Conf Year | Article | Title | Authors |
2021 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
2020 | View | Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
2020 | View | The New Frontier in Home and Commercial Deliveries: Drones
|
Fowler, Vannoy, Eggers, Medlin
|
2018 | View | Commercial Drone Activity: Security, Privacy, and Legislation Issues |
Vannoy, Medlin
|
2010 | View | On Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector |
Vardiman, Mhlanga
|
2009 | View | Towards an Abstract Model for |
Mhlanga, Vardiman, Reames
|
2021 | View |
Selecting Subsets of Amazon Reviews
|
Gokce, Kline, Cummings, Vetter
|
2021 | View | A Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale |
Woodall, Kline, Vetter, Modaresnezhad
|
2019 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
2019 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
2019 | View | Which Amazon Reviews Should You Read? |
Gokce, Kline, Vetter, Cummings
|
2012 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
2012 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
2011 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
2011 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
2012 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|