default search action
IT Professional, Volume 25
Volume 25, Number 1, January - February 2023
- Charalampos Z. Patrikakis:
IT Professional Enters its 25th Year: Ready to Face the Challenges Ahead. 4-6 - Irena Bojanova, Carlos Eduardo Galhardo:
Bug, Fault, Error, or Weakness: Demystifying Software Security Vulnerabilities. 7-12 - Jayson Andrew Killoran, Yuanyuan Gina Cui, Andrew Park, Patrick van Esch, Amir Dabirian, Jan Kietzmann:
Implementing Behavioral Biometrics With TRUST. 13-16 - Adnan Akhunzada, Sherali Zeadally, Saif ul Islam:
Toward Performance and Energy-Efficient Edge-of-Things. 17-23 - Arash Heidari, Mohammad Ali Jabraeil Jamali, Nima Jafari Navimipour, Shahin Akbarpour:
A QoS-Aware Technique for Computation Offloading in IoT-Edge Platforms Using a Convolutional Neural Network and Markov Decision Process. 24-39 - Cheng You, Yanjia Qin, Qi Chen, Chang Chen, Jiahui Huang:
HADPoS: Improvement of DPoS Consensus Mechanism Based on Heat Attenuation. 40-51 - Sonia Salman, Jawwad Ahmed Shamsi, Rizwan Qureshi:
Deep Fake Generation and Detection: Issues, Challenges, and Solutions. 52-59 - Elio San Cristóbal Ruiz, Rafael Pastor Vargas, Rosario Gil Ortego, Russ Meier, Hamadou Saliah-Hassane, Manuel Castro:
Vulnerability Assessment of Learning Management Systems. 60-67 - Varun Gupta, Luis Rubalcaba, Chetna Gupta:
Connecting Dots Between Entrepreneurs, Research Publishers, and Software Engineering Researchers: An Outcome of Mixed Methods Empirical Research. 68-80 - Stephen J. Andriole:
New Ways of Working Are Already Old. 81-83 - Nir Kshetri:
The Economics of the Industrial Metaverse. 84-88 - George F. Hurlburt:
Perception of Time and Its Representation in Technical Systems. 89-91
Volume 25, Number 2, March - April 2023
- George F. Hurlburt:
What If Ethics Got in the Way of Generative AI? 4-6 - Harshitha Menon, James Diffenderfer, Giorgis Georgakoudis, Ignacio Laguna, Michael O. Lam, Daniel Osei-Kuffuor, Konstantinos Parasyris, Jackson Vanover:
Approximate High-Performance Computing: A Fast and Energy-Efficient Computing Paradigm in the Post-Moore Era. 7-15 - Nir Kshetri:
ChatGPT in Developing Economies. 16-19 - Julián Grigera, Jordán Pascual Espada, Gustavo Rossi:
AI in User Interface Design and Evaluation. 20-22 - Maxim Bakaev, Sebastian Heil, Vladimir Khvorostov, Martin Gaedke:
How Many Data Does Machine Learning in Human-Computer Interaction Need?: Re-Estimating the Dataset Size for Convolutional Neural Network-Based Models of Visual Perception. 23-29 - He Yu, Simon Harper, Markel Vigo:
Modeling Search Behavior Evolution on a Specialist Search Engine. 30-35 - Chen-Hao Huang, Tzu-Chuan Chou:
Examining the Dilemma Between Artificial Intelligence Techniques and Professional Medical Service: A Hybrid Balancing Perspective. 36-40 - Mohamed Saied Essa, Ahmed Mohamed Elfatatry, Shawkat K. Guirguis:
Deeper Understanding of Software Change. 41-51 - Aos Mulahuwaish, Matthew Loucks, Basheer Qolomany, Ala I. Al-Fuqaha:
Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin. 52-63 - Zerong Xie, Gary K. W. Wong, Dickson K. W. Chiu, Junru Lei:
Bridging K-12 Mathematics and Computational Thinking in the Scratch Community: Implications Drawn From a Creative Learning Context. 64-70 - Valeria Henríquez, Ana María Moreno, José Antonio Calvo-Manzano Villalón, Tomás San Feliu, Eliana Scheihing:
Organizational Type Mismatch in Agile SMEs. 71-76 - Stephen J. Andriole, Noah P. Barsky:
How Accountants Stay in the C-Suite (or Disappear Into the Digital Back Office). 77-80 - George O. Strawn:
IT, 21st Century Employment, and Demography. 81-82 - Irena Bojanova, Carlos Eduardo Galhardo:
Heartbleed Revisited: Is it Just a Buffer Over-Read? 83-89
Volume 25, Number 3, May - June 2023
- Evangelos Katsadouros, Charalampos Z. Patrikakis, George F. Hurlburt:
Can Large Language Models Better Predict Software Vulnerability? 4-8 - Nir Kshetri:
Cybercrime and Privacy Threats of Large Language Models. 9-13 - Stephen J. Andriole:
Truth Talking in the C-Suite. 14-16 - Bhuvan Unhelkar, Timothy R. Weil, Jason W. Rupe, Reza Djavanshi:
The x in xG. 17-18 - Osama AlQahtani:
Effects of User Equipment and Integrated Access and Backhaul Schedulers on the Throughput of 5G Millimeter-Wave Networks. 19-23 - Uthpala Premarathne, S. Rajasingham:
Priority-Based Redeployment Algorithm for Decentralized Nodes in xG Access Networks. 24-29 - Lila Rajabion, Bhuvan Unhelkar:
Impact of xG on Cybersecurity. 30-35 - Anmol Kumar, Gaurav Somani:
DDoS at a Glance: Attack Launch to Solutions. 36-42 - Hsiang-Yu Chuang, Jiann-Liang Chen, Yi-Wei Ma:
Malware Detection and Classification Based on Graph Convolutional Networks and Function Call Graphs. 43-53 - Akashdeep Bhardwaj, Keshav Kaushik:
Metaverse or Metaworst with Cybersecurity Attacks. 54-60 - Luis Enrique Sánchez, Antonio Santos-Olmo, Haralambos Mouratidis, Eduardo Fernández-Medina:
New Frontiers in Security Risk Management. 61-67 - Suraj G. Jadhav, Surendra Sarnikar:
Digital Twin of a Digital World: Process, Data, and Experience Perspectives. 68-73 - Clayton S. Ferner:
Card Game to Demonstrate Quantum Key Exchange. 74-77
Volume 25, Number 4, July - August 2023
- Sorel Reisman:
COMPSAC Returns In-Person - A Remarkable Post-Covid Success. 4-6 - George O. Strawn:
Masterminds of Computer Design: Charles Babbage and Ada Lovelace. 7-10 - Assane Gueye, Carlos Eduardo Galhardo, Irena Bojanova:
Critical Software Security Weaknesses. 11-16 - George F. Hurlburt:
The Edgy Nature of Green IT. 17-20 - Noman Nasir Minhas, Maida Naveed:
Using Internet of Things Application for Energy-Efficient and Lightweight Internet of Drones Networks. 21-28 - Stelios Prekas, Panagiotis Karkazis, Panagiotis Trakadas:
An Energy-Aware Path Enumeration Solution Based on the Path Algebra Framework. 29-35 - Anirban Sengupta, Mahendra Rathor, Rahul Chaurasia:
Biometrics for Hardware Security and Trust: Discussion and Analysis. 36-44 - Ghazanfar Ali Safdar, Ali Mansour:
Security and Trust Issues in BYOD Networks. 45-51 - Abdul Majeed, Seong Oun Hwang:
The Changing Landscape of Privacy- Countermeasures in the Era of the COVID-19 Pandemic. 52-60 - Ángel F. Alcaide, Carlos Núñez-Gómez, Francisco M. Delicado Martínez, Carmen Carrión, María Blanca Caminero:
A Blockchain-Based e-Government Service for Quantity Surveyors. 61-66 - Hande Aka Uymaz, Senem Kumova Metin:
Enriching Transformer-Based Embeddings for Emotion Identification in an Agglutinative Language: Turkish. 67-73 - Nalinee Sophatsathit:
Bridging the Gap From Concrete Building Construction to Flexible Software Process - Way of Working. 74-84 - Wenda Wei, Chenyang Wang, Xinyang Zheng, Hengshan Yue:
An Approximate Fault-Tolerance Design for a Convolutional Neural Network Accelerator. 85-90 - Stephen J. Andriole:
C-Suite Dysfunction. 91-93 - Nir Kshetri:
Can China Catch Up to the United States in Generative Artificial Intelligence? 94-97
Volume 25, Number 5, September - October 2023
- Hoda Diba:
Employer Branding: The Impact of COVID-19 on New Employee Hires in IT Companies. 4-9 - Axel Legay:
Design, Validate, Implement, and Validate: From Dreaming Approaches to Realities. 10-13 - Stephen J. Andriole:
How Competitive Are You? 14-16 - José Luis Hernández Ramos, Paolo Bellavista, Georgios Kambourakis, Jason R. C. Nurse, J. Morris Chang:
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond. 17-19 - Geetanjali Rathee, Chaker Abdelaziz Kerrache, Anissa Cheriguene:
Blockchain-Based Mechanism for Smart Record Monitoring During and After the COVID-19 Pandemic. 20-28 - Zubair A. Baig, Sri Harsha Mekala, Sherali Zeadally:
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors. 37-44 - Mohamed Saied Essa, Shawkat Kamal Guirguis:
Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things. 45-56 - Michail Tsikerdekis, Sherali Zeadally:
Misinformation Detection Using Deep Learning. 57-63 - Irena Bojanova, John J. Guerrerio:
Labeling Software Security Vulnerabilities. 64-70 - Nir Kshetri:
Generative Artificial Intelligence in Marketing. 71-75 - Chen Zhong, J. B. (Joo Baek) Kim, Ali Alper Yayla:
Enhancing Communication Among Remote Cybersecurity Analysts With Visual Traces. 29-36
Volume 25, Number 6, November - December 2023
- Charalampos Z. Patrikakis:
First Responder Superheroes Are Wearing Smart Wearables, Not Capes. 4-7 - Nir Kshetri:
The Future of Education: Generative Artificial Intelligence's Collaborative Role With Teachers. 8-12 - Andrew Park, Jan Kietzmann, Jayson Andrew Killoran, Yuanyuan Gina Cui, Patrick van Esch, Amir Dabirian:
Nothing Is Harder to Resist Than the Temptation of AI. 13-20 - Stephen J. Andriole:
An Executive Guide to AI, Machine Learning, and Generative AI - With Some Help From ChatGPT and Bard. 21-25 - Stephen J. Andriole:
IT Empowering Rescuers and First Responders in Saving Lives. 26-28 - Philip Wright, Ilmija Asani, Nelson Pimenta, Paulo Chaves Ferreira, William Oliff, Georgia Sakellari:
Infrastructure-Less Prioritized Communication Platform for First Responders. 29-37 - Susanna Kaiser, Stephan Sand, Magdalena M. Linkiewicz, Henry Meißner, Dirk Baumbach, Ralf Berger:
An Overall First Responder Tracking and Coordination Framework. 38-44 - Anaida Fernández-García, Xabier Oregui Biain, Konstantinos Lingos, Konstantinos Konstantoudakis, Alberto Belmonte-Hernández, Izar Azpiroz Iragorri, Dimitrios Zarpalas:
Smart Helmet: Combining Sensors, AI, Augmented Reality, and Personal Protection to Enhance First Responders' Situational Awareness. 45-53 - Priyanka Ganesan, Senthil Kumar Jagatheesaperumal:
Revolutionizing Emergency Response: The Transformative Power of Smart Wearables Through Blockchain, Federated Learning, and Beyond 5G/6G Services. 54-61 - Abdul Majeed, Seong Oun Hwang:
Technical Analysis of Data-Centric and Model-Centric Artificial Intelligence. 62-70 - Mohamed Rahouti, Damian M. Lyons, Senthil Kumar Jagatheesaperumal, Kaiqi Xiong:
A Decentralized Cooperative Navigation Approach for Visual Homing Networks. 71-81 - Jae Hun Kim, Han Woo Park:
Identifying Networked Patterns in Memecoin Twitter Accounts Using Exponential Random Graph Modeling. 82-89 - George O. Strawn:
Masterminds of Punched Card Data Processing: Herman Hollerith and John Billings. 90-93 - Giuseppe De Palma, Saverio Giallorenzo, Jacopo Mauro, Matteo Trentin, Gianluigi Zavattaro:
Formally Verifying Function Scheduling Properties in Serverless Applications. 94-99
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.