Follow

Submissions from 2023

PDF

Is Artificial Intelligence Attractive? An Empirical Study on User’s Intention to Use AI-Enabled Applications, Zhao Gary Yu, Omar El-Gayar, and Tu Cindy Zhiling

Submissions from 2022

Link

Recommender systems research and theory in higher education: A systematic literature review, Alicia McNett, and Cherie Noteboom

PDF

Design of a Virtual Cybersecurity Escape Room, Tania Williams and Omar El-Gayar

PDF

How Attractive is Artificial Intelligence? An Empirical Study of User Adoption of AI- Enabled Applications, Zhau, Gary; Omar El-Gayar; and tu Cindy

Submissions from 2021

PDF

BYOD security issues: a systematic literature review, Melva Ratchford, Omar El-Gayar, Cherie Noteboom, and yong wang

PDF

Adverse Health Effects of Kratom: An Analysis of Social Media Data, Abdullah Wahbeh, tareq Nasralah, Omar El-Gayar, and Ahmed Elnoshokaty

PDF

Security Analytics, Tania Williams, Thomas H. Morris, and Omar El-Gayar

Submissions from 2020

PDF

An Inventory of Existing Neuroprivacy Controls, Dustin Steinhagen and Houssain Kettani

Submissions from 2018

Link

End-to-End Trust and Security for Internet of Things Applications, Sulabh Bhattarai and Yong Wang

Link

An Optimized Running Window Entropy Algorithm, Keith Jones and Yong Wang

Link

CybHER: A Method for Empowering, Motivating, Educating and Anchoring Girls to a Cybersecurity Career Path, Pamela Rowland, Ashley L. Podhradsky, and Stephanie Plucker

PDF

A Malware Analysis and Artifact Capture Tool, Dallas Wright and Josh Stroschein

Submissions from 2017

Link

Impact of E-Visits on Emergency Departments and Urgent Care Centers, Ali Ahmed, Tareq Nasralah, Yong Wang, Cherie Noteboom, Renae Spohn, Linda Parks, Julie Wulf Plimpton, and Ronghua Shan

Link

The Demand for Technical Safeguards in the Healthcare Sector: a Historical Perspective Enlightens Deliberations about the Future, Tareq Z. Allan and Yong Wang

Submissions from 2016

Link

Reverse Engineering a Nit That Unmasks Tor Users, Matthew Miller, Josh Stroschein, and Ashley L. Podhradsky

PDF

A System for Detecting Malicious Insider Data Theft in IaaS Cloud Environments, Jason Nikolai and Yong Wang

PDF

An Attribtue-Based Statistic Model for Privacy Impact Assessment, Yong Wang and Jun Liu