Steven Gordon
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Bibliography
2023
Empowering Patients to Delegate and Revoke Access to Blockchain-based Electronic Health Records.
Proceedings of the 2023 Australasian Computer Science Week, 2023
2022
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications.
Comput. Secur., 2022
A tree-based stacking ensemble technique with feature selection for network intrusion detection.
Appl. Intell., 2022
2021
Proceedings of the Applications and Techniques in Information Security, 2021
2020
Midpoint Relay Selection Using Social Trust and Battery Level to Enhance Throughput in Cooperative Device-to-Device Communications.
Sensors, 2020
Int. J. Ad Hoc Ubiquitous Comput., 2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
J. Comput. Networks Commun., 2019
Giving Voice to the Voiceless: The Use of Digital Technologies by Marginalized Groups.
Commun. Assoc. Inf. Syst., 2019
2018
Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks.
Sensors, 2018
A Sustainable Connectivity Model of the Internet Access Technologies in Rural and Low-Income Areas.
Proceedings of the Smart Grid and Innovative Frontiers in Telecommunications, 2018
2017
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
IEICE Trans. Inf. Syst., 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the Applications and Techniques in Information Security, 2016
2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
A proxy-based Passive Duplicate Address Detection protocol for IPv6 wireless sensor networks.
Proceedings of the 2015 IEEE International Conference on Control System, 2015
2014
A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols.
J. Comput., 2014
2013
Opt. Switch. Netw., 2013
2011
IEICE Trans. Commun., 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2009
Proceedings of the Advances in Information Technology - Third International Conference, 2009
2008
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
2007
Using Relay Balance and AQM Schemes to Improve Performance in Multi-hop Wireless Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
2006
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006
2005
Proactive context transfer and forced handover in IEEE 802.11 wireless LAN based access networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005
Proceedings of the Encyclopedia of Information Science and Technology (5 Volumes), 2005
2004
Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2004
2002
Hybrid Quality of Service Architecture for Wireless/Mobile Environment.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002
Design of High Capacity Wireless LANs Based on 802.11b Technology.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002
Proceedings of the Applications and Theory of Petri Nets 2002, 2002
2000
Proceedings of the Application and Theory of Petri Nets 2000, 2000
1999
Proceedings of the Mobile Data Access, First International Conference, 1999
1998
Int. J. Softw. Tools Technol. Transf., 1998