Search by Authors

Search returned 13 items for : V

Year PubArticleTitleAuthors
2022ViewCybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
2021ViewTowards a Leader-Driven Supply Chain Cybersecurity Framework Vanajakumari, Mittal, Stoker, Clark, Miller
2021ViewThe Promise and Perild of Drone Delivery Systems Fowler, Vannoy, Eggers, Medlin
2019ViewSecurity, Privacy, and Legislation Issues related to Commercial Drone Deliveries Vannoy, Medlin
2010ViewTowards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative Mhlanga, Vardiman, Reames
2022ViewA Scalable Amazon Review Collection System Woodall, Kline, Vetter, Modaresnezhad
2020ViewLiterary Analysis Tool: Text Analytics for Creative Writers Grimsman, Kline, Vetter, Guinn
2020ViewUnderstanding Campus Crime with a Multi-University Analytics System Iheadindu, Kline, Vetter, Clark
2013ViewCreating an Audio Conferencing Application Sun, Vetter, Reinicke
2013ViewInformation Security Blueprint Clark, Benli, Mitchell, Vetter
2012ViewBuilding a Real-Time Bus Tracking Data Display System Dudley, Vetter, Brown, Janicki
2012ViewCMobile: A Mobile Photo Capture Application for Construction Imaging Martin, Vetter, Brown, Janicki
2013ViewLet’s Look at the Cloud from a Risk Management Perspective Vignos, Kim, Metzer