Linda Markowsky

According to our database1, Linda Markowsky authored at least 10 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Lanchester's Equations and Cyberwarfare.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

Lattice-Based Technique to Visualize and Compare Regional Terrorism Using the Global Terrorism Database.
Proceedings of the 2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), 2021

2019
Lattice Data Analytics: The Poset of Irreducibles and the MacNeille Completion.
Proceedings of the 10th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2019

2018
Local Feature Based CNN for Face Recognition.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

2015
Scanning for vulnerable devices in the Internet of Things.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2013
Adapting American ERP systems for China: Cross-cultural issues and a case study.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Unsupervised clustering with the Octave Fuzzy Logic Toolkit.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

2010
Consumer Guide to Online Cybersecurity Resources: UMCEG.
Proceedings of the 2010 International Conference on Security & Management, 2010

An SELinux Sourcebook for Cybersecurity Educators.
Proceedings of the 2010 International Conference on Security & Management, 2010

2007
Survey of Supercomputer Cluster Security Issues.
Proceedings of the 2007 International Conference on Security & Management, 2007


  Loading...