Victor Clincy

Affiliations:
  • Kennesaw State University, College of Science and Math, GA, USA


According to our database1, Victor Clincy authored at least 62 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Quantum Generative Adversarial Network-based Intrusion Detection System.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Exploring the Vulnerabilities of Machine Learning and Quantum Machine Learning to Adversarial Attacks Using a Malware Dataset: A Comparative Analysis.
Proceedings of the IEEE International Conference on Software Services Engineering, 2023

2022
Comprehensive Feature Extraction for Cross-Project Software Defect Prediction.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

Authentic Learning of Machine Learning in Cybersecurity with Portable Hands-on Labware: Neural Network Algorithms for Network Denial of Service (DOS) Detection.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Smart Connected Aircraft: Towards Security, Privacy, and Ethical Hacking.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Ride-Hailing for Autonomous Vehicles: Hyperledger Fabric-Based Secure and Decentralize Blockchain Platform.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Security and Privacy Analysis of mhealth Application: A Case Study.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Hands-on Lab on Smart City Vulnerability Exploitation.
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

2019
Blockchain Development Platform Comparison.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

IoT Malware Analysis.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Web Application Firewall: Network Security Models and Configuration.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Web service injection attack detection.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2016
Anomalous Android Application Detection with Latent Semantic Indexing.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
A Novel Approach to Detect Tampered Wireless Network Applications.
Proceedings of the 12th International Conference on Information Technology, 2015

2014
Detection of repackaged Android Malware.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

Authentic learning in network and security with portable labs.
Proceedings of the IEEE Frontiers in Education Conference, 2014

Labware for networking protocols and wireless security using Android-enabled mobile devices.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Subjective Evaluation of Latency and Packet Loss in a Cloud-Based Game.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

2010
Wireless Technology Performance Comparison.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

Technological Advances to Distance Learning.
Proceedings of the 2010 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2010

Virtualization, is it worth it? A Technical Approach.
Proceedings of the 2010 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2010

Outsourcing Your Data Warehouse and Business Intelligence Activities; Is Your Data Safe?
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Security and network analysis using simulation.
J. Comput. Sci. Coll., 2009

IPng Transistional Study.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

A Study on TCP/IPng Performance.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

2008
Simulating networking and security issues.
J. Comput. Sci. Coll., 2008

Performance Study on Mobile IPv4 Vs IPv6.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Accuracy of the IT Guru Wireless Model.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Effective Corporate Information Security Policies.
Proceedings of the 2008 International Conference on Internet Computing, 2008

Enhancements and Performance Evaluation of WANs.
Proceedings of the 2008 International Conference on Communications in Computing, 2008

2007
Gaming Traffic Characterization Over A Wireless Network.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

Wireless VPN Backbone Performance for Database Transactions.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

A Mobile IPv6 Study.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

Demonstrating Database Clustering Over A Wired VPN Network Link.
Proceedings of the 2007 International Conference on Internet Computing, 2007

Effect of TCP Window Scaling on TCP Performance.
Proceedings of the 2007 International Conference on Internet Computing, 2007

Analysis of the Internetworking Protocol Version 6.
Proceedings of the 2007 International Conference on Internet Computing, 2007

Designing a Virtual Private Network - A Real Life Illustration.
Proceedings of the 2007 International Conference on Communications in Computing, 2007

A Firewall Simulation Study.
Proceedings of the 2007 International Conference on Communications in Computing, 2007

2006
Free tools for teaching & researching wireless networking concepts.
J. Comput. Sci. Coll., 2006

Evaluation and illustration of a free software (FS) tool for wireless network monitoring and security.
J. Comput. Sci. Coll., 2006

The future leading mobility protocol: mobile IPv4 OR Mobile IPv6?
J. Comput. Sci. Coll., 2006

802.16, Next Generation Wireless.
Proceedings of the 2006 International Conference on Wireless Networks, 2006

Wireless Intrusion Detection Technologies to Determine Friend or Foe.
Proceedings of the 2006 International Conference on Wireless Networks, 2006

A Real-Time Study of 802.11b and 802.11g.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Tor - A Tool to Disguise Internet Communications.
Proceedings of the 2006 International Conference on Internet Computing & Conference on Computer Games Development, 2006

M-Commerce, Emergent Platform For Training & Educating.
Proceedings of the 2006 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2006

Future Technological Approaches to Distance Learning.
Proceedings of the 2006 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2006

IP Queuing Analysis.
Proceedings of the 2006 International Conference on Communications in Computing, 2006

2005
A Taxonomy of free Network Sniffers for teaching and research.
J. Comput. Sci. Coll., 2005

Using an easy-to-use and free tool in teaching and researching networks and security issues.
J. Comput. Sci. Coll., 2005

Traffic Analysis of a Multimedia Network.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

Adaptive Traffic Engineering Effect on Router Delay using MPLS.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

A Defense-In-Depth Approach to Secure Wireless LANs.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

Configuration Approach To Improving Online Game Server Load.
Proceedings of The 2005 International Conference on Internet Computing, 2005

Performance Evaluation of IPv4 vs. IPv6.
Proceedings of the 2005 International Conference on Communications in Computing, 2005

The SONET ring transport planning problem.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

Using a simulation environment for teaching and researching networking topics.
Proceedings of the 43nd Annual Southeast Regional Conference, 2005

2004
Title: ITGuru - a powerful network simulation environment for teaching and research.
J. Comput. Sci. Coll., 2004

An overview of telecommunications transport network planning.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2004

Voice Over Multi-Protocol Label Switching (VoMPLS) - A Case Study.
Proceedings of the International Conference on Communications in Computing, 2004

2003
Software development productivity and cycle time reduction.
J. Comput. Sci. Coll., 2003

Creating an Environment for a High Performance Software Engineering Teams - A Real Life Perspective.
Proceedings of the International Conference on Software Engineering Research and Practice, 2003


  Loading...