Submissions from 2023
E-Learning Course Recommender System Using Collaborative Filtering Models, Kalyan Kumar Jena, Sourav Kumar Bhoi, Tushar Kanta Malik, Kshira Sagar Sahoo, N. Z. Jhanjhi, Sajal Bhatia, and Fathi Amsaad
Security and Resilience of Cyber Physical Systems, Krishan Kumar Ed., Sunny Behal Ed., Abhinav Bhandari Ed., and Sajal Bhatia Ed.
Empirical Validation of Automated Vulnerability Curation and Characterization, Ahmet Okutan, Peter Mell, Mehdi Mirakhorli, Igor Khokhlov, Joanna C.S. Santos, Danielle Gonzalez, and Steven Simmons
Complexities in Computer Science Teaching Attitudes and Beliefs: Findings of a Baseline Study of Elementary School Educators, Darcy Ronan, Dennis Brylow, Maverick Berner, Sydney Crespo, Heidi Williams, Christine Thorp, and D. Cenk Erdil
Alkali Metals (Na, K) Doped ZnO/CuO Composite Films for Real-time Tracking of Sweat Loss, Bünyamin Sahin, G. Ozyilmaz, and Kaya Tolga
Submissions from 2022
Influence of Transfer Learning on Machine Learning Systems Robustness to Data Quality Degradation, Sergei Chuprov, Igor Khokhlov, Leon Reznik, and Srujan Shetty
Multi-Modal Sensor Selection with Genetic Algorithms, Sergei Chuprov, Leon Reznik, Igor Khokhlov, and Karan Manghi
Comparative Analysis of Open-Source Vulnerability Scanners for IoT Devices, Christopher deRito and Sajal Bhatia
A Hands-on Learning Approach to Introducing Computer Organization and Architecture to Early-college Students, D. Cenk Erdil; Kevin Bowlyn; and Joshua A, Randall
Session Replay Scripts: A Privacy Analysis, Frances S. Grodzinsky, Keith W. Miller, and Marty J. Wolf
Discovering Ways to Increase Inclusivity for Dyslexic Students in Computing Education, Felicia Hellems and Sajal Bhatia
Removing the Veil: Shining Light on the Lack of Inclusivity in Cybersecurity Education for Students with Disabilities, Felicia Hellems and Sajal Bhatia
Integrating Security with Accuracy Evaluation in Sensors Fusion, Igor Khokhlov, Sergei Chuprov, and Leon Reznik
Automated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System, Igor Khokhlov, Ahmet Okutan, Ryan Bryla, Steven Simmons, and Mehdi Mirakhorli
Comparative Analysis of Cloud Computing Security Frameworks for Financial Sector, Sudhish Mohanan, Nandagopal Sridhar, and Sajal Bhatia
CyRRA: Cyberattack Resilient Robotic Arm, Souparna Saha, Sahaj Saxena, and Sajal Bhatia
Religious Violence and Twitter: Networks of Knowledge, Empathy and Fascination, Samah Senbel, Carly Seigel, and Emily Bryan
Word Frequency Analysis of Community Reaction to Religious Violence on Social Media, Samah Senbel, Carly Seigel, and Emily Bryan
Using Data Analytics to Assess Factors Affecting the Survival Rate of Young Urban Trees, Samah Senbel, Carly Seigel, Tom Corell, and Mary Hogue
Impact of Sleep and Training on Game Performance and Injury in Division-1 Women’s Basketball Amidst the Pandemic, Samah Senbel, S. Sharma, S. M. Raval, Christopher B. Taber, Julie K. Nolan, N. S. Artan, Diala Ezzeddine, and Kaya Tolga
A Hybrid Approach for Interpretable Game Performance Prediction in Basketball, S. Sharma, Srikrishnan Divakaran, Tolga Kaya, and Mehul S. Raval
Ethical Reflections on Handling Digital Remains: Computing Professionals Picking Up Bones, Marty J. Wolf, Frances Grodzinsky, and Keith W. Miller
Submissions from 2021
VowPass: Novel Method to Generate Secure and Memorable Passwords, Abdulrahman Alhamed and Sajal Bhatia
An Efficient and Reliable Lightweight PUF for IoT-based Applications, Fathi Amsaad, Abdul Razaque, Mohamed Baza, Seluck Kose, Sajal Bhatia, and Gautam Srivastava
Automated Waterloo Rubric for Concept Map Grading, Shresht Bhatia, Sajal Bhatia, and Irfan Ahmed
Autonomous Aerial Vehicle Vision and Sensor Guided Landing, Gabriel Bitencourt, Elijah J. Brown, Cedric Bleimling, Gilbert Lai, Arman Molki, and Tolga Kaya
AI Ethics: A Long History and a Recent Burst of Attention, Jason Borenstein, Frances Grodzinsky, Ayanna Howard, Keith W. Miller, and Marty J. Wolf
Improving Knowledge Based Detection of Soft Attacks Against Autonomous Vehicles with Reputation, Trust and Data Quality Service Models, Sergei Chuprov, Ilia Viksnin, Timofey Melnikov, Leon Reznik, and Igor Khokhlov
Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities, Rubina Ghazal, Ahmad Kamran Malik, Basit Raza, Nauman Qadeer, Nafees Qamar, and Sajal Bhatia
A First-Principle Study of Nanostructured CuO Thin Film-Based Caffeine Sensing Scheme, Tolga Kaya and Bünyamin Sahin
Development of an Autonomous Indoor Robot for Mapping Applications, Michael O'Hara, Kaitlyn Mangano, Gilbert Lai, John Sebastian, Mario Montuori, Arman Molki, and Kaya Tolga
Analysis of Sentimental Behaviour over Social Data Using Machine Learning Algorithms, Abdul Razaque, Fathi Amsaad, Dipal Halder, Mohamed Baza, Abobakr Aboshgifa, and Sajal Bhatia
Simple and Low-Cost Synthesis of Al-doped ZnO/CuO Composite Nanowires for Highly Efficient Hydration Level Sensing, Bünyamin Sahin, Ayşegül Acar, and Tolga Kaya
Facile Preparation and Characterization of Nanostructured ZnO/CuO Composite Thin Film for Sweat Concentration Sensing Applications, Bünyamin Sahin and Tolga Kaya
Cybersecurity Analysis of Load Frequency Control in Power Systems: A Survey, Sahaj Saxena, Sajal Bhatia, and Rahul Gupta
A Fairness-Based Heuristic Technique for Long-Term Nurse Scheduling, Samah Senbel
Fast and Memory-Efficient TFIDF Calculation for Text Analysis of Large Datasets, Samah Senbel
Sleep and Physical Performance: A Case Study of Collegiate Women’s Division 1 Basketball Players, Christopher Taber, Samah Senbel, Diala Ezzeddine, Julie K. DeMartini, Alexa Ocel, N.S. Artan, and Kaya Tolga
Submissions from 2020
Introducing Parallelism to First-Year CS Majors, Barbara M. Anthony, D. Cenk Erdil, Olga Glebova, and Robert Montante
An Improved Distributed Multiplier-Less Approach for Radix-2 FFT, Kevin Bowlyn and Sena Hounsinou
Improved Sensing Response of Nanostructured CuO Thin Films Towards Sweat Rate Monitoring: Effect of Cr Doping, Serdar Dinc, Bünyamin Şahin, and Tolga Kaya
Trust in Artificial Agents, Frances Grodzinsky, Keith W. Miller, and Marty J. Wolf
On Using Model For Downstream Responsibility, Frances S. Grodzinsky, Marty J. Wolf, and Keith W. Miller
The Evidence Appraisal Game: An Innovative Strategy for Teaching Step 3 in Evidence‐Based Practice, Kerry A. Milner, Robert McCloud, and Justin C. Cullen
Leading Through Change: 2020, Domenick Pinto
Effect of Multinational Projects on Engineering Students through a Summer Exposure Research Program, Mehul S. Raval and Tolga Kaya
Experiments with Multinational Cross-Course Project, Mehul S. Raval, Tolga Kaya, Mazad Zaveri, and Paawan Sharma
Assessing and Exploiting Security Vulnerabilities of Unmanned Aerial Vehicles, Fekadu Yihunie, Aman Kumar Singh, and Sajal Bhatia
Submissions from 2019
Securing the Human: Broadening Diversity in Cybersecurity, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Chadi Kari, Joseph Maguire, Xenia Montrouidou, Liviana Tudor, David Vosen, and Timothy T. Yuen
An Artificial Sweating System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya
A Comparison of Health Informatics Education in the USA, D. Cenk Erdil
Using NSFCloud Testbeds for Research: Conference Tutorial, D. Cenk Erdil
Toward Developing a Cloud Computing Model Curriculum, D. Cenk Erdil, Laurie White, Derek Foster, Joshua Adams, Amadeo Jose Arguelles Cruz, Brian Hainey, Harvey Hyman, Gareth Lewis, Sajid Nazir, Manh Van Nguyen, Majd Sakr, and Lee Stott
Applying a Social-Relational Model to Explore the Curious Case of hitchBOT, Frances Grodzinsky, Marty J. Wolf, and Keith W. Miller
Intrinsic Complexity of Partial Learning, Sanjay Jain and Efim Kinber
Wearable Sweat Sensors: Background and Current Trends, Tolga Kaya, Gengchen Liu, Jenny Ho, Kumar Yelamarthi, Kevin Miller, Jeffrey Edwards, and Alicja B. Stannard
Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education, Xenia Mountrouidou, David Vosen, Chadi Kari, Mohammad Azhar, Sajal Bhatia, Greg Gagne, Joseph Maguire, Liviana Tudor, and Timothy Yuen
Effective Communication in Academia: It Goes Both ways!, Domenick Pinto
A Novel Amperometric Sweat Sensor Approach Through Characterization of Hausmannite (Mn3O4) Thin Films, Bünyamin Şahin, Büşra Aslan, and Tolga Kaya
Electrochemical Amperometric Biosensor Applications of Nanostructured Metal Oxides: A Review, Bünyamin Sahin and Tolga Kaya
Novel Recursive Technique for Finding the Optimal Solution of the Nurse Scheduling Problem, Samah Senbel
Teaching Self-Balancing Trees Using a Beauty Contest, Samah Senbel
Responding to Some Challenges Posed by the Re-identification of Anonymized Personal Data, Herman T. Tavani and Frances Grodzinsky, ed.
On the Responsibility for Uses of Downstream Software, Marty J. Wolf; Keith W. Miller; and Frances Grodzinsky, ed.
Applying Machine Learning to Anomaly-Based Intrusion Detection Systems, Fekadu Yihunie, Eman Abdelfattah, and Amish Regmi
RCrab: An R Analytics Tool to Visualize and Analyze the Movement of Horseshoe Crabs in Long Island Sound, Ismael Youssef, Samah Senbel, Jo-Marie Kasinak, and Jennifer Mattei
Submissions from 2018
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions, Sajal Bhatia, Sunny Behal, and Irfan Ahmed
A Custom Computer-Controlled Fluid Mixing and Dispensing System for Sweat Sensor Testing Applications, Andrew Brueck, Kyle Bates, Trent Wood, William House, Zachary Martinez, Shannon Peters, Blain Root, Kumar Yelamarthi, and Tolga Kaya
A Real-Time Wireless Sweat Rate Measurement System for Physical Activity Monitoring, Andrew Brueck, Tashfin Iftekhar, Alicja B. Stannard, Kumar Yelamarthi, and Tolga Kaya
Analysis of Routing Protocols in an Emergency Communications Center, John A. Bucherati and Eman Abdelfattah
Cloud Computing: Developing Contemporary Computer Science Curriculum for a Cloud-first Future, Derek Foster, Laurie White, Joshua Adams, D. Cenk Erdil, Harvey Hyman, Stan Kurkovsky, Majd Sakr, and Lee Stott
The Inevitability of Playing Politics as Chair: 2018, Domenick Pinto
Evaluation of Routing Protocols with FTP and P2P, Tyler Wilson, Eman Abdelfattah, and Samir Hamada
Analysis of Ping of Death DoS and DDoS Attacks, Fekadu Yihunie, Eman Abdelfattah, and Ammar Odeh
A Bi-level Heuristic Solution for the Nurse Scheduling Problem Based on Shift-swapping, Ahmed Youssef and Samah Senbel
Submissions from 2017
I Am 'Totally' Human: Bypassing the reCaptcha, Samuel S. Brown, Nicholas DiBari, and Sajal Bhatia
Self-organized Dynamic Provisioning for Big Data, D. Cenk Erdil
Why Big Data Needs the Virtues, Frances Grodzinsky
Implementation of Blogging as an Alternative to the Lab Report, Troy Hicks, Justin Bruner, and Tolga Kaya
Automatic Learning from Positive Data and Negative Counterexamples., Sanjay Jain, Efim Kinber, and Frank Stephan
Analyzing the Effect of DoS Attacks on Network Performance, Gaurav Kumar, Eman Abdelfattah, Johnathon Holbrooks, and Alexander Perez
Wearable IoT Computing: Interface, Emotions, Wearer's Culture, and Security/Privacy Concerns, Robert McCloud, Martha B. Lerski, Joon Park, and Tyson T. Brooks
What Does Playing Games Teach Us About a Student's Ethical Life?, Robert McCloud and Tamara Luarasi
This “Ethical Trap” is for Roboticists, Not Robots: On the Issue of Artificial Agent Ethical Decision Making, Keith W. Miller, Marty J. Wolf, and Frances Grodzinsky
Why We Should Have Seen That Coming: Comments on Microsoft’s Tay “Experiment,” and Wider Implications, K. W. Miller, Marty J. Wolf, and Frances S. Grodzinsky
A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC, Ramadhan J. Mstafa, Khaled M. Elleithy, and Eman Abdelfattah
Video Steganography Techniques: Taxonomy, Challenges, and Future Directions, Ramadhan J. Mstafa, Khaled M. Elleithy, and Eman Abdelfattah
A New Tree Target Tracking Algorithm in WSNs, Ammar Odeh and Eman Abdelfattah
Quantum Min / Max Algorithms Based on Qubits {00, 11}, Ammar Odeh and Eman Abdelfattah
The Inevitability of Playing Politics as Chair: Advantages and Pitfalls, Domenick Pinto
Why We Should Have Seen That Coming: Comments on Microsoft's tay "Experiment," and Wider Implications, Marty J. Wolf, Keith W. Miller, and Frances Grodzinsky
Submissions from 2016
Intrinsic Complexity of Partial Learning, Sanjay Jain and Efim Kinber
Parallel Learning of Automatic Classes of Languages, Sanjay Jain and Efim Kinber
To the Memory of R. Freivalds, Efim Kinber
Quantum Sort Algorithm Based on Entanglement Qubits {00, 11}, Ammar Odeh and Eman Abdelfattah
The Inevitability of Playing Politics as Chair: Advantages and Pitfalls, Domenick Pinto
Improved Monostatic Pulse Radar Design Using Ultra Wide Band for Range Estimation, A. V. N. R. Sai Shiva, Khaled Elleithy, and Eman Abdelfattah
Robots, Ethics and Software - FOSS vs. Proprietary Licenses, Marty J. Wolf, Frances Grodzinsky, and Keith W. Miller
There's Something in Your Eye: Ethical Implications of Augmented Visual Field Devices, Marty J. Wolf, Frances Grodzinsky, and Keith W. Miller
Submissions from 2015
Developing Automated Deceptions and the Impact on Trust, Frances Grodzinsky, Keith W. Miller, and Marty J. Wolf