Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Stephen J. Zilora, Tom Ayers, Daniel S. Bogaard (eds.) |
Proceedings of the 6th Annual Conference on Research in Information Technology, RIIT '17, Rochester, New York, USA, October 4-7, 2017 |
RIIT |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chad A. Arney, Xinli Wang |
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Amos O. Olagunju, Farouk Samu |
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Deborah LaBelle, Jawaher Alsulami, Jim Leone |
Effects of using iPads on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Raymond A. Hansen, Benjamin Peterson, Timothy Becker |
Investigating the Security of Nexus 1000V Virtual Switches in VMware ESXi Hypervisors. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zahra Alqubaiti, Lei Li 0021, Jing He 0001 |
The Paradox of Social Media Security: Users' Perceptions versus Behaviors. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Debasis Bhattacharya, Mario Canul, Saxon Knight |
Impact of the Physical Web and BLE Beacons. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marc J. Dupuis |
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ricardo A. Calix, Armando Cabrera, Irshad Iqbal |
Analysis of Parallel Architectures for Network Intrusion Detection. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nigel Jacob |
Using Technology to Build Compassion. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | C. Richard G. Helps, Clarissa Helps |
Measuring Stylus and Tablet Performance for Usability in Sketching. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sam Chung, Cheolmin Sky Moon, Barbara Endicott-Popovsky |
Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Ramirez, Alfredo Fernandez |
MP4 Steganography: Analyzing and Detecting TCSteg. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marc J. Dupuis, Samreen Khadeer |
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat. |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Deborah Boisvert, Stephen J. Zilora (eds.) |
Proceedings of the 5th Annual Conference on Research in Information Technology, RIIT 2016, Boston, MA, USA, September 28 - October 1, 2016 |
RIIT |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mark O. Milhouse |
Framework for Autonomous Delivery Drones. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thivviyan Amirthalingam, John A. Springer |
Studying the Effect of Multi-Query Functionality on a Correlation-Aware SQL-To-MapReduce Translator. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Brooks, Baijian Yang 0001 |
A Man-in-the-Middle attack against OpenDayLight SDN controller. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Felipe Sierra, Anthony Ramirez |
Defending Your Android App. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sung Kim, Derek L. Hansen, C. Richard G. Helps |
Information Technology Research in the Academy: Insights from Theses and Dissertations. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yalinne Castelan, Ben Khodja |
MP3 Steganography Techniques. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shobhit N. Dutia, Tae H. Oh, Young H. Oh |
Developing Automated Input Generator for Android Mobile Device to Evaluate Malware Behavior. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xinli Wang, Yan Bai, Lihui Hu |
Certification with Multiple Signatures. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mark Stockman, Robert Heile, Anthony Rein |
An Open-Source Honeynet System to Study System Banner Message Effects on Hackers. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nicole M. Hands, Baijian Yang 0001, Raymond A. Hansen |
A Study on Botnets Utilizing DNS. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Amber Settle, Terry Steinbach, Deborah Boisvert (eds.) |
Proceedings of the 4th Annual ACM Conference on Research in Information Technology, RIIT 2015, Chicago, IL, USA, September 30 - October 3, 2015 |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chi Zhang 0028, Xihui Zhang 0001, Richard Halstead-Nussloch |
Validating the Assessment Metrics for Mobile Health Apps: Preliminary Outcomes from a Pilot Study. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sambasivam Ramasubramanian, Sam Chung, Seungwan Ryu, Ling Ding |
Secure and Smart Media Sharing Based on a Novel Mobile Device-to-Device Communication Framework with Security and Procedures. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Debasis Bhattacharya |
Evolution of Cybersecurity Issues In Small Businesses. |
RIIT |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maya Embar, Louis F. McHugh IV, William R. Wesselman |
Printer watermark obfuscation. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kiranmayi Kotipalli, Shan Suthaharan |
Modeling of class imbalance using an empirical approach with spambase dataset and random forest classification. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Scott J. Pack, Dale C. Rowe |
Three-dimensional wireless heat mapping and security assessment using multi-rotor aerial drones. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | David Stacey |
Passive warden using statistical steganalysis. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Flavio Villanustre |
Big data trends and evolution: a human perspective. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Elizabeth Fokes, Lei Li 0021 |
A survey of security vulnerabilities in social networking media: the case of facebook. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Owen Riley, Jessica M. Richards, Joseph J. Ekstrom, Kevin Tew |
Termediator II: measuring term polysemy using semantic clustering. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Brandeis H. Marshall, Shweta Sareen, John A. Springer, Tahira Reid |
Eye tracking data understanding for product representation studies. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniel W. Yoas, Greg Simco |
Using time-series analysis to provide long-term CPU utilization prediction. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Youngho Kim, Bill Stackpole, Tae Hwan Oh |
Analysis of mobile malware based on user awareness. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Becky Rutherfoord, Lei Li 0021, Susan Van de Ven, Amber Settle, Terry Steinbach (eds.) |
Proceedings of the 3rd annual conference on Research in information technology, RIIT 2014, Atlanta, GA, USA, October 15-18, 2014 |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Matthew LaPointe, Lucas Walker, Matthew Nelson, Justin Shananaquet, Xinli Wang |
Comparing public and private iaas cloud models. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | James P. Dupuis, Michael C. Stinson |
SMS notifications for missed calls expanding mobility for TDM environments. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ben Khodja |
Probabilistically detecting steganography within MP3 files. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weijie Wang, Baijian Yang 0001, Yingjie Victor Chen |
Detecting subtle port scans through characteristics based on interactive visualization. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mark Stockman |
Insider hacking: applying situational crime prevention to a new white-collar crime. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | William Kim, Sam Chung, Barbara Endicott-Popovsky |
Software architecture model driven reverse engineering approach to open source software development. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kelley Misata, Raymond A. Hansen, Baijian Yang 0001 |
A taxonomy of privacy-protecting tools to browse the world wide web. |
RIIT |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Soon K. Bang, Sam Chung, Young Choh, Marc J. Dupuis |
A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sinan Nacy, Tae Tom Oh, Jim Leone |
Implementation of SHA-1 and ECDSA for vehicular ad-hoc network using NS-3. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Louis Turnbull, Henry Ochieng, Chris Kadlec, Jordan Shropshire |
Improving service continuity: IT disaster prevention and mitigation for data centers. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kellie E. Kercher, Dale C. Rowe, Haley Dennis |
Using agent technologies to correlate and compare anti-malware software. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jessica M. Richards, Owen Riley, Joseph J. Ekstrom, Kevin Tew |
Termediator: early studies in terminological mediation between disciplines. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | William W. Agresti |
Advancing the IT research agenda. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Robert L. Walter, Sergey Berezin, Ankur Teredesai |
ChronoZoom: travel through time for education, exploration, and information technology research. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Tate, Gregory J. Conti, Edward Sobiesk |
Automated webpage evaluation. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abdel Ejnioui, Carlos E. Otero, Abrar A. Qureshi |
Formalizing the design of embedded software using sequence diagrams and abstract state machines. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sargon Hasso, Carl Carlson |
Design patterns as first-class connectors. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | William D. Armitage, Robert S. Friedman, Ken A. Baker (eds.) |
Proceedings of the 2nd annual conference on Research in information technology, RIIT 2013, Orlando, Florida, USA, October 10-12, 2013 |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Francis N. Mensah, Chia-Chi Teng |
Security mechanisms for multi-user collaborative CAx. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xinli Wang, Alex Kordas, Lihui Hu, Matt Gaedke, Derrick W. Smith |
Administrative evaluation of intrusion detection system. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jack Zheng |
Sitemap explorer: browser integrated web navigation. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daniel W. Yoas, Greg Simco |
Resource utilization prediction: long term network web service traffic. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charles Hopkins |
Securing insurance reimbursements with RFID technologies. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Joseph J. Ekstrom, William W. Agresti, Gregory W. Hislop, Han Reichgelt, Charlene Chuck Walrad |
The emergence of an it 'profession'. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mikhail Zaturenskiy |
MP3 files as a steganography medium. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fernando Seror Garcia |
DNS: (do not suspect). |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Norman H. Villaroman, Dale C. Rowe, C. Richard G. Helps |
Design and evaluation of face tracking user interfaces for accessibility. |
RIIT |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daniel W. Yoas, Greg Simco |
Resource utilization prediction: a proposal for information technology research. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas Aaron Robison, Thomas J. Hacker |
Comparison of VM deployment methods for HPC education. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bill Miller, Dale C. Rowe |
A survey SCADA of and critical infrastructure incidents. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Hansen, Bikalpa Neupane, Barry M. Lunt, Richard Ofori |
Identifying and evaluating information technology bachelor's degree programs. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nancy E. Parks |
Testing & quantifying ERP usability. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Thomas E. Bunton, Jeffrey L. Brewer |
Discovering workplace motivators for the millennial generation of IT employees. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Abdel Ejnioui, Carlos E. Otero, Luis Daniel Otero |
A simulation-based fuzzy multi-attribute decision making for prioritizing software requirements. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Robert S. Friedman, Mark Stockman, Han Reichgelt, William W. Agresti, Joseph J. Ekstrom |
Defining IT research. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Hetal Jasani |
Evaluations of AODV and DSR for QOS requirements. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Norman H. Villaroman, Dale C. Rowe |
Improving accuracy in face tracking user interfaces using consumer devices. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dale C. Rowe, Barry M. Lunt |
Mapping the cyber security terrain in a research context. |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Randy W. Connolly, Jeffrey L. Brewer (eds.) |
Proceedings of the 1st Annual conference on Research in information technology, RIIT 2012, Calgary, AB, Canada, October 10-13, 2012 |
RIIT |
2012 |
DBLP DOI BibTeX RDF |
|