Search by Keyword

Search returned 22 items for : N

KeywordYear PubArticleTitleAuthors
n-gram2014ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
n-grams2017ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
nationwide health information network2013ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Natural Disaster2010ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Natural Language Processing2023ViewText Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems Wimmer, Du, Heri
Natural Language Processing2017ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
Natural Language Processing2014ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
needs2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Net Generation (Net Geners)2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
Network Access2010ViewThe Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
network function virtualization2021ViewA Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology Sambasivam, Brown Jr
network instrusion detection2017ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
network intrusion detection2024ViewNetwork Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service Kangethe , Wimmer, Rebman Jr.
network intrustion detection2019ViewThe use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications Smith, Hammell II
Network security2012ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Networks and Security2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Nigeria2009ViewCross-Cultural View of Handheld Wireless Media Usage Lind, Anyansi-Archibong, Anyansi
NLP2024ViewUsing Textual Analytics to Process Information Overload of Cyber Security Subreddits Omakwu , Wimmer, Rebman Jr.
Nonprofits2014ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
Normalization2019ViewEffects of Normalization Techniques on Logistic Regression in Data Science Adeyemo, Wimmer, Powell
NSA2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer
Nurse Staff Mix2023ViewShort Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19 Winston, Xiong, Medlin, Pelaez