Search by Keyword

Search returned 15 items for : N

KeywordYear PubArticleTitleAuthors
n-gram2014ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
n-grams2017ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
nationwide health information network2013ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
Natural Disaster2010ViewContingency Planning: Disaster Recovery Strategies for Successful Educational Continuity Omar, Udeh, Mantha
Natural Language Processing2017ViewAn Interactive Toolbox for Twitter Content Analytics Jafar, Waldman
Natural Language Processing2014ViewDecision-Making via Visual Analysis using the Natural Language Toolkit and R Jafar, Babb, Dana
needs2008ViewComputing Professional Association Membership: An Exploration of Membership Needs and Motivations Ritzhaupt, Umapathy, Jamba
Net Generation (Net Geners)2010ViewA Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet Lawler, Molluzzo
Network Access2010ViewThe Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls Kim, Nelson
network instrusion detection2017ViewProposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications Smith, Hammell II
network security2012ViewThe New Tech Effect: Analyzing Juror Credibility Davis, Paullet, Kraeer, Grant
Networks and Security2009ViewAn Examination of Information Security in Mobile Banking Architectures Streff, Haar
Nigeria2009ViewCross-Cultural View of Handheld Wireless Media Usage Lind, Anyansi-Archibong
Nonprofits2014ViewInformation Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions Imboden, Phillips, Seib, Fiorentino
NSA2016ViewLeakage of Geolocation Data by Mobile Ad Networks Snow, Hayes, Dwyer