Thornton, David J.
49  results:
Search for persons X
?
1

The Potential of Gaming to Ameliorate Human Factors in Info..:

, In: Global Perspectives on Information Security Regulations; Advances in Information Security, Privacy, and Ethics,
Thornton, David - p. 72-99 , 2022
 
?
 
?
3

Analysis of Player Behavior and EEG Readings in a Cybersecu..:

, In: Proceedings of the 2020 ACM Southeast Conference,
Thornton, David ; Turley, Falynn - p. 149-153 , 2020
 
?
 
?
5

Prospects for the Future of SVP Treatment Programs:

, In: Sexually Violent Predators: A Clinical Science Handbook,
Thornton, David - p. 367-377 , 2019
 
?
 
?
8

List of Contributors:

, In: Emerging Trends in ICT Security,
Abdelouahab, Zair ; Aburrous, Maher ; Adebola, Eyidayo... - p. xxi-xxviii , 2014
 
?
9

Wireless vulnerability of SCADA systems:

, In: Proceedings of the 50th Annual Southeast Regional Conference,
 
?
10

A web-based programming environment for LEGO mindstorms rob..:

, In: Proceedings of the 43rd annual Southeast regional conference - Volume 2,
Garrett, Aaron ; Thornton, David - p. 349-350 , 2005
 
?
 
?
14

Teaching CS50 with AI: Leveraging Generative Artificial Int..:

, In: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 2,
Liu, Rongxin ; Zenke, Carter ; Liu, Charlie... - p. 1927 ff. , 2024
 
?
15

Teaching CS50 with AI: Leveraging Generative Artificial Int..:

, In: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1,
Liu, Rongxin ; Zenke, Carter ; Liu, Charlie... - p. 750-756 , 2024
 
1-15