Sign in
IT Prof.
2004
2010
2017
2023
2004
2023
Keyphrases
Publications
volume 25, number 3, 2023
Clayton S. Ferner
Card Game to Demonstrate Quantum Key Exchange.
IT Prof.
25 (3) (2023)
Stephen J. Andriole
Truth Talking in the C-Suite.
IT Prof.
25 (3) (2023)
Osama AlQahtani
Effects of User Equipment and Integrated Access and Backhaul Schedulers on the Throughput of 5G Millimeter-Wave Networks.
IT Prof.
25 (3) (2023)
Bhuvan Unhelkar
,
Timothy R. Weil
,
Jason W. Rupe
,
Reza Djavanshi
The x in xG.
IT Prof.
25 (3) (2023)
Nir Kshetri
Cybercrime and Privacy Threats of Large Language Models.
IT Prof.
25 (3) (2023)
Luís Enrique Sanchez
,
Antonio Santos-Olmo Parra
,
Haralambos Mouratidis
,
Eduardo Fernández-Medina
New Frontiers in Security Risk Management.
IT Prof.
25 (3) (2023)
Evangelos Katsadouros
,
Charalampos Z. Patrikakis
,
George F. Hurlburt
Can Large Language Models Better Predict Software Vulnerability?
IT Prof.
25 (3) (2023)
Akashdeep Bhardwaj
,
Keshav Kaushik
Metaverse or Metaworst with Cybersecurity Attacks.
IT Prof.
25 (3) (2023)
Suraj G. Jadhav
,
Surendra Sarnikar
Digital Twin of a Digital World: Process, Data, and Experience Perspectives.
IT Prof.
25 (3) (2023)
Uthpala Premarathne
,
S. Rajasingham
Priority-Based Redeployment Algorithm for Decentralized Nodes in xG Access Networks.
IT Prof.
25 (3) (2023)
volume 25, number 4, 2023
George O. Strawn
Masterminds of Computer Design: Charles Babbage and Ada Lovelace.
IT Prof.
25 (4) (2023)
Sorel Reisman
COMPSAC Returns In-Person - A Remarkable Post-Covid Success.
IT Prof.
25 (4) (2023)
George F. Hurlburt
The Edgy Nature of Green IT.
IT Prof.
25 (4) (2023)
Nir Kshetri
Can China Catch Up to the United States in Generative Artificial Intelligence?
IT Prof.
25 (4) (2023)
Assane Gueye
,
Carlos Eduardo Galhardo
,
Irena Bojanova
Critical Software Security Weaknesses.
IT Prof.
25 (4) (2023)
Stephen J. Andriole
C-Suite Dysfunction.
IT Prof.
25 (4) (2023)
Noman Nasir Minhas
,
Maida Naveed
Using Internet of Things Application for Energy-Efficient and Lightweight Internet of Drones Networks.
IT Prof.
25 (4) (2023)
Ángel F. Alcaide
,
Carlos Núñez-Gómez
,
Francisco M. Delicado Martínez
,
Carmen Carrión
,
María Blanca Caminero
A Blockchain-Based e-Government Service for Quantity Surveyors.
IT Prof.
25 (4) (2023)
Ghazanfar Ali Safdar
,
Ali Mansour
Security and Trust Issues in BYOD Networks.
IT Prof.
25 (4) (2023)
Anirban Sengupta
,
Mahendra Rathor
,
Rahul Chaurasia
Biometrics for Hardware Security and Trust: Discussion and Analysis.
IT Prof.
25 (4) (2023)
Abdul Majeed
,
Seong Oun Hwang
The Changing Landscape of Privacy- Countermeasures in the Era of the COVID-19 Pandemic.
IT Prof.
25 (4) (2023)
Nalinee Sophatsathit
Bridging the Gap From Concrete Building Construction to Flexible Software Process - Way of Working.
IT Prof.
25 (4) (2023)
Stelios Prekas
,
Panagiotis Karkazis
,
Panagiotis Trakadas
An Energy-Aware Path Enumeration Solution Based on the Path Algebra Framework.
IT Prof.
25 (4) (2023)
Hande Aka Uymaz
,
Senem Kumova Metin
Enriching Transformer-Based Embeddings for Emotion Identification in an Agglutinative Language: Turkish.
IT Prof.
25 (4) (2023)
Wenda Wei
,
Chenyang Wang
,
Xinyang Zheng
,
Hengshan Yue
An Approximate Fault-Tolerance Design for a Convolutional Neural Network Accelerator.
IT Prof.
25 (4) (2023)
volume 25, number 5, 2023
Mohamed Saied Essa
,
Shawkat Kamal Guirguis
Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things.
IT Prof.
25 (5) (2023)
Michail Tsikerdekis
,
Sherali Zeadally
Misinformation Detection Using Deep Learning.
IT Prof.
25 (5) (2023)
Axel Legay
Design, Validate, Implement, and Validate: From Dreaming Approaches to Realities.
IT Prof.
25 (5) (2023)
Zubair A. Baig
,
Sri Harsha Mekala
,
Sherali Zeadally
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors.
IT Prof.
25 (5) (2023)
José Luis Hernández Ramos
,
Paolo Bellavista
,
Georgios Kambourakis
,
Jason R. C. Nurse
,
J. Morris Chang
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond.
IT Prof.
25 (5) (2023)
Hoda Diba
Employer Branding: The Impact of COVID-19 on New Employee Hires in IT Companies.
IT Prof.
25 (5) (2023)
Chen Zhong
,
J. B. Joo Baek Kim
,
Ali Alper Yayla
Enhancing Communication Among Remote Cybersecurity Analysts With Visual Traces.
IT Prof.
25 (5) (2023)
Nir Kshetri
Generative Artificial Intelligence in Marketing.
IT Prof.
25 (5) (2023)
Stephen J. Andriole
How Competitive Are You?
IT Prof.
25 (5) (2023)
Geetanjali Rathee
,
Chaker Abdelaziz Kerrache
,
Anissa Cheriguene
Blockchain-Based Mechanism for Smart Record Monitoring During and After the COVID-19 Pandemic.
IT Prof.
25 (5) (2023)
Irena Bojanova
,
John J. Guerrerio
Labeling Software Security Vulnerabilities.
IT Prof.
25 (5) (2023)
volume 25, number 6, 2023
Stephen J. Andriole
IT Empowering Rescuers and First Responders in Saving Lives.
IT Prof.
25 (6) (2023)
Philip Wright
,
Ilmija Asani
,
Nelson Pimenta
,
Paulo Chaves Ferreira
,
William Oliff
,
Georgia Sakellari
Infrastructure-Less Prioritized Communication Platform for First Responders.
IT Prof.
25 (6) (2023)
Anaida Fernández-García
,
Xabier Oregui Biain
,
Konstantinos Lingos
,
Konstantinos Konstantoudakis
,
Alberto Belmonte-Hernández
,
Izar Azpiroz Iragorri
,
Dimitrios Zarpalas
Smart Helmet: Combining Sensors, AI, Augmented Reality, and Personal Protection to Enhance First Responders' Situational Awareness.
IT Prof.
25 (6) (2023)
Jae Hun Kim
,
Han Woo Park
Identifying Networked Patterns in Memecoin Twitter Accounts Using Exponential Random Graph Modeling.
IT Prof.
25 (6) (2023)
George O. Strawn
Masterminds of Punched Card Data Processing: Herman Hollerith and John Billings.
IT Prof.
25 (6) (2023)
Nir Kshetri
The Future of Education: Generative Artificial Intelligence's Collaborative Role With Teachers.
IT Prof.
25 (6) (2023)
Andrew Park
,
Jan Kietzmann
,
Jayson Andrew Killoran
,
Yuanyuan Gina Cui
,
Patrick van Esch
,
Amir Dabirian
Nothing Is Harder to Resist Than the Temptation of AI.
IT Prof.
25 (6) (2023)
Mohamed Rahouti
,
Damian M. Lyons
,
Senthil Kumar Jagatheesaperumal
,
Kaiqi Xiong
A Decentralized Cooperative Navigation Approach for Visual Homing Networks.
IT Prof.
25 (6) (2023)
Stephen J. Andriole
An Executive Guide to AI, Machine Learning, and Generative AI - With Some Help From ChatGPT and Bard.
IT Prof.
25 (6) (2023)
Priyanka Ganesan
,
Senthil Kumar Jagatheesaperumal
Revolutionizing Emergency Response: The Transformative Power of Smart Wearables Through Blockchain, Federated Learning, and Beyond 5G/6G Services.
IT Prof.
25 (6) (2023)
Giuseppe De Palma
,
Saverio Giallorenzo
,
Jacopo Mauro
,
Matteo Trentin
,
Gianluigi Zavattaro
Formally Verifying Function Scheduling Properties in Serverless Applications.
IT Prof.
25 (6) (2023)
Charalampos Z. Patrikakis
First Responder Superheroes Are Wearing Smart Wearables, Not Capes.
IT Prof.
25 (6) (2023)
Abdul Majeed
,
Seong Oun Hwang
Technical Analysis of Data-Centric and Model-Centric Artificial Intelligence.
IT Prof.
25 (6) (2023)
Susanna Kaiser
,
Stephan Sand
,
Magdalena M. Linkiewicz
,
Henry Meißner
,
Dirk Baumbach
,
Ralf Berger
An Overall First Responder Tracking and Coordination Framework.
IT Prof.
25 (6) (2023)