Phishing attacks and defenses JA Chaudhry, SA Chaudhry, RG Rittenhouse International Journal of Security and its Applications 10 (1), 247-256, 2016 | 170 | 2016 |
Security in Graphical Authentication RG Rittenhouse, JA Chaudry, M Lee International Journal of Security and Its Applications 7 (3), 347-356, 2013 | 28 | 2013 |
Dealing with sinkhole attacks in wireless sensor networks JA Chaudhry, U Tariq, MA Amin, RG Rittenhouse Advanced Science and Technology Letters 29 (2), 7-12, 2013 | 27 | 2013 |
Phishing: Classification and countermeasures JA Chaudhry, RG Rittenhouse 2015 7th International Conference on Multimedia, Computer Graphics and …, 2015 | 22 | 2015 |
Sinkhole Vulnerabilities in Wireless Sensor Networks JA Chaudhry, U Tariq, MA Amin, RG Rittenhouse International Journal of Security and Its Applications 8 (1), 401-410, 2014 | 16* | 2014 |
A Survey of Alternative Authentication Methods RG Rittenhouse, JA Chaudhry The International Conference on Recent Advances in Computer Systems …, 2016 | 14 | 2016 |
Vulnerabilities and verification of cryptographic protocols and their future in wireless body area networks J Chaudhry, UA Qidwai, RG Rittenhouse, M Lee 2012 International Conference on Emerging Technologies, 1-5, 2012 | 12 | 2012 |
Productivity and the Microcomputer RG Rittenhouse Management of Technology III, Institute of Industrial Engineers, Norcross, GA, 1992 | 10 | 1992 |
Ubiquitous Monitoring System for Critical Cardiac Abnormalities U Qidwai, JA Chaudhry, M Shakir, RG Rittenhouse Computer Applications for Bio-technology, Multimedia, and Ubiquitous City …, 2012 | 5 | 2012 |
The social dynamics of computer-based text processing RG Rittenhouse University of California, Irvine, 1987 | 5 | 1987 |
The market for wired city services RG Rittenhouse Acm Sigcas Computers and Society 10 (2), 2-13, 1979 | 4 | 1979 |
Productivity Assessment Issues in Office Automation RG Rittenhouse Proceedings, 16 th Hawaii International Conference on System Sciences …, 1983 | 3 | 1983 |
A Genetic Algorithm for PDA Optimal Path Generation Using GPS M Lee, YK Lee, RG Rittenhouse Applied Soft Computing, 2012 | 2 | 2012 |
Computer Based Messaging in a Research Organization RG Rittenhouse, University of California, Irvine. Dept. of 43rd ASIS Annual Meeting, 1980 | 1 | 1980 |
PROCEEDINGS-7TH INTERNATIONAL CONFERENCE ON MULTIMEDIA, COMPUTER GRAPHICS AND BROADCASTING, MULGRAB 2015 JA Chaudhry, RG Rittenhouse | | 2015 |
Power and Task Management in Wireless Body Area Network Based Medical Monitoring Systems R Rittenhouse, M Lee, J Chaudhry, U Qidwai Neural Information Processing, 404-414, 2012 | | 2012 |
Design Considerations for a Linux Lab R Rittenhouse, J Agirre, M Liles, L Liu International Conference on on Computer Science and its Applications (ICCSA …, 2004 | | 2004 |
Learning to Build Web-based Systems Using Open Source Software RG Rittenhouse The 7th World Multiconference on Systemics, Cybernetics and Informatics (SCI …, 2003 | | 2003 |
Hacker RG Rittenhouse Encyclopedia of Computer Science, 763-765, 2003 | | 2003 |
Sources of Open Source RG Rittenhouse Fourth World Multiconference on Systemics, Cybernetics and Informatics, 2000 | | 2000 |