Search by Authors

Search returned 16 items for : V


Conf YearArticleTitleAuthors
2021ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
2020ViewLeader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
2020ViewThe New Frontier in Home and Commercial Deliveries: Drones Fowler, Vannoy, Eggers, Medlin
2018ViewCommercial Drone Activity: Security, Privacy, and Legislation Issues Vannoy, Medlin
2010ViewOn Conceptual Models of Collaborative Partnerships and the Infusion of Knowledge Workers in the Local IT Sector Vardiman, Mhlanga
2009ViewTowards an Abstract Model for Mhlanga, Vardiman, Reames
2021View Selecting Subsets of Amazon Reviews Gokce, Kline, Cummings, Vetter
2021ViewA Cloud-Based System for Scraping Data from Amazon Product Reviews at Scale Woodall, Kline, Vetter, Modaresnezhad
2019ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
2019ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
2019ViewWhich Amazon Reviews Should You Read? Gokce, Kline, Vetter, Cummings
2012ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
2012ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
2011ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
2011ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
2012ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer