Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 20 of 127)
A Critical, Empirical, and Reflexive Investigation of the Promise of Democratization in the Making Phenomenon
A Holistic Approach to Securing Memory Error Vulnerabilities in IoT Firmware
A LANGUAGE-BASED APPROACH FOR SECURING ACTIONSCRIPT/FLASH VULNERABILITIES
A User-Based Stance Analysis for Gauging Public Opinion with Stance Detection in Twitter Data
A framework for user-centric privacy management in smartphones regarding Bluetooth Low Energy beacons
ANALYSIS OF OPTICAL FIBER SPECKLE PATTERNS FOR DETECTION OF IVUS CATHETER TIP IN 3D SPACE: AN INTELLIGENT SENSOR RESEARCH
ARTIFICIAL FINANCIAL MARKET: AN AGENT-BASED APPROACH TO MODELING THE INFLUENCE OF TRADERS CHARACTERISTICS ON EMERGENT MARKET PHENOMENA
AUTOMATIC UNIT TESTING TO DETECT SECURITY VULNERABILITIES IN WEB APPLICATIONS
Active Cyber Defense Planning and Orchestration
An Evidence-Based Digital Nudging In Support Of Health Misinformation Assessment  On Social Media Sites
Art Authentication in an Untagged Art Database
Automated Classification and Mitigation of Cybersecurity Vulnerabilities
Autonomous Cyber Defense: Formal Models and Applications
Aviatar- An Augmented Reality System to Improve Pilot Performance for Unmanned Aerial Systems
BIO-INSPIRED CYBER SECURITY AND THREAT ANALYTICS
Behavioral Health Stigma: Breaking the code with Stigma Index
Better modeling of matching possibilities and uncertainty for offline visual multiple object tracking
Building Computational Representations of Medical Guidelines Using Large Language Models and Transfer Learning
Building an Efficient and Scalable Learning System on Heterogeneous Cluster
COMPETITIVE STORE CLOSING DURING AN ECONOMIC DOWNTURN: A MATHEMATICAL PROGRAMMING APPROACH