


default search action
IEEE Computer, Volume 54
Volume 54, Number 1, January 2021
- Forrest Shull, Megha Ben:

Driving Innovation and Removing Barriers: Forrest Shull Takes the Helm as 2021 IEEE Computer Society President. 4-9 - Leila De Floriani:

2020: A Year of Transformative Change and Conquering Adversity. 10-14 - Elisabeth André

:
Can Artificial Intelligence Detect Good (or Bad) Chemistry Between People? 16-17 - Erich J. Neuhold:

50 & 25 Years Ago. 21-24 - Jeffrey M. Voas, Nir Kshetri

:
Scarcity. 26-28 - Nicky Mouha, Asmaa Hailane:

The Application of Formal Methods to Real-World Cryptographic Algorithms, Protocols, and Systems. 29-38 - Joseph Williams

, Jeffrey M. Voas:
Outlook 2021. 40-41 - Vard Antinyan

:
Hypnotized by Lines of Code. 42-48 - Alexander Weiss

, Smitha Gautham, Athira Varma Jayakumar, Carl R. Elks
, D. Richard Kuhn
, Raghu N. Kacker, Thomas B. Preußer:
Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems. 49-60 - Vartan Piroumian

:
Digital Twins: Universal Interoperability for the Digital Age. 61-69 - Henry M. Kim

, Marek Laskowski, Michael Zargham, Hjalmar K. Turesson
, Matthew Barlin, Danil Kabanov:
Token Economics in Real Life: Cryptocurrency and Incentives Design for Insolar's Blockchain Network. 70-80 - David Alan Grier

:
Where Do We Learn to Behave Like Grownups? 81-83 - Hiroshi Fuketa, Kunio Uchiyama:

Edge Artificial Intelligence Chips for the Cyberphysical Systems Era. 84-88 - Richard D. Riehle, James Bret Michael

:
Improving the Trustworthiness of Software Through Rigorous Data Type Design. 89-95 - Jason Borenstein

, Frances S. Grodzinsky, Ayanna M. Howard
, Keith W. Miller
, Marty J. Wolf:
AI Ethics: A Long History and a Recent Burst of Attention. 96-102 - Paul N. Edwards, John Leslie King

:
Institutions, Infrastructures, and Innovation. 103-109
Volume 54, Number 2, February 2021
- Sudip Mittal:

Secure V2V and V2I Technologies for the Next-Generation Intelligent Transportation Systems. 4-6 - Erich J. Neuhold:

50 & 25 Years Ago. 10-12 - Ergun Akleman

:
Computing Through Time. 11 - Jeffrey M. Voas

, Nir Kshetri
:
Monetizing You. 13-15 - Jeffrey M. Voas:

In This Issue. 14 - David Alan Grier

, Dejan S. Milojicic
, Sorel Reisman, John W. Walz
:
Special Technical Communities: A 10-Year Retrospective. 16-25 - Nir Kshetri

, Jeffrey M. Voas, Ravi Sharma
:
Computing and Socioeconomic Transformations. 26-29 - Friedhelm Victor

, Peter Ruppel
, Axel Küpper:
A Taxonomy for Distributed Ledger Analytics. 30-38 - Gonçalo Sousa Mendes, Daniel Chen, Bruno M. C. Silva

, Carlos Serrão
, João Casal:
A Novel Reputation System for Mobile App Stores Using Blockchain. 39-49 - Han-Yee Kim

, Lei Xu
, Weidong Shi, Taeweon Suh
:
A Secure and Flexible FPGA-Based Blockchain System for the IIoT. 50-59 - David Alan Grier:

There Is Still No Silver Bullet. 60-62 - George O. Strawn:

Pandemics, Public Education, and the Future. 63-65 - Mark Campbell

:
Tomorrow's Call Center Will Be Neither: Not Call Focused, Nor Centralized. 66-69 - Norita B. Ahmad:

Do Data Almost Always Eventually Leak? 70-74 - Jesús M. González-Barahona

:
A Brief History of Free, Open Source Software and Its Communities. 75-79 - Alexander Kott, Igor Linkov:

To Improve Cyber Resilience, Measure It. 80-85 - Joanna F. DeFranco

, Nir Kshetri
, Jeffrey M. Voas
:
Rearchitecting the Malls: The Shifting U.S. Retail Landscape. 86-90
Volume 54, Number 3, March 2021
- Daniel J. Sorin

:
Reconfigurable Hardware in Postsilicon Microarchitecture. 4-5 - Jeffrey M. Voas

, Nir Kshetri
:
Online Eats "Food Courts". 14-17 - Jeffrey M. Voas

:
In This Issue. 15 - Piotr Nawrocki

, Krzysztof Wrona, Mateusz Marczak, Bartlomiej Sniezynski
:
A Comparison of Native and Cross-Platform Frameworks for Mobile Applications. 18-27 - Chen Liu

:
Visualizing Logical Correlation in Trace Data for System Debugging. 28-36 - Sugandhi

, Parteek Kumar, Sanmeet Kaur
:
Indian Sign Language Generation System. 37-46 - Hsiao-Ying Lin

:
Will We Adopt AI Like We Adopted Electricity? 48-51 - David Alan Grier

:
The Engineering Mindset. 52-54 - Joanna F. DeFranco

, David F. Ferraiolo, Rick Kuhn
, Joshua Roberts:
A Trusted Federated System to Share Granular Data Among Disparate Database Resources. 55-62 - Petros Kapsalas, Aris S. Lalos

, Konstantinos Moustakas, Dimitrios Serpanos
:
The Role of Modularity in Multimodal Simultaneous Localization and Mapping Systems. 63-67 - Steven Furnell, Julie M. Haney

, Mary Theofanos:
Pandemic Parallels: What Can Cybersecurity Learn From COVID-19? 68-72 - Raghvinder S. Sangwan

, Robert L. Nord
, Ipek Ozkaya
:
Architectural Dependency Analysis: Addressing the Elephant in the Room. 73-78 - Riccardo Mariani

, Nir Maor, Jyotika Athavale, Kevin Gay:
The Importance of Interoperability in Functional Safety Standards. 80-84
Volume 54, Number 4, April 2021
- Ergun Akleman:

Computing Through Time. 10 - Jeffrey M. Voas, Keith W. Miller

:
Confronting Your Digital Accuser. 11-13 - Jeffrey M. Voas

:
In This Issue. 12 - Liu Liu

, Jie Tang
, Shaoshan Liu
, Bo Yu
, Yuan Xie
, Jean-Luc Gaudiot
:
Π-RT: A Runtime Framework to Enable Energy-Efficient Real-Time Robotic Vision Applications on Heterogeneous Architectures. 14-25 - Jiangtao Wang

, Leye Wang
, Yanhui Song:
Crowd-Machine Hybrid Urban Sensing and Computing. 26-34 - Ava Lew

:
Flipping the Script: A Sociotechnical Approach to Platforms and Unanticipated Uses. 35-44 - David Alan Grier

:
Linking the Elements Together: Will NoSQL Databases Live up to Their Promise? 46-48 - Doron Drusinsky

:
Who Is Authenticating My E-Commerce Logins? 49-54 - Mark Campbell

:
Computational Acceleration: Offense in Depth. 55-58 - Preeti Chauhan

, Mohit Sood:
Big Data: Present and Future. 59-65 - Shaoshan Liu, Jean-Luc Gaudiot

, Hironori Kasahara
:
Engineering Education in the Age of Autonomous Machines. 66-69 - Isabel Drost-Fromm, Rob Tompkins

:
Open Source Community Governance the Apache Way. 70-75 - Matthew Lanoue, Chad A. Bollmann, James Bret Michael

, John D. Roth
, Duminda Wijesekera
:
An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities. 76-84 - Nir Kshetri

:
The Economics of Digital Twins. 86-90
Volume 54, Number 5, May 2021
- Gülüstan Dogan

:
Advances in Human Activity Recognition. 4-6 - Erich J. Neuhold:

50 & 25 Years Ago. 10-12 - Vinton G. Cerf

:
"What We Do Now, Kemosabe?". 13-14 - Nir Kshetri

, Jeffrey M. Voas
:
Major Computing Technologies of the Past 75 Years. 15-21 - Marilyn Wolf

, Dimitrios Serpanos
:
Computing for Autonomy: Latency, Power, Resilience. 22-23 - Joy Arulraj, Abhijit Chatterjee

, Alexandros Daglis
, Ashutosh Dhekne
, Umakishore Ramachandran
:
eCloud: A Vision for the Evolution of the Edge-Cloud Continuum. 24-33 - Bernhard Rinner

, Christian Bettstetter
, Hermann Hellwagner, Stephan Weiss:
Multidrone Systems: More Than the Sum of the Parts. 34-43 - Samuel H. Christie V.

, Amit K. Chopra
, Munindar P. Singh
:
Bungie: Improving Fault Tolerance via Extensible Application-Level Protocols. 44-53 - David Alan Grier

:
Don't Make Me Puke. 54-55 - Hsiao-Ying Lin

, Battista Biggio:
Adversarial Machine Learning: Attacks From Laboratories to the Real World. 56-60 - David Lorge Parnas

:
Software Engineering: A Profession in Waiting. 62-64 - Joanna F. DeFranco, Christopher S. Eagle, James Bret Michael

, John Viega, Jeffrey M. Voas:
Hackathons 101. 65-69 - Dana Eleftheriadou

, Eddy Hartog, Natalia Gkiaouri:
The Cities Challenge: Driving a Green and Digital Recovery and Social Resilience. 70-75 - Joanna F. DeFranco

, Michael Hutchinson:
Understanding Smart Medical Devices. 76-80 - Claude Y. Laporte

, Mirna Muñoz:
Not Teaching Software Engineering Standards to Future Software Engineers-Malpractice? 81-88
Volume 54, Number 6, June 2021
- Ergun Akleman

:
Computing through time. 8 - Jeffrey M. Voas

, Nir Kshetri
:
Homework [EIC'S Message]. 10-12 - Jeffrey M. Voas

:
About This Issue. 11 - Marc C. Canellas

:
Defending IEEE Software Standards in Federal Criminal Court. 14-23 - Jaime Meza

, Leticia Vaca Cárdenas
, Mónica Vaca-Cardenas, Luis Terán
, Edy Portmann:
A Human-Machine Collaboration Model for Urban Planning in Smart Cities. 24-35 - Cody H. Fleming

, Carl R. Elks
, Georgios Bakirtzis
, Stephen C. Adams
, Bryan T. Carter, Peter A. Beling
, Barry M. Horowitz
:
Cyberphysical Security Through Resiliency: A Systems-Centric Approach. 36-45 - David Alan Grier

:
Forgetting Moore's Law [Body of Knowledge]. 46-48 - Changmi Jung, Lasse Mertins

:
Quality and Accountability in the Online Business Education Environment. 49-52 - Nir Kshetri

:
The Economics of Central Bank Digital Currency [Computing's Economics]. 53-58 - Wayne Beaton

:
Open Source Software Engineering the Eclipse Way. 59-63 - Joshua A. Kroll

, James Bret Michael
, David B. Thaw:
Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards, and Frameworks. 64-71
Volume 54, Number 7, July 2021
- Manish Parashar

:
Enabling Reproducible Research in Parallel and Distributed Systems. 4-5 - Jeffrey M. Voas

, Nir Kshetri
:
Lost and Never Found. 12-13 - Phil Laplante

, Dejan S. Milojicic
:
Technology Predictions. 14-16 - J. Antonio García-Macías

, Luís A. Castro
, Arturo Serrano-Santoyo:
Diverging Images of the Technoscapes in Developing Economies. 18-26 - Lei Xu

, Lin Chen
, Zhimin Gao, Hiram Moya, Weidong Shi:
Reshaping the Landscape of the Future: Software-Defined Manufacturing. 27-36 - Sachin Motwani

, Anubha Gupta
:
Experiencing Hyperloops: The Transit of the Future. 37-45 - Aspen Russell

, Eitan Frachtenberg
:
Worlds Apart: Technology, Remote Work, and Equity. 46-56 - Arne Broering

, Christoph Niedermeier, Ioana Olaru, Ulrich Schöpp
, Kilian Telschig, Michael Villnow:
Toward Embodied Intelligence: Smart Things on the Rise. 57-68 - Tommi Mikkonen

, Cesare Pautasso
, Antero Taivalsaari:
Isomorphic Internet of Things Architectures With Web Technologies. 69-78 - David Alan Grier

:
Value by Squares. 79-81 - Efstratios Chatzoglou

, Georgios Kambourakis, Constantinos Kolias
:
WiF0: All Your Passphrase Are Belong to Us. 82-88 - Dennis Brophy

:
Design Automation Standards Committee: Setting Tomorrow's Standards. 89-93 - Sicun Gao

:
Nonlinearity, Automation, and Reliable Cyberphysical Systems. 94-96 - John Viega

, James Bret Michael
:
Struggling With Supply-Chain Security. 98-104 - Norita B. Ahmad

, Nash Milic, Mohammed Ibahrine:
Data and Disinformation. 105-110 - Doron Drusinsky

, James Bret Michael
:
Multiagent Pathfinding Under Rigid, Optimization, and Uncertainty Constraints. 111-118 - Heimo Müller

, Michaela Theresia Mayrhofer, Evert-Ben van Veen
, Andreas Holzinger
:
The Ten Commandments of Ethical Medical AI. 119-123
Volume 54, Number 8, August 2021
- Terence Kelly:

Letters. 4 - Erich J. Neuhold:

50 & 25 Years Ago. 8-10 - Ergun Akleman

:
Compliting Through Time. 9 - Nir Kshetri

, Jeffrey M. Voas
:
Where's the Silicon? 11-12 - Vladimir Getov

:
Insights Into the Origins of the IEEE Computer Society and the Invention of Electronic Digital Computing. 13-18 - W. Eric Wong

, Zijiang Yang:
Safety, Security, and Reliability of Autonomous Vehicle Software. 20-21 - Simon Burton

, John A. McDermid
, Philip Garnett
, Rob Weaver:
Safety, Complexity, and Automated Driving: Holistic Perspectives on Safety Assurance. 22-32 - Haiyang Yu

, Shuai Ma, Qi Hu, Zhen Yang
:
Blockchain-Based Continuous Auditing for Dynamic Data Sharing in Autonomous Vehicular Networks. 33-45 - Sachin Motwani

, Tarun Sharma
, Anubha Gupta
:
Ethics in Autonomous Vehicle Software: The Dilemmas. 46-55 - Ye Ni, Zhilong Xia, Fangtong Zhao, Chunrong Fang

, Zhenyu Chen
:
An Online Multistep-Forward Voltage-Prediction Approach Based on an LSTM-TD Model and KF Algorithm. 56-65 - Koorosh Aslansefat

, Sohag Kabir
, Amr Abdullatif
, Vinod Vasudevan, Yiannis Papadopoulos
:
Toward Improving Confidence in Autonomous Vehicle Software: A Study on Traffic Sign Recognition Systems. 66-76 - Jack R. Toohey, M. S. Raunak

, Dave W. Binkley
:
From Neuron Coverage to Steering Angle: Testing Autonomous Vehicles Effectively. 77-85 - David Alan Grier

:
For the Common Defense. 86-88 - Mark Campbell

, Mladan Jovanovic
:
Conversational Artificial Intelligence: Changing Tomorrow's Health Care Today. 89-93 - Dejan S. Milojicic

:
Educate Back Better: A Perspective from Industry. 94-97 - Nir Kshetri

:
The Economics of Blockchain-Based Supply Chain Traceability in Developing Countries. 98-103 - Sean P. Goggins, Matt Germonprez, Kevin Lumbard:

Making Open Source Project Health Transparent. 104-111 - Alexander Kott

, Maureen S. Golan, Benjamin D. Trump, Igor Linkov
:
Cyber Resilience: by Design or by Intervention? 112-117 - Philip C. Treleaven

:
Future Computers: Digital, Quantum, Biological. 118-124 - Preeti Chauhan

, Nir Kshetri
:
2021 State of the Practice in Data Privacy and Security. 125-132
Volume 54, Number 9, September 2021
- Patrick Schaumont

, Paolo Montuschi
:
Computer Security at the Forefront of Emerging Topics in Computing. 4-5 - Erich J. Neuhold:

50 & 25 Years Ago. 9-12 - Jeffrey M. Voas

, Phil Laplante
:
"Opening" Banking. 13-14 - James Bret Michael

, Doron Drusinsky
, Duminda Wijesekera
:
Formal Verification of Cyberphysical Systems. 15-24 - James Bret Michael

, Doron Drusinsky
, Duminda Wijesekera
:
Formal Methods in Cyberphysical Systems. 25-29 - Ziquan Deng

, Zhaodan Kong
:
Interpretable Fault Diagnosis for Cyberphysical Systems: A Learning Perspective. 30-38 - Meiyi Ma

, John A. Stankovic
, Lu Feng
:
Toward Formal Methods for Smart Cities. 39-48 - Guangyao Chen

, Zhihao Jiang
:
Environment Modeling During Model Checking of Cyberphysical Systems. 49-58 - Matthew Jablonski

, Bo Yu, Gabriela Felicia Ciocarlie, Paulo C. G. Costa
:
A Case Study in the Formal Modeling of Safe and Secure Manufacturing Automation. 59-71 - David Alan Grier

:
Time and Money. 72-74 - Jon G. Rokne

:
Shoehorning. 76-79 - Christian Berghoff

, Matthias Neu, Arndt von Twickel:
The Interplay of AI and Biometrics: Challenges and Opportunities. 80-85 - Dimitrios Serpanos

, Konstantinos Katsigiannis:
Fuzzing: Cyberphysical System Testing for Security and Dependability. 86-89 - James Bret Michael

, Thomas C. Wingfield:
Defensive AI: The Future Is Yesterday. 90-96 - Michael Zyda

:
"Why Did I Say, 'Yes' to Writing This Bimonthly Column?". 98-102
Volume 54, Number 10, October 2021
- Qihua Zhou

, Song Guo
, Haodong Lu
, Li Li, Minyi Guo, Yanfei Sun
, Kun Wang:
A Comprehensive Inspection of the Straggler Problem. 4-5 - Erich J. Neuhold:

50 & 25 Years Ago. 9-12 - Ergun Akleman

:
Computing Through Time. 11 - Jeffrey M. Voas

:
Tell Me a Story. 13 - Phil Laplante

, Ben Amaba:
Artificial Intelligence in Critical Infrastructure Systems. 14-24 - M. S. Raunak

, Rick Kuhn
:
Explainable Artificial Intelligence and Machine Learning. 25-27 - Mohammad Naiseh

, Deniz Cemiloglu, Dena Al-Thani
, Nan Jiang, Raian Ali
:
Explainable Recommendations and Calibrated Trust: Two Systematic User Errors. 28-37 - Sahil Deo

, Neha Sontakke
:
Usability, User Comprehension, and Perceptions of Explanations for Complex Decision Support Systems in Finance: A Robo-Advisory Use Case. 38-48 - Ismini Psychoula

, Andreas Gutmann, Pradip Mainali, Sharon H. Lee, Paul Dunphy, Fabien A. P. Petitcolas
:
Explainable Machine Learning for Fraud Detection. 49-59 - Seshadhri Srinivasan

, Pandarasamy Arjunan, Baihong Jin, Alberto L. Sangiovanni-Vincentelli
, Zuraimi Sultan, Kameshwar Poolla
:
Explainable AI for Chiller Fault-Detection Systems: Gaining Human Trust. 60-68 - Victoria DaPoian

, Eric Lyness, William Brinckerhoff, Ryan Danell, Xiang Li, Melissa Trainer:
Science Autonomy and the ExoMars Mission: Machine Learning to Help Find Life on Mars. 69-77 - Andreas Holzinger

, Heimo Müller
:
Toward Human-AI Interfaces to Support Explainability and Causability in Medical AI. 78-86 - David Alan Grier

:
Do We Go Viral? 87-89 - Joseph Mortati

, Erran Carmel:
Can We Prevent a Technological Arms Race in University Student Cheating? 90-94 - David Harel, Assaf Marron, Raz Yerushalmi:

Scenario-Based Algorithmics: Coding Algorithms by Automatic Composition of Separate Concerns. 95-101 - Joseph Williams

:
The Computing Architectures Donnybrook. 102-105 - Alexandre K. Ligo, Alexander Kott

, Igor Linkov
:
Autonomous Cyberdefense Introduces Risk: Can We Manage the Risk? 106-110 - Frank Hannig

, Jürgen Teich
:
Open Source Hardware. 111-115 - Amin Vahdat, Dejan S. Milojicic

:
The Next Wave in Cloud Systems Architecture. 116-120 - Phil Laplante

, Nir Kshetri
:
Open Banking: Definition and Description. 122-128 - Norita B. Ahmad

, Kevin Dias:
Validating "Data Validation". 129-132 - Joanna F. DeFranco

:
12 Flavors of IoT. 133-137 - Hal Berghel

:
A Collapsing Academy, Part II: How Cancel Culture Works on the Academy. 138-144
Volume 54, Number 11, November 2021
- Tao Ju:

Deforming With Sparsity. 4-5 - Erich J. Neuhold:

50 & 25 Years Ago. 10-12 - David Alan Grier:

Counting the Accomplishments, Not the Years. 13-14 - Jeffrey M. Voas:

Is Anybody Listening? 15-16 - Rolf Ernst, Xiaobo Sharon Hu

:
Autonomous Systems Design - A Virtual Roundtable. 17-25 - Malcolm Shore, Sherali Zeadally, Astha Keshariya:

Zero Trust: The What, How, Why, and When. 26-35 - Prosanta Gope, Biplab Sikdar:

A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation. 36-46 - Maxim Chernyshev, Zubair Ahmed Baig, Sherali Zeadally:

Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface. 47-57 - Michael Linares, Nishant Aswani, Gary Mac, Chenglu Jin, Fei Chen

, Nikhil Gupta, Ramesh Karri
:
Hack3D: Crowdsourcing the Assessment of Cybersecurity in Digital Manufacturing. 58-67 - Christof Ebert, Ruschil Ray:

Toward a Formal Traceability Model for Efficient Security Validation. 68-78 - David Alan Grier:

Objects in the Mirror Are Closer Than They Appear. 79-81 - Phil Laplante:

Software Labels. 82-86 - Adam Cron, Erik Jan Marinissen:

IEEE Standard 1838 Is on the Move. 88-94 - Hsiao-Ying Lin:

Colors of Artificial Intelligence. 95-99 - George Nikolakopoulos, Ali Agha:

Pushing the Limits of Autonomy for Enabling the Next Generation of Space Robotics Exploration Missions. 100-103 - James Bret Michael:

Trusting Human-Machine Teaming. 104-107 - Achintya K. Bhowmik, David A. Fabry, Phillip G. Armour, Hal Berghel, Robert N. Charette, John L. King:

Hear, Now, and in the Future: Transforming Hearing Aids Into Multipurpose Devices. 108-120
Volume 54, Number 12, December 2021
- Qian Zhang

:
DROO: Integrated Learning and Optimization for Edge Computing Offloading. 4-6 - Erich J. Neuhold:

50 & 25 Years Ago. 10-12 - Ergun Akleman:

Computing Through Time. 11 - Forrest Shull, Megha Ben:

75 Years Young: Reflecting on a Milestone Year for the Society. 13-17 - Joanna F. DeFranco, Jeffrey M. Voas:

Reproducibility, Fabrication, and Falsification. 24-26 - Claudio Demartini, Leila De Floriani, Ji-Jiang Yang, Alfredo Cuzzocrea, Hossain Shahriar, Sorel Reisman, Mohammad Zulkernine:

IEEE COMPSAC 2022. 27 - Philip Koopman, Benjamin Kuipers, William H. Widen, Marilyn Wolf:

Ethics, Safety, and Autonomous Vehicles. 28-37 - Valeria Henríquez

, Ana María Moreno, José A. Calvo-Manzano
, Tomás San Feliu:
Agile-CMMI Alignment: Contributions and To-Dos for Organizations. 38-49 - Georgios Bakirtzis

, Eswaran Subrahmanian
, Cody H. Fleming:
Compositional Thinking in Cyberphysical Systems Theory. 50-59 - Dorian Leroy, June Sallou

, Johann Bourcier
, Benoît Combemale:
When Scientific Software Meets Software Engineering. 60-71 - Yan Zhu

, Qian Guo, Hongjian Yin, Kaitai Liang, Stephen S. Yau:
Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts. 72-80 - David Alan Grier:

"The Known World" and Its Successors. 81-83 - Suzanna Schmeelk, Irena Bojanova:

Perspectives on Directing a Graduate Cybersecurity Program. 84-87 - Mark Campbell:

Protecting AI: We Built the Brains, but What About Helmets? 88-91 - Mamduh M. Hanafi, Nir Kshetri, Ravi Sharma

:
Economics of Artificial Intelligence in the Gulf Cooperation Council Countries. 92-98 - Dirk Riehle:

The Open Source Distributor Business Model. 99-103 - Joanna F. DeFranco, Dimitrios Serpanos:

The 12 Flavors of Cyberphysical Systems. 104-108 - Hal Berghel:

The Online Disinformation Opera. 109-115 - Michael Zyda:

Will I See Sensor-Based Games Happen Before I Die? 116-120

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














