Abstract is missing.
- Big data trends and evolution: a human perspectiveFlavio Villanustre. 1-2 [doi]
- Eye tracking data understanding for product representation studiesBrandeis H. Marshall, Shweta Sareen, John A. Springer, Tahira Reid. 3-8 [doi]
- Software architecture model driven reverse engineering approach to open source software developmentWilliam Kim, Sam Chung, Barbara Endicott-Popovsky. 9-14 [doi]
- Printer watermark obfuscationMaya Embar, Louis F. McHugh IV, William R. Wesselman. 15-20 [doi]
- Probabilistically detecting steganography within MP3 filesBen Khodja. 21-26 [doi]
- Passive warden using statistical steganalysisDavid Stacey. 27-32 [doi]
- Detecting subtle port scans through characteristics based on interactive visualizationWeijie Wang, Baijian Yang, Yingjie Victor Chen. 33-38 [doi]
- Using time-series analysis to provide long-term CPU utilization predictionDaniel W. Yoas, Greg Simco. 39-44 [doi]
- Three-dimensional wireless heat mapping and security assessment using multi-rotor aerial dronesScott J. Pack, Dale C. Rowe. 45-50 [doi]
- Analysis of mobile malware based on user awarenessYoungho Kim, Bill Stackpole, Tae Oh. 51-52 [doi]
- Insider hacking: applying situational crime prevention to a new white-collar crimeMark Stockman. 53-56 [doi]
- A survey of security vulnerabilities in social networking media: the case of facebookElizabeth Fokes, Lei Li. 57-62 [doi]
- A taxonomy of privacy-protecting tools to browse the world wide webKelley Misata, Raymond A. Hansen, Baijian Yang. 63-68 [doi]
- Comparing public and private iaas cloud modelsMatthew LaPointe, Lucas Walker, Matthew Nelson, Justin Shananaquet, Xinli Wang. 69-70 [doi]
- SMS notifications for missed calls expanding mobility for TDM environmentsJames P. Dupuis, Michael C. Stinson. 71-74 [doi]
- Modeling of class imbalance using an empirical approach with spambase dataset and random forest classificationKiranmayi Kotipalli, Shan Suthaharan. 75-80 [doi]
- Termediator II: measuring term polysemy using semantic clusteringOwen Riley, Jessica M. Richards, Joseph J. Ekstrom, Kevin Tew. 81-86 [doi]