Search results
-
-
Title
-
Evaluating Risk Appeal Approaches Based on PMT Towards Making Secure Decisions
-
Author
-
AL Qahtani, Elham
-
Date Created
-
2023
-
Subjects--Topical
-
Computer science
-
Description
-
To explain changes in users' security behaviors and behavioral intentions, we investigated the different messaging approaches that followed the Protection Motivation Theory (PMT) design guidelines. These messaging approaches were used in different...
-
-
Title
-
Aviatar- An Augmented Reality System to Improve Pilot Performance for Unmanned Aerial Systems
-
Author
-
Abbott, Robert
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science, Aerospace engineering, Cognitive psychology
-
Description
-
In the modern airspace, small unmanned aircraft systems (UAS) such as drones are becoming increasingly popular with both amateur enthusiasts as well as professional pilots. In the three years following the initiation of the small drone registratio...
-
-
Title
-
Arny: An Interaction Model Based On Emotional Feedback For An AI_Based Co-creative Design System
-
Author
-
Abdellahi, Sarah
-
Date Created
-
2021
-
Subjects--Topical
-
Artificial intelligence, Information technology, Computer science
-
Description
-
Co-creative collaboration is a creative collaboration of two or more agents working together on a shared creative product. Effective co-creative collaboration is a combination of interactions and contributions of the task collaborators. In human-h...
-
-
Title
-
Deep Learning for Sentiment and Emotion Detection in Multilingual Contexts
-
Author
-
Abdullah, Malak
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Social media is growing as a communication medium where people can express online their feelings and opinions on a variety of topics in ways they rarely do in person. Detecting sentiments and emotions in texts have gained a considerable amount of ...
-
-
Title
-
Automated Classification and Mitigation of Cybersecurity Vulnerabilities
-
Author
-
Aghaei, Ehsan
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
With the widespread use of computers and networks today, cybersecurity has emerged as a crucial concern for many businesses as they fight with growing cyber threats by vulnerability exploitation. To identify and mitigate zero-day or unpatched vuln...
-
-
Title
-
Using formal methods towards improving cloud IaaS environments
-
Author
-
Al-Haj, Saeed
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science
-
Description
-
Cloud computing has become a prominent technology with the potential for tremendously positive effects on the future of computer networks and services. However, as the resources are shared in cloud environments, cloud security is a major concern. ...
-
-
Title
-
SECURING MOBILE HYBRID APPLICATIONS THROUGH CONFIGURATIONS - FIRST LINE OF DEFENSE
-
Author
-
AlJarrah, Abeer
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
Mobile hybrid apps have the potential to dominate the mobile and IoTs apps market. Cross-platform or hybrid apps are providing a promising development choice that appeals to a great body of developers. This development approach \wraps" standard we...
-
-
Title
-
User Centered Security Service Level Agreement Enforcement Mechanisms 2
-
Author
-
Alasmari, Sultan
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
As businesses profoundly rely on cloud services security becomes a critical concern. Various emerging technologies depend on cloud computing for its intrinsic features such as scalability, storage and cost-effectiveness. While this may be true, cl...
-
-
Title
-
Evaluating Co-Creation In Collaborative Drawing Using Creative Thinking Modes
-
Author
-
Algarni, Ali
-
Date Created
-
2022
-
Subjects--Topical
-
Computer science
-
Description
-
Co-creation is a form of collaboration in which partners share, improve and blend ideas together to develop a creative product. It helps to share ideas and solve problems in a creative manner. Several co-creativity research works have focused on g...
-
-
Title
-
Intrusion Detection and Deterrence for Critical Infrastructures
-
Author
-
Ali, Muhammad
-
Date Created
-
2016
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Critical infrastructures are the systems and networks that are so vital that their unavailability would have a major impact on national security, economy, safety, or any combination thereof. Examples of critical infrastructure are power systems, f...
-
-
Title
-
Deep Learning-based Digital Human Modeling and Applications
-
Author
-
Ali, Ayman
-
Date Created
-
2023
-
Subjects--Topical
-
Artificial intelligence, Biomechanics, Computer science
-
Description
-
Recent advancements in the domain of deep learning models have engendered remarkable progress across numerous computer vision tasks. Notably, there has been a burgeoning interest in the field of recovering three-dimensional (3D) human models from ...
-
-
Title
-
Understanding and Designing for Sharing and Privacy in Wearable Fitness Platforms
-
Author
-
Alqhatani, Abdulmajeed
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
Commercial wearable devices that collect health and fitness data are widely used. These devices sense and collect a variety of personal data, which can be shared by users with other people and with third parties. Yet, the collection of personal da...
-
-
Title
-
Understanding and Designing for Sharing and Privacy in Wearable Fitness Platforms
-
Author
-
Alqhatani, Abdulmajeed
-
Date Created
-
2021
-
Subjects--Topical
-
Computer science
-
Description
-
Commercial wearable devices that collect health and fitness data are widely used. These devices sense and collect a variety of personal data, which can be shared by users with other people and with third parties. Yet, the collection of personal da...
-
-
Title
-
Formal Techniques for Cyber Resilience: Modeling, Synthesis, and Verification
-
Author
-
Alsaleh, Mohammed Noraden
-
Date Created
-
2018
-
Subjects--Topical
-
Computer science
-
Description
-
As cyber vulnerability and complexity increases, cyber attacks become highly sophisticated and inevitable. Therefore, cyber resilience is necessary to make cyber capable of misleading attackers in reaching their goals, resisting their progress, an...