![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
5. RIIT 2016: Boston, MA, USA
- Deborah Boisvert, Stephen J. Zilora:
Proceedings of the 5th Annual Conference on Research in Information Technology, RIIT 2016, Boston, MA, USA, September 28 - October 1, 2016. ACM 2016, ISBN 978-1-4503-4453-1
Keynote Address
- Nigel Jacob:
Using Technology to Build Compassion. 1
C1: RIIT Paper Session
- Anthony Ramirez, Alfredo Fernandez:
MP4 Steganography: Analyzing and Detecting TCSteg. 2-6 - Ricardo A. Calix, Armando Cabrera, Irshad Iqbal:
Analysis of Parallel Architectures for Network Intrusion Detection. 7-12 - Sam Chung, Cheolmin Sky Moon, Barbara Endicott-Popovsky:
Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System. 13-18
C2: RIIT Paper Session
- C. Richard G. Helps, Clarissa Helps:
Measuring Stylus and Tablet Performance for Usability in Sketching. 19-24 - Deborah LaBelle, Jawaher Alsulami, Jim Leone:
Effects of using iPads on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia. 25-28 - Zahra Alqubaiti, Lei Li, Jing He:
The Paradox of Social Media Security: Users' Perceptions versus Behaviors. 29-34
C3: RIIT Paper Session
- Marc J. Dupuis, Samreen Khadeer:
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat. 35-40 - Amos O. Olagunju, Farouk Samu:
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention. 41-46 - Raymond A. Hansen, Benjamin Peterson, Timothy Becker:
Investigating the Security of Nexus 1000V Virtual Switches in VMware ESXi Hypervisors. 47-52
C4: RIIT Lightning Talk Session
- Debasis Bhattacharya, Mario Canul, Saxon Knight:
Impact of the Physical Web and BLE Beacons. 53
C5: RIIT Posters
- Chad A. Arney, Xinli Wang:
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules. 54 - Marc J. Dupuis:
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised. 55
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.