Keyword | Conf Year | Article | Title | Authors |
QoS | 2015 | View | An Optimized Intelligent Home Network Model |
Kevin, Ndlovu, Lall, Kogeda
|
QR code | 2022 | View | QR Code Hacking – Detecting Multiple Vulnerabilities in Android Scanning Software |
Homan, Breese
|
Qualitative | 2022 | View | Measurement, reporting, and monitoring organizational security governance: A qualitative analysis of security professionals’ experiences |
Slonka, Mishra, Draus, Bromall
|
qualitative analysis | 2016 | View | Sentiment Analysis and Opinion Mining: Current State of the Art and Review of Google and Yahoo Search Engines’ Privacy Policies |
Peslak
|
qualitative analysis | 2009 | View | Factors that Persuade and Deter Membership in Professional Computing Associations |
Umapathy, Jamba, Ritzhaupt
|
Qualitative Study | 2020 | View | Does the Executive Perception of the Value of Information Technology (IT) Influence the IT strategy? A Case Study |
Pandey, Mishra
|
Qualitative Study | 2020 | View | Enterprise Architecture Transformation Process from a Federal Government Perspective |
Canada, Halawi
|
Quality | 2020 | View | Open Source Software: A Detailed Analysis of Contributions and Quality |
Peslak, Hunsinger
|
Quality assurance | 2014 | View | Open Source Web Application Vulnerability Scanners: The Cost Effective Choice |
McQuade
|
Quality of Health Care | 2008 | View | Incorporation of Information Technology into Assisted Health Care: An empirical study |
Merrill, White
|
Query tool | 2008 | View | Creating the Pilot AJAX Enabled Query Tool |
Ford, Dollinger
|