咨询与建议

限定检索结果

文献类型

  • 35 篇 会议
  • 28 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 67 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41 篇 工学
    • 36 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 13 篇 信息与通信工程
    • 8 篇 控制科学与工程
    • 5 篇 电气工程
    • 5 篇 生物工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 光学工程
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 安全科学与工程
    • 2 篇 网络空间安全
  • 15 篇 管理学
    • 9 篇 管理科学与工程(可...
    • 8 篇 图书情报与档案管...
    • 5 篇 工商管理
  • 13 篇 理学
    • 5 篇 生物学
    • 4 篇 数学
    • 4 篇 物理学
    • 2 篇 系统科学
  • 4 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 4 篇 教育学
    • 4 篇 教育学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
    • 2 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 7 篇 blockchain
  • 7 篇 software
  • 5 篇 machine learning
  • 4 篇 computational in...
  • 4 篇 data engineering
  • 4 篇 systems and data...
  • 3 篇 conferences
  • 3 篇 prototypes
  • 3 篇 computational mo...
  • 3 篇 cybersecurity
  • 3 篇 security
  • 3 篇 students
  • 3 篇 virtual reality
  • 2 篇 tools
  • 2 篇 deep learning
  • 2 篇 big data
  • 2 篇 software enginee...
  • 2 篇 systematics
  • 2 篇 neural networks
  • 2 篇 data mining

机构

  • 10 篇 department of so...
  • 9 篇 department of in...
  • 9 篇 department of so...
  • 7 篇 department of in...
  • 6 篇 idea lab univers...
  • 5 篇 school of engine...
  • 5 篇 department of co...
  • 5 篇 department compu...
  • 5 篇 loria nancy
  • 5 篇 department of so...
  • 4 篇 department compu...
  • 4 篇 department of so...
  • 4 篇 department of so...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 shanghai univers...
  • 3 篇 department of so...
  • 3 篇 department of so...

作者

  • 13 篇 parizi reza m.
  • 13 篇 shahriar hossain
  • 11 篇 hossain shahriar
  • 11 篇 faruk md jobair ...
  • 11 篇 md jobair hossai...
  • 8 篇 valero maria
  • 8 篇 reza m. parizi
  • 6 篇 dehghantanha ali
  • 6 篇 choo kim-kwang r...
  • 6 篇 fan wu
  • 5 篇 mohammad masum
  • 5 篇 yazdinejad abbas
  • 5 篇 masum mohammad
  • 5 篇 sakib nazmus
  • 5 篇 akond rahman
  • 5 篇 maria valero
  • 5 篇 cuzzocrea alfred...
  • 4 篇 octavio loyola-g...
  • 4 篇 wu fan
  • 4 篇 homayoun sajad

语言

  • 62 篇 英文
  • 5 篇 其他
检索条件"机构=Department Software Engineering and Game Development"
67 条 记 录,以下是21-30 订阅
排序:
software engineering Process and Methodology in Blockchain-Oriented software development: A Systematic Study
arXiv
收藏 引用
arXiv 2022年
作者: Faruk, Md Jobair Hossain Subramanian, Santhiya Shahriar, Hossain Valero, Maria Li, Xia Tasnim, Masrura Department of Software Engineering and Game Development Kennesaw State University United States Department of Information Technology Kennesaw State University United States Institute for Cybersecurity Workforce Development Kennesaw State University United States
software engineering is the process of systematic, disciplined, quantifiable approach that has significant impact on large-scale and complex software development. Scores of well-established software process models hav... 详细信息
来源: 评论
Investigating Novel Approaches to Defend software Supply Chain Attacks
Investigating Novel Approaches to Defend Software Supply Cha...
收藏 引用
IEEE International Conference on software Reliability engineering Workshops (ISSRE Wksp)
作者: Md Jobair Hossain Faruk Masrura Tasnim Hossain Shahriar Maria Valero Akond Rahman Fan Wu Department of Software Engineering and Game Development Kennesaw State University USA Institute for Cybersecurity Workforce Development Kennesaw State University USA Departrnent of Information Technology Kennesaw State University USA Department of Computer Science and Software Engineering (CSSE) Auburn University USA Department of Computer Science Tuskegee University USA
software supply chain attacks occur during the processes of producing software is compromised, resulting in vulnerabilities that target downstream customers. While the number of successful exploits is limited, the imp... 详细信息
来源: 评论
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques
arXiv
收藏 引用
arXiv 2022年
作者: Faruk, Md Jobair Hossain Trivedi, Shashank Masum, Mohammad Valero, Maria Shahriar, Hossain Ahamed, Sheikh Iqbal Department of Software Engineering and Game Development Kennesaw State University United States Department of Information Technology Kennesaw State University United States Department of Computer Science Marquette University United States
People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle. Maintaining good hygiene practices not only reduces the chances of contracting a dis... 详细信息
来源: 评论
State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques
State-based Sandbox Tool for Distributed Malware Detection w...
收藏 引用
IEEE International Conference on Dependable Systems, Services and Technologies (DESSERT)
作者: Pavlo Rehida George Markowsky Anatoliy Sachenko Oleg Savenko Department of Computer Engineering and Information Systems Khmelnytskyi National University Khmelnytskyi Ukraine Department of Software Engineering and Game Development Kennesaw State University Marietta USA Department of Informatics Kazimierz Pulaski University of Technology and Humanities Radom Poland Research Institute for Intelligent Computer Systems West Ukrainian National Unversity Ternopil Ukraine
This paper deals with the problem of detecting the malware by using emulation approach. Modern malware include various avoid techniques, to hide its anomaly actions. Advantages of using sandbox and emulation technolog...
来源: 评论
How Do Requirements Evolve During Elicitation? An Empirical Study Combining Interviews and App Store Analysis
arXiv
收藏 引用
arXiv 2022年
作者: Ferrari, Alessio Spoletini, Paola Debnath, Sourav Via G. Moruzzi 1 Pisa56126 Italy Department of Software Engineering and Game Development Kennesaw State University 1100 South Marietta Pkwy MariettaGA30060 United States
Requirements are elicited from the customer and other stakeholders through an iterative process of interviews, prototyping, and other interactive sessions. Then, requirements can be further extended, based on the anal... 详细信息
来源: 评论
Authentic Learning of Machine Learning to Ransomware Detection and Prevention
Authentic Learning of Machine Learning to Ransomware Detecti...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Md Jobair Hossain Faruk Mohammad Masum Hossain Shahriar Kai Qian Dan Lo Department of Software Engineering and Game Development Kennesaw State University USA School of Data Science Kennesaw State University USA Department of Information Technology Kennesaw State University USA Department Computer Science Kennesaw State University USA
The primary goal of the authentic learning provides students with an engaging and motivating learning environment for students with hands-on experiences in solving real-world security problems. Each learning topic con... 详细信息
来源: 评论
development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective
Development of Blockchain-based e-Voting System: Requirement...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Md Jobair Hossain Faruk Bilash Saha Mazharul Islam Fazlul Alam Hossain Shahriar Maria Valero Akond Rahman Fan Wu Zakirul Alam Department of Software Engineering and Game Development Kennesaw State University USA Department of Information Technology Kennesaw State University USA Department of Computing Sultan Idris Education University Malaysia Department of Computer Science and Engineering Daffodil International University Bangladesh Department of Computer Science and Software Engineering Auburn University USA Department of Computer Science Tuskegee University USA Department of Computer and Information Sciences Fordham University USA
Elections make a fundamental contribution to democratic governance and are very important to select the appropriate person to determine the fate of a nation while a large number of citizens do not trust the ballot-pap... 详细信息
来源: 评论
A Review of Quantum Cybersecurity: Threats, Risks and Opportunities
arXiv
收藏 引用
arXiv 2022年
作者: Faruk, Md Jobair Hossain Tahora, Sharaban Tasnim, Masrura Shahriar, Hossain Sakib, Nazmus Department of Software Engineering and Game Development Kennesaw State University United States Department of Computer Science Kennesaw State University United States Institute for Cybersecurity Workforce Development Kennesaw State University United States Department of Information Technology Kennesaw State University United States Department of Computer Science and Engineering University at Buffalo The State University of New York United States
The promise of quantum computing is not speeding up conventional computing rather delivering an exponential advantage for certain classes of problems, with profound implications for cybersecurity for instance. With th... 详细信息
来源: 评论
A Novel Machine Learning Based Framework for Bridge Condition Analysis
A Novel Machine Learning Based Framework for Bridge Conditio...
收藏 引用
IEEE International Conference on Big Data
作者: Mohammad Masum Nafisa Anjum Md Jobair Hossain Faruk Hossain Shahriar Nazmus Sakib Maria Valero M.A. Karim Akond Rahman Fan Wu Alfredo Cuzzocrea Department of Applied Data Science San Jose State University San Jose USA Department of Information Technology Kennesaw State University USA Department of Software Engineering and Game Development Kennesaw State University USA Department of Civil and Environmental Engineering Kennesaw State University USA Department of Computer Science and Software Engineering Auburn University USA Department of Computer Science Tuskegee University USA iDEA Lab University of Calabria Rende Italy
Bridges play a vital part in the transportation system by ensuring the connectedness of transportation systems, which is critical for a country’s social and economic prosperity by offering daily mobility to the peopl... 详细信息
来源: 评论
Systematic Analysis of Deep Learning Model for Vulnerable Code Detection
Systematic Analysis of Deep Learning Model for Vulnerable Co...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Mohammad Taneem Bin Nazim Md Jobair Hossain Faruk Hossain Shahriar Md Abdullah Khan Mohammad Masum Nazmus Sakib Fan Wu Department Computer Science Kennesaw State University USA Department of Software Engineering and Game Development Kennesaw State University USA Department of Information Technology Kennesaw State University USA School of Data Science Kennesaw State University USA Department of Computer Science Tuskegee University USA
software vulnerabilities have become a serious problem with the emergence of new applications that contain potentially vulnerable or malicious code that can compromise the system. The growing volume and complexity of ... 详细信息
来源: 评论