Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/itpro/itpro15.bht:"
@article{DBLP:journals/itpro/AkiyamaYH13, author = {Mitsuaki Akiyama and Takeshi Yagi and Takeo Hariu}, title = {Improved Blacklisting: Inspecting the Structural Neighborhood of Malicious URLs}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {50--56}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.118}, doi = {10.1109/MITP.2012.118}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/AkiyamaYH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Anderson13, author = {Julie M. Anderson}, title = {Government Risk Management Lags behind Vendor Practices}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {5--7}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.29}, doi = {10.1109/MITP.2013.29}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Anderson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Averweg13, author = {Udo Richard Averweg}, title = {Information Systems: Practitioner-Based Inquiry Research}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {44--47}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.27}, doi = {10.1109/MITP.2012.27}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Averweg13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/BaqueroPM13, author = {Alejandro Vera Baquero and Ricardo Colomo Palacios and Owen Molloy}, title = {Business Process Analytics Using a Big Data Approach}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {29--35}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.60}, doi = {10.1109/MITP.2013.60}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/BaqueroPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/BojanovaZV13, author = {Irena Bojanova and Jia Zhang and Jeffrey M. Voas}, title = {Cloud Computing}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {12--14}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.26}, doi = {10.1109/MITP.2013.26}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/BojanovaZV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Chang13, author = {J. Morris Chang}, title = {New Trends in Cybersecurity}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {2--3}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.70}, doi = {10.1109/MITP.2013.70}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Chang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/ChangFHKWDCGKK13, author = {J. Morris Chang and Chi{-}Chen Fang and Kuan{-}Hsing Ho and Norene Kelly and Pei Yuan Wu and Yixiao Ding and Chris Chu and Stephen B. Gilbert and Ahmed E. Kamal and Sun{-}Yuan Kung}, title = {Capturing Cognitive Fingerprints from Keystroke Dynamics}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {24--28}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.52}, doi = {10.1109/MITP.2013.52}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/ChangFHKWDCGKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/ChauhanS13, author = {Nitin Singh Chauhan and Ashutosh Saxena}, title = {A Green Software Development Life Cycle for Cloud Computing}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {28--34}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.6}, doi = {10.1109/MITP.2013.6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/ChauhanS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/CortimigliaFS13, author = {Marcelo Nogueira Cortimiglia and Alejandro Germ{\'{a}}n Frank and Liziane Seben}, title = {Tablets: The Next Disruptive Computing Technology?}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {18--25}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.117}, doi = {10.1109/MITP.2012.117}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/CortimigliaFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Costello13, author = {Tom Costello}, title = {Random Thoughts for CIOs}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {64}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.71}, doi = {10.1109/MITP.2013.71}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Costello13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Costello13a, author = {Tom Costello}, title = {Vendor Management}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {72}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.101}, doi = {10.1109/MITP.2013.101}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Costello13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/CostelloLBFCKDM13, author = {Tom Costello and Mark A. Langley and Kirk Botula and Eileen Forrester and Martin Curley and Jim Kenneally and Martin Delaney and Stephen McLaughlin}, title = {{IT} Frameworks}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {64}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.79}, doi = {10.1109/MITP.2013.79}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/CostelloLBFCKDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/CostelloP13, author = {Tom Costello and Beverly Prohaska}, title = {Why Is {IT} Still Broken?}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {64}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.34}, doi = {10.1109/MITP.2013.34}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/CostelloP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/CostelloP13a, author = {Tom Costello and Beverly Prohaska}, title = {Innovation}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {64}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.42}, doi = {10.1109/MITP.2013.42}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/CostelloP13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/CoyneW13, author = {Ed Coyne and Timothy R. Weil}, title = {{ABAC} and {RBAC:} Scalable, Flexible, and Auditable Access Management}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {14--16}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.37}, doi = {10.1109/MITP.2013.37}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/CoyneW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Demirkan13, author = {Haluk Demirkan}, title = {A Smart Healthcare Systems Framework}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {38--45}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.35}, doi = {10.1109/MITP.2013.35}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Demirkan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/DeutschmannNN13, author = {Ingo Deutschmann and Peder Nordstrom and Linus Nilsson}, title = {Continuous Authentication Using Behavioral Biometrics}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {12--15}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.50}, doi = {10.1109/MITP.2013.50}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/DeutschmannNN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/FrankeMCAB13, author = {Craig Franke and Samuel Morin and Artem Chebotko and John Abraham and Pearl Brazier}, title = {Efficient Processing of Semantic Web Queries in HBase and MySQL Cluster}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {36--43}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.42}, doi = {10.1109/MITP.2012.42}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/FrankeMCAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/FridmanSABJGK13, author = {Alex Fridman and Ariel Stolerman and Sayandeep Acharya and Patrick Brennan and Patrick Juola and Rachel Greenstadt and Moshe Kam}, title = {Decision Fusion for Multimodal Active Authentication}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {29--33}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.53}, doi = {10.1109/MITP.2013.53}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/FridmanSABJGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/GraubnerSF13, author = {Pablo Graubner and Matthias Schmidt and Bernd Freisleben}, title = {Energy-Efficient Virtual Machine Consolidation}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {28--34}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.48}, doi = {10.1109/MITP.2012.48}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/GraubnerSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Guidorizzi13, author = {Richard P. Guidorizzi}, title = {Security: Active Authentication}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {4--7}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.73}, doi = {10.1109/MITP.2013.73}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Guidorizzi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/HosmanB13, author = {Laura Hosman and Bruce Baikie}, title = {Solar-Powered Cloud Computing Datacenters}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {15--21}, year = {2013}, url = {https://doi.org/10.1109/MITP.2011.116}, doi = {10.1109/MITP.2011.116}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/HosmanB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Hurlburt13, author = {George F. Hurlburt}, title = {Complexity Theory: {A} New Paradigm for Software Integration}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {26--31}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.87}, doi = {10.1109/MITP.2012.87}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Hurlburt13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/HurlburtV13, author = {George F. Hurlburt and Jeffrey M. Voas}, title = {Beyond the Cloud: Cyberphysical Systems}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {2--4}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.24}, doi = {10.1109/MITP.2013.24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/HurlburtV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/HurlburtV13a, author = {George F. Hurlburt and Jeffrey M. Voas}, title = {STEM's Grand Challenge: Reviving Applied Mathematics}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {51--55}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.84}, doi = {10.1109/MITP.2013.84}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/HurlburtV13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/IdziorekTJ13, author = {Joseph Idziorek and Mark Tannian and Douglas Jacobson}, title = {The Insecurity of Cloud Utility Models}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {22--27}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.43}, doi = {10.1109/MITP.2012.43}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/IdziorekTJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/JimeiYM13, author = {Li Jimei and Hu Yuzhou and Du Meijie}, title = {{XBRL} in the Chinese Financial Ecosystem}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {36--42}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.59}, doi = {10.1109/MITP.2013.59}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/JimeiYM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/JosephJ13, author = {Rhoda C. Joseph and Norman A. Johnson}, title = {Big Data and Transformational Government}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {43--48}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.61}, doi = {10.1109/MITP.2013.61}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/JosephJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/JuolaNSRBG13, author = {Patrick Juola and John Noecker Jr. and Ariel Stolerman and Michael Ryan and Patrick Brennan and Rachel Greenstadt}, title = {Keyboard-Behavior-Based Authentication}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {8--11}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.49}, doi = {10.1109/MITP.2013.49}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/JuolaNSRBG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/KallbergT13, author = {Jan Kallberg and Bhavani Thuraisingham}, title = {State Actors' Offensive Cyberoperations: The Disruptive Power of Systematic Cyberattacks}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {32--35}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.20}, doi = {10.1109/MITP.2013.20}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/KallbergT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/KassahunM13, author = {Asmare Emerie Kassahun and Alemayehu Molla}, title = {{IT} Reengineers Government Processes in Africa}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {10--13}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.44}, doi = {10.1109/MITP.2013.44}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/KassahunM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/KikuchiM13, author = {Shinji Kikuchi and Yasuhide Matsumoto}, title = {Using Model Checking to Evaluate Live Migrations}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {36--41}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.45}, doi = {10.1109/MITP.2012.45}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/KikuchiM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Kissel13, author = {Richard Kissel}, title = {Avoiding Accidental Data Loss}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {12--15}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.75}, doi = {10.1109/MITP.2013.75}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Kissel13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Kshetri13, author = {Nir Kshetri}, title = {{IT} in the Chinese Healthcare Industry}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {12--15}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.14}, doi = {10.1109/MITP.2013.14}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Kshetri13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Kshetri13a, author = {Nir Kshetri}, title = {Cloud Computing in Sub-Saharan Africa}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {64--67}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.92}, doi = {10.1109/MITP.2013.92}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Kshetri13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/LakshmananK13, author = {Geetika T. Lakshmanan and Rania Khalaf}, title = {Leveraging Process-Mining Techniques}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {22--30}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.88}, doi = {10.1109/MITP.2012.88}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/LakshmananK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Laplante13, author = {Phillip A. Laplante}, title = {Courses for the Masses?}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {57--59}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.27}, doi = {10.1109/MITP.2013.27}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Laplante13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Laplante13a, author = {Phillip A. Laplante}, title = {Who's Afraid of Big Data?}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {6--7}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.86}, doi = {10.1109/MITP.2013.86}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Laplante13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Laplante13b, author = {Phillip A. Laplante}, title = {Career Advice}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {7--9}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.91}, doi = {10.1109/MITP.2013.91}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Laplante13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/LaplanteJWC13, author = {Phillip A. Laplante and Thomas C. Jepsen and Joseph Williams and Fulvio Corno}, title = {Innovative and Disruptive Technologies [From the Editors]}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {4--5}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.43}, doi = {10.1109/MITP.2013.43}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/LaplanteJWC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/LarsonM13, author = {David K. Larson and Keith W. Miller}, title = {Medical Records and Software Trust}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {8--11}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.32}, doi = {10.1109/MITP.2013.32}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/LarsonM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Lee13, author = {Yuan{-}Fa Lee}, title = {Personal Medical Monitoring System: Addressing Interoperability}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {31--37}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.90}, doi = {10.1109/MITP.2012.90}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Lee13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/LeeC13, author = {Maria R. Lee and Tsung Teng Chen}, title = {Understanding Social Computing Research}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {56--62}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.121}, doi = {10.1109/MITP.2012.121}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/LeeC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Liu13, author = {Simon Liu}, title = {Engineering the Success of Software Development}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {4--5}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.76}, doi = {10.1109/MITP.2013.76}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Liu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Miller13, author = {Keith W. Miller}, title = {A Secret Sociotechnical System}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {57--59}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.65}, doi = {10.1109/MITP.2013.65}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Miller13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Miller13a, author = {Keith W. Miller}, title = {Technology, Unemployment, and Power}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {10--11}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.99}, doi = {10.1109/MITP.2013.99}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Miller13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/MillerM13, author = {H. Gilbert Miller and Peter Mork}, title = {From Data to Decisions: {A} Value Chain for Big Data}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {57--59}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.11}, doi = {10.1109/MITP.2013.11}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/MillerM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/MithasLEMD13, author = {Sunil Mithas and Maria R. Lee and Seth Earley and San Murugesan and G. Reza Djavanshir}, title = {Leveraging Big Data and Business Analytics}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {18--20}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.95}, doi = {10.1109/MITP.2013.95}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/MithasLEMD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Murugesan13, author = {San Murugesan}, title = {Mobile Apps in Africa}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {8--11}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.83}, doi = {10.1109/MITP.2013.83}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/Murugesan13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Ojala13, author = {Arto Ojala}, title = {Software-as-a-Service Revenue Models}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {54--59}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.73}, doi = {10.1109/MITP.2012.73}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Ojala13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/PatelYFZCCD13, author = {Vishal M. Patel and Tom Yeh and Mohammed E. Fathy and Yangmuzi Zhang and Yan Chen and Rama Chellappa and Larry S. Davis}, title = {Screen Fingerprints: {A} Novel Modality for Active Authentication}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {38--42}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.56}, doi = {10.1109/MITP.2013.56}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/PatelYFZCCD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Payne13, author = {Jeffery Payne}, title = {Secure Mobile Application Development}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {6--9}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.46}, doi = {10.1109/MITP.2013.46}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Payne13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/PayneFK13, author = {Jeffery Payne and Mark Fenner and Jonathan Kauffman}, title = {System Event Monitoring for Active Authentication}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {34--37}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.57}, doi = {10.1109/MITP.2013.57}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/PayneFK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/PetterW13, author = {Stacie Petter and Kerry Ward}, title = {Countdown to Y2Gray}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {49--55}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.86}, doi = {10.1109/MITP.2012.86}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/PetterW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Pollard13, author = {Carol Pollard}, title = {The {US} Government's Evolving Role in {IT} Energy Management}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {36--43}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.18}, doi = {10.1109/MITP.2013.18}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Pollard13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/PonnapalliS13, author = {Harigopal K. B. Ponnapalli and Ashutosh Saxena}, title = {A Digital Signature Architecture for Web Apps}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {42--49}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.23}, doi = {10.1109/MITP.2012.23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/PonnapalliS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/RajuLDB13, author = {Anand Kishore Raju and Sven Lindmark and Simon Delaere and Pieter Ballon}, title = {A Holistic Impact-Assessment Framework for Green {ICT}}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {50--56}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.119}, doi = {10.1109/MITP.2012.119}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/RajuLDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SabharwalAM13, author = {Manuj Sabharwal and Abhishek Agrawal and Grace Metri}, title = {Enabling Green {IT} through Energy-Aware Software}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {19--27}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.104}, doi = {10.1109/MITP.2012.104}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/SabharwalAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SampleS13, author = {Char Sample and Kim Schaffer}, title = {An Overview of Anomaly Detection}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {8--11}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.7}, doi = {10.1109/MITP.2013.7}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/SampleS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SeiboldJK13, author = {Michael Seibold and Dean Jacobs and Alfons Kemper}, title = {Operational Business Intelligence: Processing Mixed Workloads}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {16--21}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.68}, doi = {10.1109/MITP.2012.68}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/SeiboldJK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SerwaddaWKGPGBRPB13, author = {Abdul Serwadda and Zibo Wang and Patrick Koch and Sathya Govindarajan and Raviteja Pokala and Adam Goodkind and David Guy Brizan and Andrew Rosenberg and Vir V. Phoha and Kiran S. Balagani}, title = {Scan-Based Evaluation of Continuous Keystroke Authentication Systems}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {20--23}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.51}, doi = {10.1109/MITP.2013.51}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/SerwaddaWKGPGBRPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Sherwood13, author = {George Sherwood}, title = {Lessons Learned from Hurricane Sandy: Maintaining Service during a Disaster}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {4--7}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.15}, doi = {10.1109/MITP.2013.15}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/Sherwood13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SrinivasanA13, author = {Uma Srinivasan and Bavani Arunasalam}, title = {Leveraging Big Data Analytics to Reduce Healthcare Costs}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {21--28}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.55}, doi = {10.1109/MITP.2013.55}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/SrinivasanA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/SrivastavaMJ13, author = {Shirish C. Srivastava and Sunil Mithas and Bimlendra Jha}, title = {What Is Your Global Innovation Strategy?}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {2--6}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.102}, doi = {10.1109/MITP.2013.102}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/SrivastavaMJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/ThackstonU13, author = {Russell Thackston and David A. Umphress}, title = {Micropreneurs: The Rise of the MicroISV}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {50--56}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.28}, doi = {10.1109/MITP.2012.28}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/ThackstonU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/ToCL13, author = {Wai{-}Ming To and Andy W. L. Chung and Linda S. L. Lai}, title = {Creating Green Awareness Using {IT:} The Case of Hong Kong}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {44--49}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.105}, doi = {10.1109/MITP.2012.105}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/ToCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/ToLC13, author = {Wai{-}Ming To and Linda S. L. Lai and Andy W. L. Chung}, title = {Cloud Computing in China: Barriers and Potential}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {48--53}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.64}, doi = {10.1109/MITP.2012.64}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/ToLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Viaene13, author = {Stijn Viaene}, title = {Data Scientists Aren't Domain Experts}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {12--17}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.93}, doi = {10.1109/MITP.2013.93}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Viaene13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/WheelerVCDTBT13, author = {Jenifer Wheeler and Denise Varner and John Carrola and Christopher Dahlberg and Thomas Thornton and Corey Bohil and Kelly Terry}, title = {Covert Cognitive Games and User Response Patterns}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {16--19}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.58}, doi = {10.1109/MITP.2013.58}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/WheelerVCDTBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Wilbanks13, author = {Linda Wilbanks}, title = {Ethical Dilemmas in the Workplace}, journal = {{IT} Prof.}, volume = {15}, number = {1}, pages = {60--61}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.9}, doi = {10.1109/MITP.2013.9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Wilbanks13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Wilbanks13a, author = {Linda Wilbanks}, title = {Changing Jobs}, journal = {{IT} Prof.}, volume = {15}, number = {2}, pages = {60--61}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.25}, doi = {10.1109/MITP.2013.25}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Wilbanks13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Wilbanks13b, author = {Linda Wilbanks}, title = {Changing Jobs, Part {II:} The Transition}, journal = {{IT} Prof.}, volume = {15}, number = {3}, pages = {60--61}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.39}, doi = {10.1109/MITP.2013.39}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Wilbanks13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Wilbanks13c, author = {Linda Wilbanks}, title = {Changing Jobs, Part {III:} Starting a New Job}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {60--61}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.66}, doi = {10.1109/MITP.2013.66}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Wilbanks13c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Wilbanks13d, author = {Linda Wilbanks}, title = {Office Etiquette During the Holidays}, journal = {{IT} Prof.}, volume = {15}, number = {6}, pages = {68--69}, year = {2013}, url = {https://doi.org/10.1109/MITP.2013.97}, doi = {10.1109/MITP.2013.97}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Wilbanks13d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Wilson13, author = {Kelce S. Wilson}, title = {Conflicts Among the Pillars of Information Assurance}, journal = {{IT} Prof.}, volume = {15}, number = {4}, pages = {44--49}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.24}, doi = {10.1109/MITP.2012.24}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itpro/Wilson13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itpro/Yu13, author = {Liguo Yu}, title = {The Market-Driven Software Ecosystem}, journal = {{IT} Prof.}, volume = {15}, number = {5}, pages = {46--50}, year = {2013}, url = {https://doi.org/10.1109/MITP.2012.102}, doi = {10.1109/MITP.2012.102}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itpro/Yu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.