default search action
3. RIIT 2014: Atlanta, GA, USA
- Becky Rutherfoord, Lei Li, Susan Van de Ven, Amber Settle, Terry Steinbach:
Proceedings of the 3rd annual conference on Research in information technology, RIIT 2014, Atlanta, GA, USA, October 15-18, 2014. ACM 2014, ISBN 978-1-4503-2711-4
Keynote address
- Flavio Villanustre:
Big data trends and evolution: a human perspective. 1-2
RIIT paper session 1
- Brandeis H. Marshall, Shweta Sareen, John A. Springer, Tahira Reid:
Eye tracking data understanding for product representation studies. 3-8 - William Kim, Sam Chung, Barbara Endicott-Popovsky:
Software architecture model driven reverse engineering approach to open source software development. 9-14
RIIT Paper session 2
- Maya Embar, Louis F. McHugh IV, William R. Wesselman:
Printer watermark obfuscation. 15-20 - Ben Khodja:
Probabilistically detecting steganography within MP3 files. 21-26 - David Stacey:
Passive warden using statistical steganalysis. 27-32
RIIT paper session 3
- Weijie Wang, Baijian Yang, Yingjie Victor Chen:
Detecting subtle port scans through characteristics based on interactive visualization. 33-38 - Daniel W. Yoas, Greg Simco:
Using time-series analysis to provide long-term CPU utilization prediction. 39-44 - Scott J. Pack, Dale C. Rowe:
Three-dimensional wireless heat mapping and security assessment using multi-rotor aerial drones. 45-50
RIIT lightning talks
- Youngho Kim, Bill Stackpole, Tae Hwan Oh:
Analysis of mobile malware based on user awareness. 51-52
RIIT paper session 4
- Mark Stockman:
Insider hacking: applying situational crime prevention to a new white-collar crime. 53-56 - Elizabeth Fokes, Lei Li:
A survey of security vulnerabilities in social networking media: the case of facebook. 57-62 - Kelley Misata, Raymond A. Hansen, Baijian Yang:
A taxonomy of privacy-protecting tools to browse the world wide web. 63-68
RIIT poster
- Matthew LaPointe, Lucas Walker, Matthew Nelson, Justin Shananaquet, Xinli Wang:
Comparing public and private iaas cloud models. 69-70
RIIT paper session 5
- James P. Dupuis, Michael C. Stinson:
SMS notifications for missed calls expanding mobility for TDM environments. 71-74 - Kiranmayi Kotipalli, Shan Suthaharan:
Modeling of class imbalance using an empirical approach with spambase dataset and random forest classification. 75-80 - Owen Riley, Jessica M. Richards, Joseph J. Ekstrom, Kevin Tew:
Termediator II: measuring term polysemy using semantic clustering. 81-86
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.