Keyword | Year Pub | Article | Title | Authors |
n-gram | 2014 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
n-grams | 2017 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|
nationwide health information network | 2013 | View | Information Security Blueprint |
Clark, Benli, Mitchell, Vetter
|
Natural Disaster | 2010 | View | Contingency Planning: Disaster Recovery Strategies for Successful Educational Continuity |
Omar, Udeh, Mantha
|
Natural Language Processing | 2023 | View | Text Prediction Using Artificial Intelligence: An Analysis of Two Text Prediction Systems |
Wimmer, Du, Heri
|
Natural Language Processing | 2017 | View | An Interactive Toolbox for Twitter Content Analytics |
Jafar, Waldman
|
Natural Language Processing | 2014 | View | Decision-Making via Visual Analysis using the Natural Language Toolkit and R |
Jafar, Babb, Dana
|
needs | 2008 | View | Computing Professional Association Membership: An Exploration of Membership Needs and Motivations |
Ritzhaupt, Umapathy, Jamba
|
Net Generation (Net Geners) | 2010 | View | A Study of the Perceptions of Students on Privacy and Security on Social Networking Sites (SNS) on the Internet |
Lawler, Molluzzo
|
Network Access | 2010 | View | The Results of Implementing a Knowledge Management Initiative to Enhance Network Access Controls |
Kim, Nelson
|
network function virtualization | 2021 | View | A Comparative Study on Information Technology (IT) Infrastructure and Disaster Recovery Methodology |
Sambasivam, Brown Jr
|
network instrusion detection | 2017 | View | Proposal for Kelly Criterion-Inspired Lossy Network Compression for Network Intrusion Applications |
Smith, Hammell II
|
network intrusion detection | 2024 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service |
Kangethe , Wimmer, Rebman Jr.
|
network intrustion detection | 2019 | View | The use of Snap Length in Lossy Network Traffic Compression for Network Intrusion Detection Applications |
Smith, Hammell II
|
Network security | 2012 | View | The New Tech Effect: Analyzing Juror Credibility |
Davis, Paullet, Kraeer, Grant
|
Networks and Security | 2009 | View | An Examination of Information Security in Mobile Banking Architectures |
Streff, Haar
|
Nigeria | 2009 | View | Cross-Cultural View of Handheld Wireless Media Usage |
Lind, Anyansi-Archibong, Anyansi
|
NLP | 2024 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
Nonprofits | 2014 | View | Information Security in Nonprofits: A First Glance at the State of Security in Two Illinois Regions |
Imboden, Phillips, Seib, Fiorentino
|
Normalization | 2019 | View | Effects of Normalization Techniques on Logistic Regression in Data Science |
Adeyemo, Wimmer, Powell
|
NSA | 2016 | View | Leakage of Geolocation Data by Mobile Ad Networks |
Snow, Hayes, Dwyer
|
Nurse Staff Mix | 2023 | View | Short Stay Healthcare Quality in Skilled Nursing Facilities: Occupancy, Nurse Staff Mix, and COVID-19
|
Winston, Xiong, Medlin, Pelaez
|