Search results

  • CSV Spreadsheet
  • RSS Feed
(1 - 20 of 34)
Reasoning about recognizability in security protocols
ARTIFICIAL FINANCIAL MARKET: AN AGENT-BASED APPROACH TO MODELING THE INFLUENCE OF TRADERS CHARACTERISTICS ON EMERGENT MARKET PHENOMENA
Development of a multi-layered botmaster based analysis framework
CONFIGURATION OF APPLICATION PERMISSIONS WITH CONTEXTUAL ACCESS CONTROL
Communities of Purpose
Assured Information Sharing for Ad-hoc Collaboration
Advances in Modern Botnet Understanding and the Accurate Enumeration of Infected Hosts
Group modeling, recommendation and evaluation in collaborative filtering group-based recommender systems
Healthy vs Unhealthy: Food Related Tweets and Image Classification
Modeling and Analyzing the United States Courts of Last Resort’s Legal Citation System as a Complex System
LOWERING THE BARRIER TO DEVELOPMENT AND ADOPTION OF PARTICIPATORY SENSING APPLICATIONS
ESIDE: The integration of secure programming education into the IDE
Deep Learning for Sentiment and Emotion Detection in Multilingual Contexts
Emergency Medical Services Demand Forecasting: Modern Machine Learning Approaches For Producing Short-Term Spatiotemporal Estimations
Exploring the Perceptions of Users-as-Beacons Systems: Developing and Deploying Real-Life Prototypes
Understanding the plight of Covid-19 Long Haulers through Computational Analysis         of YouTube Content
Behavioral Health Stigma: Breaking the code with Stigma Index
Network-based Pathway Enrichment Analysis for Biological Inference of High-throughput Gene Expression Data
Software-Defined Cyber Agility for Active Cyber Defense
SECURING THE DATA STORAGE AND PROCESSING IN CLOUD COMPUTING ENVIRONMENT