researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2012
2013
2014
2015
2016
2017
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Abdel Ejnioui
Anthony Ramirez
Baijian Yang
Barbara Endicott-Popovsky
Barry M. Lunt
Ben Khodja
C. Richard G. Helps
Carlos E. Otero
Dale C. Rowe
Daniel W. Yoas
Debasis Bhattacharya
Greg Simco
Joseph J. Ekstrom
Lei Li
Marc J. Dupuis
Mark Stockman
Raymond A. Hansen
Sam Chung
William W. Agresti
Xinli Wang
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
annual
conference
information
mobile
multi
network
october
proceedings
research
riit
security
software
steganography
system
technology
usa
user
using
web
RIIT (riit)
Editions
Publications
Viewing Publication 1 - 87 from 87
2017
Internet of Things BLE Security
Thomas Chiu
,
David Calero Luis
,
Vinesh Jethva
.
riit 2017
:
37
[doi]
Usability of "Fatchum": A Mobile Application Recipe Recommender System
Zane Myron C. Cruz
,
Janmel Jerome R. Alpay
,
Joshua Dale D. Depeno
,
Milaluna Joyce C. Altabirano
,
Rex Perez Bringula
.
riit 2017
:
11-16
[doi]
Monitoring Multicopters Energy Consumption
Ilenia Fronza
,
Nabil El Ioini
,
Luis Corral
,
Matthias Moroder
,
Moritz Moroder
.
riit 2017
:
29-34
[doi]
Information Privacy of Cyber Transportation System: Opportunities and Challenges
Meng Han
,
Lei Li
,
Xiaoqing Peng
,
Zhen Hong
,
Mohan Li
.
riit 2017
:
23-28
[doi]
2 Emission and Locations
Mandar Kadam
,
Nisha Kanoo
,
Yong Zheng
.
riit 2017
:
35
[doi]
Indexing Architecture for File Extraction from Network Traffic
Pei-Ting Lee
,
Baijian Yang
.
riit 2017
:
17-21
[doi]
The Extension and Implementation of the Autonomous Movement Framework
Theo Riviere
,
Hector Gutierrez Ayala
,
Jeremy Hajek
.
riit 2017
:
7-10
[doi]
Identifying Grey Sheep Users By The Distribution of User Similarities In Collaborative Filtering
Yong Zheng
,
Mayur Agnani
,
Mili Singh
.
riit 2017
:
1-6
[doi]
Proceedings of the 6th Annual Conference on Research in Information Technology, RIIT '17, Rochester, New York, USA, October 4-7, 2017
Stephen J. Zilora
,
Tom Ayers
,
Daniel S. Bogaard
, editors,
ACM,
2017.
[doi]
2016
The Paradox of Social Media Security: Users' Perceptions versus Behaviors
Zahra Alqubaiti
,
Lei Li
,
Jing He
.
riit 2016
:
29-34
[doi]
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules
Chad A. Arney
,
Xinli Wang
.
riit 2016
:
54
[doi]
Impact of the Physical Web and BLE Beacons
Debasis Bhattacharya
,
Mario Canul
,
Saxon Knight
.
riit 2016
:
53
[doi]
Proceedings of the 5th Annual Conference on Research in Information Technology, RIIT 2016, Boston, MA, USA, September 28 - October 1, 2016
Deborah Boisvert
,
Stephen J. Zilora
, editors,
ACM,
2016.
[doi]
Analysis of Parallel Architectures for Network Intrusion Detection
Ricardo A. Calix
,
Armando Cabrera
,
Irshad Iqbal
.
riit 2016
:
7-12
[doi]
Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System
Sam Chung
,
Cheolmin Sky Moon
,
Barbara Endicott-Popovsky
.
riit 2016
:
13-18
[doi]
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised
Marc J. Dupuis
.
riit 2016
:
55
[doi]
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat
Marc J. Dupuis
,
Samreen Khadeer
.
riit 2016
:
35-40
[doi]
Investigating the Security of Nexus 1000V Virtual Switches in VMware ESXi Hypervisors
Raymond A. Hansen
,
Benjamin Peterson
,
Timothy Becker
.
riit 2016
:
47-52
[doi]
Measuring Stylus and Tablet Performance for Usability in Sketching
Richard Helps
,
Clarissa Helps
.
riit 2016
:
19-24
[doi]
Using Technology to Build Compassion
Nigel Jacob
.
riit 2016
:
1
[doi]
Effects of using iPads on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia
Deborah LaBelle
,
Jawaher Alsulami
,
Jim Leone
.
riit 2016
:
25-28
[doi]
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention
Amos O. Olagunju
,
Farouk Samu
.
riit 2016
:
41-46
[doi]
MP4 Steganography: Analyzing and Detecting TCSteg
Anthony Ramirez
,
Alfredo Fernandez
.
riit 2016
:
2-6
[doi]
2015
Studying the Effect of Multi-Query Functionality on a Correlation-Aware SQL-To-MapReduce Translator
Thivviyan Amirthalingam
,
John Springer
.
riit 2015
:
55-60
[doi]
Evolution of Cybersecurity Issues In Small Businesses
Debasis Bhattacharya
.
riit 2015
:
11
[doi]
A Man-in-the-Middle attack against OpenDayLight SDN controller
Michael Brooks
,
Baijian Yang
.
riit 2015
:
45-49
[doi]
MP3 Steganography Techniques
Yalinne Castelan
,
Ben Khodja
.
riit 2015
:
51-54
[doi]
Developing Automated Input Generator for Android Mobile Device to Evaluate Malware Behavior
Shobhit N. Dutia
,
Tae H. Oh
,
Young H. Oh
.
riit 2015
:
43
[doi]
A Study on Botnets Utilizing DNS
Nicole M. Hands
,
Baijian Yang
,
Raymond A. Hansen
.
riit 2015
:
23-28
[doi]
Information Technology Research in the Academy: Insights from Theses and Dissertations
Sung Kim
,
Derek Hansen
,
C. Richard G. Helps
.
riit 2015
:
5-10
[doi]
Framework for Autonomous Delivery Drones
Mark O. Milhouse
.
riit 2015
:
1-4
[doi]
Secure and Smart Media Sharing Based on a Novel Mobile Device-to-Device Communication Framework with Security and Procedures
Sambasivam Ramasubramanian
,
Sam Chung
,
Seungwan Ryu
,
Ling Ding
.
riit 2015
:
35-40
[doi]
Proceedings of the 4th Annual ACM Conference on Research in Information Technology, RIIT 2015, Chicago, IL, USA, September 30 - October 3, 2015
Amber Settle
,
Terry Steinbach
,
Deborah Boisvert
, editors,
ACM,
2015.
[doi]
Defending Your Android App
Felipe Sierra
,
Anthony Ramirez
.
riit 2015
:
29-34
[doi]
An Open-Source Honeynet System to Study System Banner Message Effects on Hackers
Mark Stockman
,
Robert Heile
,
Anthony Rein
.
riit 2015
:
19-22
[doi]
Certification with Multiple Signatures
Xinli Wang
,
Yan Bai
,
Lihui Hu
.
riit 2015
:
13-18
[doi]
Validating the Assessment Metrics for Mobile Health Apps: Preliminary Outcomes from a Pilot Study
Chi Zhang
,
Xihui Zhang
,
Richard Halstead-Nussloch
.
riit 2015
:
41
[doi]
2014
SMS notifications for missed calls expanding mobility for TDM environments
James P. Dupuis
,
Michael C. Stinson
.
riit 2014
:
71-74
[doi]
Printer watermark obfuscation
Maya Embar
,
Louis F. McHugh IV
,
William R. Wesselman
.
riit 2014
:
15-20
[doi]
A survey of security vulnerabilities in social networking media: the case of facebook
Elizabeth Fokes
,
Lei Li
.
riit 2014
:
57-62
[doi]
Probabilistically detecting steganography within MP3 files
Ben Khodja
.
riit 2014
:
21-26
[doi]
Software architecture model driven reverse engineering approach to open source software development
William Kim
,
Sam Chung
,
Barbara Endicott-Popovsky
.
riit 2014
:
9-14
[doi]
Analysis of mobile malware based on user awareness
Youngho Kim
,
Bill Stackpole
,
Tae Oh
.
riit 2014
:
51-52
[doi]
Modeling of class imbalance using an empirical approach with spambase dataset and random forest classification
Kiranmayi Kotipalli
,
Shan Suthaharan
.
riit 2014
:
75-80
[doi]
Comparing public and private iaas cloud models
Matthew LaPointe
,
Lucas Walker
,
Matthew Nelson
,
Justin Shananaquet
,
Xinli Wang
.
riit 2014
:
69-70
[doi]
Eye tracking data understanding for product representation studies
Brandeis H. Marshall
,
Shweta Sareen
,
John A. Springer
,
Tahira Reid
.
riit 2014
:
3-8
[doi]
A taxonomy of privacy-protecting tools to browse the world wide web
Kelley Misata
,
Raymond A. Hansen
,
Baijian Yang
.
riit 2014
:
63-68
[doi]
Three-dimensional wireless heat mapping and security assessment using multi-rotor aerial drones
Scott J. Pack
,
Dale C. Rowe
.
riit 2014
:
45-50
[doi]
Termediator II: measuring term polysemy using semantic clustering
Owen Riley
,
Jessica M. Richards
,
Joseph J. Ekstrom
,
Kevin Tew
.
riit 2014
:
81-86
[doi]
Proceedings of the 3rd annual conference on Research in information technology, RIIT 2014, Atlanta, GA, USA, October 15-18, 2014
Becky Rutherfoord
,
Lei Li
,
Susan Van de Ven
,
Amber Settle
,
Terry Steinbach
, editors,
ACM,
2014.
[doi]
Passive warden using statistical steganalysis
David Stacey
.
riit 2014
:
27-32
[doi]
Insider hacking: applying situational crime prevention to a new white-collar crime
Mark Stockman
.
riit 2014
:
53-56
[doi]
Big data trends and evolution: a human perspective
Flavio Villanustre
.
riit 2014
:
1-2
[doi]
Detecting subtle port scans through characteristics based on interactive visualization
Weijie Wang
,
Baijian Yang
,
Yingjie Victor Chen
.
riit 2014
:
33-38
[doi]
Using time-series analysis to provide long-term CPU utilization prediction
Daniel W. Yoas
,
Greg Simco
.
riit 2014
:
39-44
[doi]
2013
Advancing the IT research agenda
William W. Agresti
.
riit 2013
:
11-16
[doi]
Proceedings of the 2nd annual conference on Research in information technology, RIIT 2013, Orlando, Florida, USA, October 10-12, 2013
William D. Armitage
,
Robert S. Friedman
,
Ken A. Baker
, editors,
ACM,
2013.
[doi]
A grounded theory analysis of modern web applications: knowledge, skills, and abilities for DevOps
Soon K. Bang
,
Sam Chung
,
Young Choh
,
Marc J. Dupuis
.
riit 2013
:
61-62
[doi]
Formalizing the design of embedded software using sequence diagrams and abstract state machines
Abdel Ejnioui
,
Carlos E. Otero
,
Abrar A. Qureshi
.
riit 2013
:
71-76
[doi]
The emergence of an it 'profession'
Joseph J. Ekstrom
,
William W. Agresti
,
Gregory W. Hislop
,
Han Reichgelt
,
Charlene (Chuck) Walrad
.
riit 2013
:
29-30
[doi]
DNS: (do not suspect)
Fernando Seror Garcia
.
riit 2013
:
53-54
[doi]
Design patterns as first-class connectors
Sargon Hasso
,
Carl Carlson
.
riit 2013
:
37-42
[doi]
Securing insurance reimbursements with RFID technologies
Charles Hopkins
.
riit 2013
:
55-56
[doi]
Using agent technologies to correlate and compare anti-malware software
Kellie E. Kercher
,
Dale C. Rowe
,
Haley Dennis
.
riit 2013
:
17-22
[doi]
Security mechanisms for multi-user collaborative CAx
Francis N. Mensah
,
Chia-Chi Teng
.
riit 2013
:
59-60
[doi]
Implementation of SHA-1 and ECDSA for vehicular ad-hoc network using NS-3
Sinan Nacy
,
Tae Oh
,
Jim Leone
.
riit 2013
:
83-88
[doi]
Termediator: early studies in terminological mediation between disciplines
Jessica M. Richards
,
Owen Riley
,
Joseph J. Ekstrom
,
Kevin Tew
.
riit 2013
:
1-10
[doi]
Automated webpage evaluation
Ryan Tate
,
Gregory J. Conti
,
Edward Sobiesk
.
riit 2013
:
77-82
[doi]
Improving service continuity: IT disaster prevention and mitigation for data centers
Louis Turnbull
,
Henry Ochieng
,
Chris Kadlec
,
Jordan Shropshire
.
riit 2013
:
43-46
[doi]
Design and evaluation of face tracking user interfaces for accessibility
Norman H. Villaroman
,
Dale C. Rowe
,
C. Richard G. Helps
.
riit 2013
:
65-70
[doi]
ChronoZoom: travel through time for education, exploration, and information technology research
Robert L. Walter
,
Sergey Berezin
,
Ankur Teredesai
.
riit 2013
:
31-36
[doi]
Administrative evaluation of intrusion detection system
Xinli Wang
,
Alex Kordas
,
Lihui Hu
,
Matt Gaedke
,
Derrick Smith
.
riit 2013
:
47-52
[doi]
Resource utilization prediction: long term network web service traffic
Daniel W. Yoas
,
Greg Simco
.
riit 2013
:
57-58
[doi]
MP3 files as a steganography medium
Mikhail Zaturenskiy
.
riit 2013
:
23-28
[doi]
Sitemap explorer: browser integrated web navigation
Jack Zheng
.
riit 2013
:
63-64
[doi]
2012
Discovering workplace motivators for the millennial generation of IT employees
Thomas E. Bunton
,
Jeffrey L. Brewer
.
riit 2012
:
13-18
[doi]
Proceedings of the 1st Annual conference on Research in information technology, RIIT 2012, Calgary, AB, Canada, October 10-13, 2012
Randy W. Connolly
,
Jeffrey L. Brewer
, editors,
ACM,
2012.
[doi]
A simulation-based fuzzy multi-attribute decision making for prioritizing software requirements
Abdel Ejnioui
,
Carlos E. Otero
,
Luis Daniel Otero
.
riit 2012
:
37-42
[doi]
Defining IT research
Robert S. Friedman
,
Mark Stockman
,
Han Reichgelt
,
William W. Agresti
,
Joseph J. Ekstrom
.
riit 2012
:
49-50
[doi]
Identifying and evaluating information technology bachelor's degree programs
Andrew Hansen
,
Bikalpa Neupane
,
Barry M. Lunt
,
Richard Ofori
.
riit 2012
:
19-24
[doi]
Evaluations of AODV and DSR for QOS requirements
Hetal Jasani
.
riit 2012
:
1-6
[doi]
A survey SCADA of and critical infrastructure incidents
Bill Miller
,
Dale C. Rowe
.
riit 2012
:
51-56
[doi]
Testing & quantifying ERP usability
Nancy E. Parks
.
riit 2012
:
31-36
[doi]
Comparison of VM deployment methods for HPC education
Nicholas Aaron Robison
,
Thomas J. Hacker
.
riit 2012
:
43-48
[doi]
Mapping the cyber security terrain in a research context
Dale C. Rowe
,
Barry M. Lunt
.
riit 2012
:
7-12
[doi]
Improving accuracy in face tracking user interfaces using consumer devices
Norman H. Villaroman
,
Dale C. Rowe
.
riit 2012
:
57-62
[doi]
Resource utilization prediction: a proposal for information technology research
Daniel W. Yoas
,
Greg Simco
.
riit 2012
:
25-30
[doi]
Sign in
or
sign up
to see more results.