​
Login / Signup
RIIT
2012
2017
2012
2017
Keyphrases
Publications
2017
Proceedings of the 6th Annual Conference on Research in Information Technology, RIIT '17, Rochester, New York, USA, October 4-7, 2017
RIIT
(2017)
2016
Proceedings of the 5th Annual Conference on Research in Information Technology, RIIT 2016, Boston, MA, USA, September 28 - October 1, 2016
RIIT
(2016)
Zahra Alqubaiti
,
Lei Li
,
Jing He
The Paradox of Social Media Security: Users' Perceptions versus Behaviors.
RIIT
(2016)
Debasis Bhattacharya
,
Mario Canul
,
Saxon Knight
Impact of the Physical Web and BLE Beacons.
RIIT
(2016)
Raymond A. Hansen
,
Benjamin Peterson
,
Timothy Becker
Investigating the Security of Nexus 1000V Virtual Switches in VMware ESXi Hypervisors.
RIIT
(2016)
Ricardo A. Calix
,
Armando Cabrera
,
Irshad Iqbal
Analysis of Parallel Architectures for Network Intrusion Detection.
RIIT
(2016)
Marc J. Dupuis
,
Samreen Khadeer
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat.
RIIT
(2016)
Sam Chung
,
Cheolmin Sky Moon
,
Barbara Endicott-Popovsky
Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System.
RIIT
(2016)
C. Richard G. Helps
,
Clarissa Helps
Measuring Stylus and Tablet Performance for Usability in Sketching.
RIIT
(2016)
Amos O. Olagunju
,
Farouk Samu
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention.
RIIT
(2016)
Marc J. Dupuis
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised.
RIIT
(2016)
Anthony Ramirez
,
Alfredo Fernandez
MP4 Steganography: Analyzing and Detecting TCSteg.
RIIT
(2016)
Nigel Jacob
Using Technology to Build Compassion.
RIIT
(2016)
Deborah LaBelle
,
Jawaher Alsulami
,
Jim Leone
Effects of using iPads on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia.
RIIT
(2016)
Chad A. Arney
,
Xinli Wang
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules.
RIIT
(2016)
2015
Thivviyan Amirthalingam
,
John A. Springer
Studying the Effect of Multi-Query Functionality on a Correlation-Aware SQL-To-MapReduce Translator.
RIIT
(2015)
Sambasivam Ramasubramanian
,
Sam Chung
,
Seungwan Ryu
,
Ling Ding
Secure and Smart Media Sharing Based on a Novel Mobile Device-to-Device Communication Framework with Security and Procedures.
RIIT
(2015)
Mark Stockman
,
Robert Heile
,
Anthony Rein
An Open-Source Honeynet System to Study System Banner Message Effects on Hackers.
RIIT
(2015)
Chi Zhang
,
Xihui Zhang
,
Richard Halstead-Nussloch
Validating the Assessment Metrics for Mobile Health Apps: Preliminary Outcomes from a Pilot Study.
RIIT
(2015)
Yalinne Castelan
,
Ben Khodja
MP3 Steganography Techniques.
RIIT
(2015)
Michael Brooks
,
Baijian Yang
A Man-in-the-Middle attack against OpenDayLight SDN controller.
RIIT
(2015)
Felipe Sierra
,
Anthony Ramirez
Defending Your Android App.
RIIT
(2015)
Xinli Wang
,
Yan Bai
,
Lihui Hu
Certification with Multiple Signatures.
RIIT
(2015)
Nicole M. Hands
,
Baijian Yang
,
Raymond A. Hansen
A Study on Botnets Utilizing DNS.
RIIT
(2015)
Debasis Bhattacharya
Evolution of Cybersecurity Issues In Small Businesses.
RIIT
(2015)
Mark O. Milhouse
Framework for Autonomous Delivery Drones.
RIIT
(2015)
Shobhit N. Dutia
,
Tae H. Oh
,
Young H. Oh
Developing Automated Input Generator for Android Mobile Device to Evaluate Malware Behavior.
RIIT
(2015)
Sung Kim
,
Derek L. Hansen
,
C. Richard G. Helps
Information Technology Research in the Academy: Insights from Theses and Dissertations.
RIIT
(2015)
Proceedings of the 4th Annual ACM Conference on Research in Information Technology, RIIT 2015, Chicago, IL, USA, September 30 - October 3, 2015
RIIT
(2015)
2014
Daniel W. Yoas
,
Greg Simco
Using time-series analysis to provide long-term CPU utilization prediction.
RIIT
(2014)
Kiranmayi Kotipalli
,
Shan Suthaharan
Modeling of class imbalance using an empirical approach with spambase dataset and random forest classification.
RIIT
(2014)
Elizabeth Fokes
,
Lei Li
A survey of security vulnerabilities in social networking media: the case of facebook.
RIIT
(2014)
Youngho Kim
,
Bill Stackpole
,
Tae Hwan Oh
Analysis of mobile malware based on user awareness.
RIIT
(2014)
Matthew LaPointe
,
Lucas Walker
,
Matthew Nelson
,
Justin Shananaquet
,
Xinli Wang
Comparing public and private iaas cloud models.
RIIT
(2014)
Maya Embar
,
Louis F. McHugh IV
,
William R. Wesselman
Printer watermark obfuscation.
RIIT
(2014)
William Kim
,
Sam Chung
,
Barbara Endicott-Popovsky
Software architecture model driven reverse engineering approach to open source software development.
RIIT
(2014)
Scott J. Pack
,
Dale C. Rowe
Three-dimensional wireless heat mapping and security assessment using multi-rotor aerial drones.
RIIT
(2014)
Kelley Misata
,
Raymond A. Hansen
,
Baijian Yang
A taxonomy of privacy-protecting tools to browse the world wide web.
RIIT
(2014)
David Stacey
Passive warden using statistical steganalysis.
RIIT
(2014)
Proceedings of the 3rd annual conference on Research in information technology, RIIT 2014, Atlanta, GA, USA, October 15-18, 2014
RIIT
(2014)
Ben Khodja
Probabilistically detecting steganography within MP3 files.
RIIT
(2014)
Mark Stockman
Insider hacking: applying situational crime prevention to a new white-collar crime.
RIIT
(2014)
Weijie Wang
,
Baijian Yang
,
Yingjie Victor Chen
Detecting subtle port scans through characteristics based on interactive visualization.
RIIT
(2014)
James P. Dupuis
,
Michael C. Stinson
SMS notifications for missed calls expanding mobility for TDM environments.
RIIT
(2014)
Flavio Villanustre
Big data trends and evolution: a human perspective.
RIIT
(2014)
Owen Riley
,
Jessica M. Richards
,
Joseph J. Ekstrom
,
Kevin Tew
Termediator II: measuring term polysemy using semantic clustering.
RIIT
(2014)
Brandeis H. Marshall
,
Shweta Sareen
,
John A. Springer
,
Tahira Reid
Eye tracking data understanding for product representation studies.
RIIT
(2014)
2013
Ryan Tate
,
Gregory J. Conti
,
Edward Sobiesk
Automated webpage evaluation.
RIIT
(2013)
Louis Turnbull
,
Henry Ochieng
,
Chris Kadlec
,
Jordan Shropshire
Improving service continuity: IT disaster prevention and mitigation for data centers.
RIIT
(2013)
Abdel Ejnioui
,
Carlos E. Otero
,
Abrar A. Qureshi
Formalizing the design of embedded software using sequence diagrams and abstract state machines.
RIIT
(2013)