A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks
Sajal Bhatia
Part of the Computer Sciences Commons
Works in Computer Sciences
2023
A Hands-on Learning Approach to Introducing Computer Organization and Architecture to Early-college Students
D. Cenk Erdil
2022
Automated Extraction of Software Names from Vulnerability Reports using LSTM and Expert System
Igor Khokhlov
Influence of Transfer Learning on Machine Learning Systems Robustness to Data Quality Degradation
Igor Khokhlov
A Hands-on Learning Approach to Introducing Computer Organization and Architecture to Early-college Students
Kevin Bowlyn
An Investigation Into the Relationship Between Gender Perception of Computing, Computer Self-Efficacy and Anxiety: Comparison Between the US and India
Kittipong Laosethakul
Removing the Veil: Shining Light on the Lack of Inclusivity in Cybersecurity Education for Students with Disabilities
Sajal Bhatia
Using Data Analytics to Assess Factors Affecting the Survival Rate of Young Urban Trees
Samah Senbel
Improving Knowledge Based Detection of Soft Attacks Against Autonomous Vehicles with Reputation, Trust and Data Quality Service Models
Igor Khokhlov
Impact of Sleep and Training on Game Performance and Injury in Division-1 Women’s Basketball Amidst the Pandemic
Samah Senbel
Impact of Sleep and Training on Game Performance and Injury in Division-1 Women’s Basketball Amidst the Pandemic
Christopher Taber
Impact of Sleep and Training on Game Performance and Injury in Division-1 Women’s Basketball Amidst the Pandemic
Julie DeMartini
Impact of Sleep and Training on Game Performance and Injury in Division-1 Women’s Basketball Amidst the Pandemic
Tolga Kaya
2021
Good/Fast/Cheap: Contexts, Relationships and Professional Responsibility During Software Development
Frances Grodzinsky
The Rise and Fall of Bitcoin: Predicting Market Direction Using Machine Learning Models
Eman Abdelfattah
Multinational Web Uses and Gratifications: Measuring the Social Impact of Online Community Participation Across National Boundaries
Patricia Grace-Farfaglia
Agent-Based Semantic Role Mining for Intelligent Access Control in Multi-Domain Collaborative Applications of Smart Cities
Sajal Bhatia
Securing the Human: A Review of Literature on Broadening Diversity in Cybersecurity Education
Sajal Bhatia
Simple and Low-Cost Synthesis of Al-doped ZnO/CuO Composite Nanowires for Highly Efficient Hydration Level Sensing
Tolga Kaya
Accelerating Project-Based Learning in Management Contexts: An Examination of Impacted.
Nicole Jackson
Effectiveness of Classifiers to Identify Hand Gestures with Motion Capture Coordinate Markers
Eman Abdelfattah
Machine Learning Techniques for Detection of Website Phishing: A Review for Promises and Challenges
Eman Abdelfattah
2020
Efficiency of Different Machine Learning Algorithms on the Multivariate Classification of IoT Botnet Attacks
Eman Abdelfattah
Predicting Sleep Quality in Osteoporosis Patients Using Electronic Health Records and Heart Rate Variability
Reza Sadeghi
Recurrent Neural Networks for Colluded Applications Attack Detection in Android OS Devices
Igor Khokhlov
Reputation and Trust Models with Data Quality Metrics for Improving Autonomous Vehicles Traffic Security and Safety
Igor Khokhlov
Implications Of Accurate Maximal Heart Rate Parameters In Soccer Players Using Team Monitoring System: 1460 Board #54 May 28 9:30 AM - 11:00 AM
Alicja Stannard
Tracking Calories: Validity Of Wearable Activity Monitors: 1907 May 28 1:30 PM - 1:40 PM
Alicja Stannard
The Evidence Appraisal Game: An Innovative Strategy for Teaching Step 3 in Evidence‐Based Practice
Kerry Milner
The Evidence Appraisal Game: An Innovative Strategy for Teaching Step 3 in Evidence‐Based Practice
Robert McCloud
A Practical Ethics Worktext for Professional Counselors: Applying Decision-Making Models to Case Examples
Charles Jacob
2019
The Machine Learning Models for Activity Recognition Applications with Wearable Sensors
Igor Khokhlov
Machine Learning in Anomaly Detection: Example of Colluded Applications Attack in Android Devices
Igor Khokhlov
System Signals Monitoring and Processing for Colluded Application Attacks Detection in Android OS
Igor Khokhlov
A Custom Computer-Controlled Fluid Mixing and Dispensing System for Sweat Sensor Testing Applications
Tolga Kaya
Responding to Some Challenges Posed by the Re-identification of Anonymized Personal Data
Frances Grodzinsky
RCrab: An R Analytics Tool to Visualize and Analyze the Movement of Horseshoe Crabs in Long Island Sound
Jennifer Mattei
RCrab: An R Analytics Tool to Visualize and Analyze the Movement of Horseshoe Crabs in Long Island Sound
Samah Senbel
RCrab: An R Analytics Tool to Visualize and Analyze the Movement of Horseshoe Crabs in Long Island Sound
Jo-Marie Kasinak
Novel Recursive Technique for Finding the Optimal Solution of the Nurse Scheduling Problem
Samah Senbel
A Novel Amperometric Sweat Sensor Approach Through Characterization of Hausmannite (Mn3O4) Thin Films
Tolga Kaya
Electrochemical Amperometric Biosensor Applications of Nanostructured Metal Oxides: A Review
Tolga Kaya
2018
Distributed Denial of Service Attacks and Defense Mechanisms: Current Landscape and Future Directions
Sajal Bhatia
Using "Quantum of Solace" and a Digital Whiteboard to Teach Physics in an Online Class
Frank Robinson
Cloud Computing: Developing Contemporary Computer Science Curriculum for a Cloud-first Future
D. Cenk Erdil
Princeton Review Rates Sacred Heart University’s Game Design Program as One of the Best
Robert McCloud
Trusted CI Webinar: Data Quality & Security Evaluation Framework Development with Leon Reznik & Igor Khokhlov
Igor Khokhlov
Using Observations of Universal Design for Learning to Enhance Post-secondary STEM Teaching Practices
Jillian Schreffler
A Bi-level heuristic solution for the Nurse Scheduling Problem based on Shift-swapping.pdf
Samah Senbel
2017
Why We Should Have Seen That Coming: Comments on Microsoft's tay "Experiment," and Wider Implications
Frances Grodzinsky
Data security and quality evaluation framework: Implementation empirical study on android devices
Igor Khokhlov
This 'Ethical Trap' is for Roboticists, Not Robots: On the Issue of Artificial Agent Ethical Decision-Making
Frances Grodzinsky
A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC
Eman Abdelfattah
An Adaptive Interface Design (AID) for enhanced computer accessibility and rehabilitation
Maura Iversen
IMPLEMENTATION OF A NOVEL INTEGRATED DISTRIBUTED ARITHMETIC AND COMPLEX BINARY NUMBER SYSTEM IN FAST FOURIER TRANSFORM ALGORITHM
Kevin Bowlyn
3D Modeling and Characterization of a Calorimetric Flow Rate Sensor for Sweat Rate Sensing Applications
Tolga Kaya
Wearable IoT Computing: Interface, Emotions, Wearer's Culture, and Security/Privacy Concerns
Robert McCloud
2016
Investigation into Gender Perception Toward Computing: A Comparison Between the U.S. and India
Kittipong Laosethakul
Performance evaluation of secure industrial control system design: A railway control system case study
Sajal Bhatia
Artificial Agents, Cloud Computing, and Quantum Computing: Applying Floridi’s Method of Levels of Abstraction
Frances Grodzinsky
There's Something in Your Eye: Ethical Implications of Augmented Visual Field Devices
Frances Grodzinsky
This “Ethical Trap” is for Roboticists, Not Robots: On the Issue of Artificial Agent Ethical Decision Making
Frances Grodzinsky
Electrochemical Studies of Antimony(III) and Antimony(V) in Molten Mixtures of Aluminum Chloride and Butylpyridinium Chloride
Dhia A. Habboush