Conf Year | Article | Title | Authors |
2013 | View | Feasibility of a Platform-as-a-Service Implementation using Cloud Computing for a Global Service Organization |
Gai, Steenkamp
|
2012 | View | A Portal-Based Web Service Development Using a Mashup Approach |
Miah, Debuse, Gammack, Pigott
|
2022 | View | Vulnerability Assessment for Web Applications |
Garcia, Abraham, Kepic, Cankaya
|
2021 | View | An Initial Exploration of Multi-Node Open Cloud Infrastructure Testbed |
Liu, Lui, Li, Embuldeniya, Garcia, McAllister, Schwieger
|
2019 | View | Evaluating Evasion Attack Methods on Binary
Network Traffic Classifiers |
Shah, Gaston, Harvey, McNamara, Ramos, You, Alhajjar
|
2010 | View | Password Security Risk versus Effort: An Exploratory Study on User-Perceived Risk and the Intention to Use Online Applications |
Gebauer, Kline, He
|
2017 | View | Exploratory Study of Organizational Adoption of Cloud based Big Data Analytics |
Ghosh
|
2016 | View | Building Client Vendor Alignment Capability in Strategic Information Systems Outsourcing |
Ghosh
|
2015 | View | Exploratory Study of Effects of eLearning System Acceptance on Learning Outcomes |
Ghosh
|
2009 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
2009 | View | Women's Technology Acceptance of Mentoring on the Internet |
Gibson, GIBSON
|
2014 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
2021 | View | Some Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) |
Glyder, Stoker, Threatt, Franks, Adams
|
2021 | View |
Selecting Subsets of Amazon Reviews
|
Gokce, Kline, Cummings, Vetter
|
2019 | View | Which Amazon Reviews Should You Read? |
Gokce, Kline, Vetter, Cummings
|
2020 | View | Predicting Soil Conditions Using Machine Learning Algorithms |
Gondi, Hua, Bajracharya
|
2019 | View | Analyzing Drug Overdoses in a Community Using R |
Gondi
|
2013 | View | A Comparison of Software Testing Using the Object-Oriented Paradigm and Traditional Testing |
Gordon, Roggio
|
2013 | View | Taxonomy of Common Software Testing Terminology: Framework for Key Software Engineering Testing Concepts |
Roggio, Gordon, Comer
|
2012 | View | Traffic on the Information Super Highway -- Use vs. Useful? |
Grant, Middleton
|
2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
2022 | View | The Effects of Individual Characteristics and Mastery Goal Orientation on IT Project Continuation Intentions |
Totty, Zaza, Greer, Korzaan
|
2008 | View | SYSTEM DEVELOPMENT METHODOLOGY USAGE IN INDUSTRY: A REVIEW AND ANALYSIS |
Griffin, Brandyberry
|
2019 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
2014 | View | Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps |
Grispos, Glisson, Pardue, Dickson
|
2015 | View | Moving Beyond Coding: Why Secure Coding Should be Implemented |
Grover, Cummings, Janicki
|
2009 | View | Some Observations on the Occurrences of Data Breaches |
Guerra, Joseph, Ramirez, Koong, Liu
|
2019 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
2008 | View | An Information Technology Project Funding Process |
Kline, Renninger, Guinn, Sackley, Scott
|