. Comput., 1990

Improving the Performance of Genetic Algorithms in Automated Discovery of Parameters.
Proceedings of the Machine Learning, 1990

1985
Implementation techniques for the vehicle routing problem.
Comput. Oper. Res., 1985

1983
An interactive system for teaching input processes in simulation.
Proceedings of the 14th SIGCSE Technical Symposium on Computer Science Education, 1983


  Loading...