default search action
Susan J. Lincke
Person information
- affiliation: University of Wisconsin-Parkside, Kenosha, WI, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b2]Susan J. Lincke:
Information Security Planning - A Practical Approach, Second Edition. Springer 2024, ISBN 978-3-031-43117-3, pp. 3-445
2010 – 2019
- 2019
- [c20]Susan J. Lincke, Madhavi Adavi:
Modeling Security Risk with Three Views. SpringSim 2019: 1-12 - 2015
- [b1]Susan J. Lincke:
Security Planning - An Applied Approach. Springer 2015, ISBN 978-3-319-16026-9, pp. 3-287 - [c19]Susan J. Lincke, Stephen R. Hawk:
The Development of a Longitudinal Security Case Study. SIGITE 2015: 49-54 - 2013
- [c18]Susan J. Lincke, Christopher S. Hudspeth:
Energy efficiency: Teaching for accreditation, ethics, and technology. FIE 2013: 484-490 - 2012
- [c17]Susan J. Lincke, David Green:
Combating IS Fraud: A Teaching Case Study. AMCIS 2012 - [c16]Susan J. Lincke:
Planning organizational security: the health first case study. SIGITE Conference 2012: 3-8 - [c15]Susan J. Lincke:
Green IT: serving multiple purposes. SIGITE Conference 2012: 81-82 - [c14]Susan J. Lincke, Timothy H. Knautz, Misty D. Lowery:
Designing System Security with UML Misuse Deployment Diagrams. SERE (Companion) 2012: 57-61 - 2011
- [c13]Todd Burri, Susan J. Lincke:
Security planning for small businesses: A service-learning course. FIE 2011: 1
2000 – 2009
- 2009
- [c12]David Taylor-Fuller, Susan J. Lincke:
The development of a graphic multidimensional Markov Chain modeler to diagram large state spaces. SpringSim 2009 - 2008
- [c11]Susan J. Lincke:
Balancing CRRM Performance Goals with Load Shared Packet Services. WCNC 2008: 2969-2974 - 2007
- [c10]Susan J. Lincke:
Network security auditing as a community-based learning project. SIGCSE 2007: 476-480 - [c9]Andrew Holland, Susan J. Lincke:
Configuring a Lab to Support Community-Based Security Audit Projects. TRIDENTCOM 2007: 1-7 - 2005
- [j3]Susan J. Lincke:
Vertical handover policies for common radio resource management. Int. J. Commun. Syst. 18(6): 527-543 (2005) - [j2]Susan J. Lincke, Cynthia S. Hood:
Load sharing versus service balancing in integrated networks. J. Interconnect. Networks 6(1): 35-50 (2005) - 2004
- [c8]Susan Lincke-Salecker:
The Benefits of Load Sharing when Dimensioning Networks. Annual Simulation Symposium 2004: 115-124 - [c7]Susan Lincke-Salecker, Jeff Burton:
Modeling with Diverse Job Sizes: Gauss-Seidel Versus Multidimensional Markov Chain. International Conference on Wireless Networks 2004: 477-482 - [c6]Susan Lincke-Salecker:
Optimizing Adaptive Placement for Wireless Load Distribution. International Conference on Wireless Networks 2004: 611-616 - 2003
- [c5]Susan Lincke-Salecker, Cynthia S. Hood:
A Supernet: Engineering Traffic Across Network Boundaries. Annual Simulation Symposium 2003: 117-124 - 2002
- [j1]Susan Lincke-Salecker, Cynthia S. Hood:
Integrated networks that overflow speech and data between component networks. Int. J. Netw. Manag. 12(4): 235-257 (2002) - [c4]Susan Lincke-Salecker, Cynthia S. Hood:
An Introduction to Service Balancing. Communications, Internet, and Information Technology 2002: 89-93 - [c3]Susan Lincke-Salecker, Cynthia S. Hood:
A Case for Integrating Networks: Improved QoS for Multimedia Data. Communications, Internet, and Information Technology 2002: 257-262 - 2001
- [c2]Susan Lincke-Salecker, Cynthia S. Hood:
Packet data capacity in an integrated network. VTC Fall 2001: 1870-1874 - 2000
- [c1]Susan Lincke-Salecker, Cynthia S. Hood:
Traffic analysis of a diverse network that overflows dual mode phones. WCNC 2000: 824-828
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint