default search action
Kevin Daimi
Person information
- affiliation: University of Detroit Mercy, Detroit, MI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e8]Kevin Daimi, Abeer Alsadoon:
Proceedings of the Second International Conference on Advances in Computing Research, ACR 2024, Madrid, Spain, June 3-5, 2024. Lecture Notes in Networks and Systems 956, Springer 2024, ISBN 978-3-031-56949-4 [contents] - 2023
- [e7]Kevin Daimi, Abeer Alsadoon, Cathryn Peoples, Nour El Madhoun:
Emerging Trends in Cybersecurity Applications. Springer International Publishing 2023, ISBN 978-3-031-09639-6 [contents] - [e6]Kevin Daimi, Abeer Alsadoon:
Proceedings of the 2023 International Conference on Advances in Computing Research, ACR 2023, Orlando, FL, USA, May 8-10, 2023. Lecture Notes in Networks and Systems 700, Springer 2023, ISBN 978-3-031-33742-0 [contents] - [e5]Kevin Daimi, Abeer Alsadoon:
Proceedings of the Second International Conference on Innovations in Computing Research (ICR'23), Madrid, Spain, 4-6 September 2023. Lecture Notes in Networks and Systems 721, Springer 2023, ISBN 978-3-031-35307-9 [contents] - 2022
- [e4]Kevin Daimi, Abeer Alsadoon:
Proceedings of the ICR'22 International Conference on Innovations in Computing Research, Athens, Greece, 29-31 August, 2022. Advances in Intelligent Systems and Computing 1431, Springer 2022, ISBN 978-3-031-14053-2 [contents]
2010 – 2019
- 2018
- [e3]Kevin Daimi:
Computer and Network Security Essentials. Springer 2018, ISBN 978-3-319-58423-2 [contents] - 2010
- [c16]Kevin Daimi, Jinnan Song:
An Approach to Secure E-Visit Systems. Security and Management 2010: 487-494 - [c15]Kevin Daimi, Nizar Al-Holou, Utayba Mohammed:
An Interdisciplinary Minor in Computer and Network Security. Security and Management 2010: 505-510 - [c14]Kevin Daimi, Lu Wang:
Examining Class Dropping with Data Mining. DMIN 2010: 126-132 - [c13]Kevin Daimi, Gregory Grabowski:
Component-Based Professional Science Master in Bioinformatics. FECS 2010: 91-97 - [c12]Kevin Daimi, Katy Snyder:
Converting a Graduate Computer Science Program into Software Engineering. FECS 2010: 98-103 - [c11]Kevin Daimi, Luming Li, Xiaodan Lu, Nazar El-Nazeer:
Requirements Engineering for Home Health Care Software Systems. Software Engineering Research and Practice 2010: 83-91 - [e2]Hamid R. Arabnia, Kevin Daimi, Michael R. Grimaila, George Markowsky, Selim Aissi, Victor A. Clincy, Leonidas Deligiannidis, Donara Gabrielyan, Gevorg Margarov, Ashu M. G. Solo, Craig Valli, Patricia A. H. Williams:
Proceedings of the 2010 International Conference on Security & Management, SAM 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes. CSREA Press 2010, ISBN 1-60132-163-5 [contents]
2000 – 2009
- 2009
- [c10]Kevin Daimi:
A Framework for Online Examination Security Based on Cryptology and Biometrics. Security and Management 2009: 103-112 - [c9]Kevin Daimi, Ruth Miller:
Analyzing Student Retention with Data Mining. DMIN 2009: 55-60 - [c8]Kevin Daimi, Gregory Grabowski, Katy Snyder:
A Collaborative Bioinformatics Minor Design. FECS 2009: 341-345 - [c7]Kevin Daimi, Laura Nowicki:
Software Engineering for Pinochle Game Development. Software Engineering Research and Practice 2009: 77-84 - [e1]Hamid R. Arabnia, Kevin Daimi:
Proceedings of the 2009 International Conference on Security & Management, SAM 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes. CSREA Press 2009, ISBN 1-60132-126-0 [contents] - 2008
- [c6]Kevin Daimi, Ya-Chin Hsu, Yu-Ping Lin, Lingyun Zheng:
A Cryptographic Protocol for E-Voting Systems. Security and Management 2008: 505-513 - [c5]Kevin Daimi:
A Framework for Revitalizing Undergraduate Computer Science. FECS 2008: 53-62 - [c4]Kevin Daimi, Nassif Rayess:
The Role of Software Entrepreneurship in Computer Science Curriculum. FECS 2008: 332-338 - 2006
- [c3]Kevin Daimi, Katherine Snyder:
Security Requirements for Multimodal Biometric Systems. Security and Management 2006: 72-77 - [c2]Kevin Daimi, Katherine Snyder, Robert James:
Requirements Engineering for E-Voting Systems. Software Engineering Research and Practice 2006: 259-265 - 2005
- [c1]Kevin Daimi, Clarence Wilson:
Electronic Voting Systems Security Requirements Engineering. Software Engineering Research and Practice 2005: 230-238 - 2001
- [j1]Kevin Daimi:
Identifying Syntactic Ambiguities in Single-Parse Arabic Sentence. Comput. Humanit. 35(3): 333-349 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-27 16:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint