Submissions from 2023
Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications, Zhao Gary Yu, Omar El-Gayar, and Tu Cindy Zhiling
Submissions from 2022
Recommender systems research and theory in higher education: A systematic literature review, Alicia McNett, and Cherie Noteboom
Design of a Virtual Cybersecurity Escape Room, Tania Williams and Omar El-Gayar
How Attractive is Artificial Intelligence? An Empirical Study of User Adoption of AI- Enabled Applications, Zhau, Gary; Omar El-Gayar; and tu Cindy
Submissions from 2021
BYOD security issues: a systematic literature review, Melva Ratchford, Omar El-Gayar, Cherie Noteboom, and yong wang
Adverse Health Effects of Kratom: An Analysis of Social Media Data, Abdullah Wahbeh, tareq Nasralah, Omar El-Gayar, and Ahmed Elnoshokaty
Security Analytics, Tania Williams, Thomas H. Morris, and Omar El-Gayar
Submissions from 2020
An Inventory of Existing Neuroprivacy Controls, Dustin Steinhagen and Houssain Kettani
Submissions from 2018
End-to-End Trust and Security for Internet of Things Applications, Sulabh Bhattarai and Yong Wang
An Optimized Running Window Entropy Algorithm, Keith Jones and Yong Wang
CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path, Pamela Rowland, Ashley L. Podhradsky, and Stephanie Plucker
A Malware Analysis and Artifact Capture Tool, Dallas Wright and Josh Stroschein
Submissions from 2017
Impact of E-Visits on Emergency Departments and Urgent Care Centers, Ali Ahmed, Tareq Nasralah, Yong Wang, Cherie Noteboom, Renae Spohn, Linda Parks, Julie Wulf Plimpton, and Ronghua Shan
The Demand for Technical Safeguards in the Healthcare Sector: a Historical Perspective Enlightens Deliberations about the Future, Tareq Z. Allan and Yong Wang
Submissions from 2016
Reverse Engineering a Nit That Unmasks Tor Users, Matthew Miller, Josh Stroschein, and Ashley L. Podhradsky
A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, Jason Nikolai and Yong Wang
An Attribtue-Based Statistic Model for Privacy Impact Assessment, Yong Wang and Jun Liu