Login / Signup
Thomas Nash
Publication Activity (10 Years)
Years Active: 1992-2017
Publications (10 Years): 4
Top Topics
Neighboring Nodes
Average End To End Delay
Law Enforcement Agencies
Digital Forensics
Top Venues
ICITST
ITiCSE
J. Digit. Forensics Secur. Law
</>
Publications
</>
Callum Brill
,
Thomas Nash
A comparative analysis of MANET routing protocols through simulation.
ICITST
(2017)
Thomas Nash
,
Aspen Olmsted
Performance vs. security: Implementing an immutable database in MySQL.
ICITST
(2017)
Thomas Nash
,
Aspen Olmsted
shinySDM: Point and click species distribution modeling.
ICITST
(2017)
Paul E. Anderson
,
Thomas Nash
,
Renée A. McCauley
Facilitating Programming Success in Data Science Courses through Gamified Scaffolding and Learn2Mine.
ITiCSE
(2015)
Thomas Nash
Book Review: Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects.
J. Digit. Forensics Secur. Law
8 (2) (2013)
Eugene D. Brooks III
,
Thomas Nash
,
Karl-Heinz Winkler
The Role of Computational Clusters.
SC
(1992)