Year Pub | Article | Title | Authors |
2022 | View | Cybersecurity Maturity Model Certification Initial Impact on the Defense Industrial Base
|
Strohmier, Stoker, Vanajakumari, Clark, Cummings, Modaresnezhad
|
2021 | View | Towards a Leader-Driven Supply Chain Cybersecurity Framework |
Vanajakumari, Mittal, Stoker, Clark, Miller
|
2021 | View | The Promise and Perild of Drone Delivery Systems |
Fowler, Vannoy, Eggers, Medlin
|
2019 | View | Security, Privacy, and Legislation Issues related to Commercial Drone Deliveries |
Vannoy, Medlin
|
2010 | View | Towards an Abstract Model for Academia and Information Technology Sector Collaborative Partnerships: Responding to the “West Texas Coalition for Innovation and Commercialization” Initiative |
Mhlanga, Vardiman, Reames
|
2022 | View | A Scalable Amazon Review Collection System |
Woodall, Kline, Vetter, Modaresnezhad
|
2020 | View | Literary Analysis Tool: Text Analytics for Creative Writers |
Grimsman, Kline, Vetter, Guinn
|
2020 | View | Understanding Campus Crime with a Multi-University Analytics System |
Iheadindu, Kline, Vetter, Clark
|
2013 | View | Creating an Audio Conferencing Application |
Sun, Vetter, Reinicke
|
2013 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
2012 | View | Building a Real-Time Bus Tracking Data Display System |
Dudley, Vetter, Brown, Janicki
|
2012 | View | CMobile: A Mobile Photo Capture Application for Construction Imaging |
Martin, Vetter, Brown, Janicki
|
2013 | View | Let’s Look at the Cloud from a Risk Management Perspective |
Vignos, Kim, Metzer
|