Gordon W. Romney

According to our database1, Gordon W. Romney authored at least 15 papers between 1967 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Curriculum for Hands-on Artificial Intelligence Cybersecurity.
Proceedings of the 18th International Conference on Information Technology Based Higher Education and Training, 2019

A Trellis for Novice AI Practitioners.
Proceedings of the 18th International Conference on Information Technology Based Higher Education and Training, 2019

2013
Database modeling with Object Relationship Schema.
Proceedings of the 2013 12th International Conference on Information Technology Based Higher Education and Training, 2013

The agility, flexibility and efficiency of hypervisors in engineering education.
Proceedings of the 2013 12th International Conference on Information Technology Based Higher Education and Training, 2013

Comparison of TwoVirtual education labs: Closing the gap between online and brick-and-mortar schools.
Proceedings of the 2013 12th International Conference on Information Technology Based Higher Education and Training, 2013

2008
Integration of Services Computing Curricula in Information Technology.
Proceedings of the 2008 IEEE Congress on Services, Part I, 2008

2004
Protection methods against IP packet attacks.
Proceedings of the 5th Conference on Information Technology Education, 2004

Teaching security <i>best practices</i> by architecting and administering an IT security lab.
Proceedings of the 5th Conference on Information Technology Education, 2004

An isolated, multi-platform network sandbox for teaching IT security system engineers.
Proceedings of the 5th Conference on Information Technology Education, 2004

Neglect of information privacy instruction: a case of educational malpractice?
Proceedings of the 5th Conference on Information Technology Education, 2004

The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems.
Proceedings of the 5th Conference on Information Technology Education, 2004

Honeynets: an educational resource for IT security.
Proceedings of the 5th Conference on Information Technology Education, 2004

Safely train security engineers regarding the dangers presented by denial of service attacks.
Proceedings of the 5th Conference on Information Technology Education, 2004

1968
Real-time display of computer generated half-tone perspective pictures.
Proceedings of the Information Processing, Proceedings of IFIP Congress 1968, Edinburgh, UK, 5-10 August 1968, Volume 2, 1968

1967
Half-tone perspective drawings by computer.
Proceedings of the American Federation of Information Processing Societies: Proceedings of the AFIPS '67 Fall Joint Computer Conference, 1967


  Loading...