Keyword | Conf Year | Article | Title | Authors |
n-gram | 2013 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
n-grams | 2019 | View | The Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection |
Smith, Hammell II
|
n-grams | 2016 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|
NASDAQ | 2021 | View | Innovation Attributes as Determinants of the Application of Artificial Intelligence: A Proposed Study |
Iwuanyanwu, Igoche
|
nationwide health information network | 2012 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
Natural Disaster | 2009 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
Natural Language Processing | 2022 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
Natural Language Processing | 2016 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|
Natural Language Processing | 2013 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
Natural Language Processing | 2012 | View | A Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK |
Jafar, Babb, Dana
|
Near Miss | 2019 | View | Detection and Analysis of Hard Landing and Near Miss based on Cessna 172G Flight Data and Utilization of Flight Data Monitoring |
Sorab
|
needs | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Negative Length | 2008 | View | A Computing Research Example: Following a Question |
Frank
|
Net Generation (Net Geners) | 2009 | View | A Study of the Perceptions of Students on |
Lawler, Molluzzo
|
Net Neutrality | 2012 | View | Traffic on the Information Super Highway -- Use vs. Useful? |
Grant, Middleton
|
network | 2016 | View | Understanding User Behavior on Pinterest: Findings and Insights |
Wei, Zhang
|
network | 2010 | View | NATIS: Novel Architecture Framework for |
Sambasivam, Liang, Liao
|
Network Access | 2009 | View | Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
Network Analysis | 2021 | View | Data Sharing and Exposure: Findings from Descriptive and Network Analysis of Instant Games on Facebook |
Nicholson, Chakraborty, Ali-Gombe, Hammell II
|
network clustering | 2022 | View | Developing a Data-Driven Emerging Skill Network Analytics Framework for Automated Employment Advert Evaluation |
Liu, Schwieger
|
network function virtualization | 2020 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
network instrusion detection | 2016 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|
network intrusion detection | 2019 | View | The Use of Tainted Flows in Network Compression for Distributed Network Intrusion Detection |
Smith, Hammell II
|
network intrustion detection | 2018 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
Network security | 2011 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
Networks and Security | 2008 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
neural network | 2019 | View | A Neural Networks Primer For USMA Cadets |
Alhajjar
|
NFC | 2016 | View | Analysis of the Risks of NFC Mobile Payment Systems |
Kakish, Shah
|
Nigeria | 2008 | View | Factors Driving Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
NLTK | 2012 | View | A Framework for an Interactive Word-Cloud Ap-proach for Visual Analysis of Digital Text using NLTK |
Jafar, Babb, Dana
|
Nonprofits | 2013 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
Normalization | 2018 | View | Effects of Normalization Techniques on Logistic Regression in Data Science |
Adeyemo, Wimmer, Powell
|
not-for-profit | 2009 | View | Knowledge Mapping in a Not-For-Profit Firm: A Case Study |
Nelson, Woratschek
|
NSA | 2015 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
Nurse Staff Mix | 2022 | View | Exploring Short Stay Health Care Quality: Skilled Nursing Facilities during the COVID-19 Era
|
Winston, Xiong, Medlin, Pelaez
|
NVD | 2021 | View | Some Analysis of Common Vulnerabilities and Exposures (CVE) Data from the National Vulnerability Database (NVD) |
Glyder, Stoker, Threatt, Franks, Adams
|