default search action
Steven Gordon
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Steven Gordon 0001 (aka: Steven I. Gordon) — Ohio State University, Columbus, OH, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c22]Fariza Sabrina, Tony Sahama, Md. Mamunur Rashid, Steven Gordon:
Empowering Patients to Delegate and Revoke Access to Blockchain-based Electronic Health Records. ACSW 2023: 66-71 - 2022
- [j14]Md. Mamunur Rashid, Joarder Kamruzzaman, Tasadduq Imam, Santoso Wibowo, Steven Gordon:
A tree-based stacking ensemble technique with feature selection for network intrusion detection. Appl. Intell. 52(9): 9768-9781 (2022) - [j13]Md. Mamunur Rashid, Joarder Kamruzzaman, Mohammad Mehedi Hassan, Tasadduq Imam, Santoso Wibowo, Steven Gordon, Giancarlo Fortino:
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications. Comput. Secur. 120: 102783 (2022) - 2021
- [c21]Prasanna Balasooriya, Santoso Wibowo, Marilyn Wells, Steven Gordon:
Cloud Effects on Organisational Performance: A Local Government Perspective. ATIS 2021: 149-156 - 2020
- [j12]Ushik Shrestha Khwakhali, Prapun Suksompong, Steven Gordon:
Base station assisted relay selection in device-to-device communications. Int. J. Ad Hoc Ubiquitous Comput. 33(1): 22-35 (2020) - [j11]Ushik Shrestha Khwakhali, Prapun Suksompong, Steven Gordon:
Midpoint Relay Selection Using Social Trust and Battery Level to Enhance Throughput in Cooperative Device-to-Device Communications. Sensors 20(21): 6007 (2020) - [c20]Rubén Mancha, Steven Gordon:
Incumbent Organizations Transform Through Digital Platforms. AMCIS 2020
2010 – 2019
- 2019
- [j10]Jose Ortiz, Amber Grace Young, Michael D. Myers, Rudolph T. Bedeley, Donal Carbaugh, Hameed Chughtai, Elizabeth J. Davidson, Jordana J. George, Janis L. Gogan, Steven Gordon, Eean Grimshaw, Dorothy E. Leidner, Margaret Pulver, Ariel D. Wigdor:
Giving Voice to the Voiceless: The Use of Digital Technologies by Marginalized Groups. Commun. Assoc. Inf. Syst. 45: 2 (2019) - [j9]Sam Banani, Somsak Kittipiyakul, Surapa Thiemjarus, Steven Gordon:
Safety Message Verification Using History-Based Relative-Time Zone Priority Scheme. J. Comput. Networks Commun. 2019: 8568912:1-8568912:14 (2019) - 2018
- [j8]Sam Banani, Steven Gordon, Surapa Thiemjarus, Somsak Kittipiyakul:
Verifying Safety Messages Using Relative-Time and Zone Priority in Vehicular Ad Hoc Networks. Sensors 18(4): 1195 (2018) - [c19]María Elena Villapol, William Liu, Jairo A. Gutiérrez, Junaid Qadir, Steven Gordon, Jin Tan, Luca Chiaraviglio, Jinsong Wu, Wenjun Zhang:
A Sustainable Connectivity Model of the Internet Access Technologies in Rural and Low-Income Areas. SmartGIFT 2018: 93-102 - 2017
- [j7]Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, Komwut Wipusitwarakun:
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices. IEEE Trans. Inf. Forensics Secur. 12(12): 3024-3038 (2017) - [c18]Steven Gordon:
The Political Power of Social Media Revisited. AMCIS 2017 - 2016
- [j6]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin:
A Matrix Based ORAM: Design, Implementation and Experimental Analysis. IEICE Trans. Inf. Syst. 99-D(8): 2044-2055 (2016) - [c17]Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun:
Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space. ATIS 2016: 130-141 - [c16]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin:
Security and experimental performance analysis of a matrix ORAM. ICC 2016: 1-6 - 2015
- [c15]Dana Blouin, Steven Gordon:
A proxy-based Passive Duplicate Address Detection protocol for IPv6 wireless sensor networks. ICCSCE 2015: 248-253 - [c14]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin:
Analysis of Path ORAM toward Practical Utilization. NBiS 2015: 646-651 - [c13]Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin:
M-ORAM: A Matrix ORAM with Log N Bandwidth Cost. WISA 2015: 3-15 - 2014
- [j5]San Choosang, Steven Gordon:
A Coloured Petri Net Methodology and Library for Security Analysis of Network Protocols. J. Comput. 9(2): 243-256 (2014) - 2013
- [j4]Steven Gordon, Qimin Yang:
New nodal design for high throughput data vortex optical interconnection network. Opt. Switch. Netw. 10(4): 366-377 (2013) - 2011
- [j3]Jirawat Thaenthong, Steven Gordon:
Performance of Handovers between NEMO and Mobile Ad Hoc Networks Using Buffering. IEICE Trans. Commun. 94-B(10): 2763-2775 (2011) - [c12]Amuda James Abu, Steven Gordon:
Impact of Delay Variability on LEDBAT Performance. AINA 2011: 708-715
2000 – 2009
- 2009
- [c11]Amuda James Abu, Steven Gordon:
Performance Analysis of BitTorrent and Its Impact on Real-Time Video Applications. IAIT 2009: 1-10 - 2008
- [c10]Steven Gordon:
Formal Analysis of PANA Authentication and Authorisation Protocol. PDCAT 2008: 277-284 - 2007
- [c9]Binh Ngo, Steven Gordon, Aruna Jayasuriya:
Using Relay Balance and AQM Schemes to Improve Performance in Multi-hop Wireless Networks. WCNC 2007: 879-884 - [c8]Yinghua Guo, Steven Gordon, Sylvie Perreau:
A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks. WCNC 2007: 3105-3110 - 2006
- [c7]Ha Duong, Arek Dadej, Steven Gordon:
A General Framework for Context Transfer in Mobile IP Networks. VTC Spring 2006: 1017-1021 - 2005
- [j2]Ha Duong, Arek Dadej, Steven Gordon:
Proactive context transfer and forced handover in IEEE 802.11 wireless LAN based access networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(3): 32-44 (2005) - [r1]Steven Gordon, Paul Mulligan:
Infocratic Perspective on the Delivery of Personal Financial Services. Encyclopedia of Information Science and Technology (III) 2005: 1452-1457 - 2004
- [c6]Ha Hoang Duong, Arek Dadej, Steven Gordon:
Proactive context transfer in WLAN-based access networks. WMASH 2004: 61-70 - 2002
- [c5]Steven Gordon, Lars Michael Kristensen, Jonathan Billington:
Verification of a Revised WAP Wireless Transaction Protocol. ICATPN 2002: 182-202 - [c4]Steven Gordon, Arek Dadej:
Design of High Capacity Wireless LANs Based on 802.11b Technology. INTERWORKING 2002: 133-144 - [c3]Li Zheng, Arek Dadej, Steven Gordon:
Hybrid Quality of Service Architecture for Wireless/Mobile Environment. INTERWORKING 2002: 341-352 - 2000
- [c2]Steven Gordon, Jonathan Billington:
Analysing the WAP Class 2 Wireless Transaction Protocol Using Coloured Petri Nets. ICATPN 2000: 207-226
1990 – 1999
- 1999
- [c1]Steven Gordon, Jonathan Billington:
Modelling the WAP Transaction Service using Coloured Petri Nets. MDA 1999: 109-118 - 1998
- [j1]Steven Gordon, Jonathan Billington:
Analysing a Missile Simulator with Coloured Petri Nets. Int. J. Softw. Tools Technol. Transf. 2(2): 144-159 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint