咨询与建议

限定检索结果

文献类型

  • 66 篇 会议
  • 56 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 126 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 84 篇 工学
    • 55 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 23 篇 信息与通信工程
    • 16 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 土木工程
    • 10 篇 控制科学与工程
    • 8 篇 光学工程
    • 7 篇 船舶与海洋工程
    • 6 篇 生物医学工程(可授...
    • 6 篇 生物工程
    • 5 篇 仪器科学与技术
    • 5 篇 化学工程与技术
    • 4 篇 机械工程
    • 4 篇 建筑学
    • 4 篇 交通运输工程
    • 4 篇 航空宇航科学与技...
    • 4 篇 网络空间安全
  • 39 篇 理学
    • 15 篇 数学
    • 7 篇 物理学
    • 7 篇 海洋科学
    • 6 篇 生物学
    • 4 篇 化学
    • 4 篇 统计学(可授理学、...
  • 25 篇 管理学
    • 17 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 4 篇 法学
  • 4 篇 教育学
    • 4 篇 教育学
  • 1 篇 经济学
  • 1 篇 军事学

主题

  • 11 篇 software
  • 7 篇 blockchain
  • 6 篇 machine learning
  • 5 篇 computational mo...
  • 5 篇 security
  • 4 篇 deep learning
  • 4 篇 prototypes
  • 4 篇 computational in...
  • 4 篇 data engineering
  • 4 篇 virtual reality
  • 4 篇 training
  • 4 篇 systems and data...
  • 3 篇 conferences
  • 3 篇 big data
  • 3 篇 medical services
  • 3 篇 media
  • 3 篇 predictive model...
  • 3 篇 real-time system...
  • 3 篇 cybersecurity
  • 3 篇 decision making

机构

  • 10 篇 department of so...
  • 9 篇 department of in...
  • 9 篇 department of so...
  • 7 篇 department of in...
  • 6 篇 idea lab univers...
  • 5 篇 school of engine...
  • 5 篇 department of co...
  • 5 篇 department compu...
  • 5 篇 loria nancy
  • 5 篇 department of ga...
  • 5 篇 department of so...
  • 4 篇 department compu...
  • 4 篇 department of so...
  • 4 篇 department of so...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 department of co...
  • 3 篇 shanghai univers...
  • 3 篇 department of so...

作者

  • 13 篇 parizi reza m.
  • 13 篇 shahriar hossain
  • 11 篇 hossain shahriar
  • 11 篇 faruk md jobair ...
  • 11 篇 md jobair hossai...
  • 8 篇 valero maria
  • 8 篇 reza m. parizi
  • 7 篇 fan wu
  • 6 篇 dehghantanha ali
  • 6 篇 choo kim-kwang r...
  • 5 篇 mohammad masum
  • 5 篇 yazdinejad abbas
  • 5 篇 masum mohammad
  • 5 篇 sakib nazmus
  • 5 篇 akond rahman
  • 5 篇 maria valero
  • 5 篇 cuzzocrea alfred...
  • 4 篇 li xia
  • 4 篇 octavio loyola-g...
  • 4 篇 dan lo

语言

  • 116 篇 英文
  • 10 篇 其他
检索条件"机构=The Department of Software Engineering and Game Design and Development"
126 条 记 录,以下是41-50 订阅
software engineering Process and Methodology in Blockchain-Oriented software development: A Systematic Study
arXiv
收藏 引用
arXiv 2022年
作者: Faruk, Md Jobair Hossain Subramanian, Santhiya Shahriar, Hossain Valero, Maria Li, Xia Tasnim, Masrura Department of Software Engineering and Game Development Kennesaw State University United States Department of Information Technology Kennesaw State University United States Institute for Cybersecurity Workforce Development Kennesaw State University United States
software engineering is the process of systematic, disciplined, quantifiable approach that has significant impact on large-scale and complex software development. Scores of well-established software process models hav... 详细信息
来源: 评论
Investigating Novel Approaches to Defend software Supply Chain Attacks
Investigating Novel Approaches to Defend Software Supply Cha...
收藏 引用
IEEE International Conference on software Reliability engineering Workshops (ISSRE Wksp)
作者: Md Jobair Hossain Faruk Masrura Tasnim Hossain Shahriar Maria Valero Akond Rahman Fan Wu Department of Software Engineering and Game Development Kennesaw State University USA Institute for Cybersecurity Workforce Development Kennesaw State University USA Departrnent of Information Technology Kennesaw State University USA Department of Computer Science and Software Engineering (CSSE) Auburn University USA Department of Computer Science Tuskegee University USA
software supply chain attacks occur during the processes of producing software is compromised, resulting in vulnerabilities that target downstream customers. While the number of successful exploits is limited, the imp... 详细信息
来源: 评论
A Novel IoT-based Framework for Non-Invasive Human Hygiene Monitoring using Machine Learning Techniques
arXiv
收藏 引用
arXiv 2022年
作者: Faruk, Md Jobair Hossain Trivedi, Shashank Masum, Mohammad Valero, Maria Shahriar, Hossain Ahamed, Sheikh Iqbal Department of Software Engineering and Game Development Kennesaw State University United States Department of Information Technology Kennesaw State University United States Department of Computer Science Marquette University United States
People's personal hygiene habits speak volumes about the condition of taking care of their bodies and health in daily lifestyle. Maintaining good hygiene practices not only reduces the chances of contracting a dis... 详细信息
来源: 评论
State-based Sandbox Tool for Distributed Malware Detection with Avoid Techniques
State-based Sandbox Tool for Distributed Malware Detection w...
收藏 引用
IEEE International Conference on Dependable Systems, Services and Technologies (DESSERT)
作者: Pavlo Rehida George Markowsky Anatoliy Sachenko Oleg Savenko Department of Computer Engineering and Information Systems Khmelnytskyi National University Khmelnytskyi Ukraine Department of Software Engineering and Game Development Kennesaw State University Marietta USA Department of Informatics Kazimierz Pulaski University of Technology and Humanities Radom Poland Research Institute for Intelligent Computer Systems West Ukrainian National Unversity Ternopil Ukraine
This paper deals with the problem of detecting the malware by using emulation approach. Modern malware include various avoid techniques, to hide its anomaly actions. Advantages of using sandbox and emulation technolog...
来源: 评论
How Do Requirements Evolve During Elicitation? An Empirical Study Combining Interviews and App Store Analysis
arXiv
收藏 引用
arXiv 2022年
作者: Ferrari, Alessio Spoletini, Paola Debnath, Sourav Via G. Moruzzi 1 Pisa56126 Italy Department of Software Engineering and Game Development Kennesaw State University 1100 South Marietta Pkwy MariettaGA30060 United States
Requirements are elicited from the customer and other stakeholders through an iterative process of interviews, prototyping, and other interactive sessions. Then, requirements can be further extended, based on the anal... 详细信息
来源: 评论
Authentic Learning of Machine Learning to Ransomware Detection and Prevention
Authentic Learning of Machine Learning to Ransomware Detecti...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Md Jobair Hossain Faruk Mohammad Masum Hossain Shahriar Kai Qian Dan Lo Department of Software Engineering and Game Development Kennesaw State University USA School of Data Science Kennesaw State University USA Department of Information Technology Kennesaw State University USA Department Computer Science Kennesaw State University USA
The primary goal of the authentic learning provides students with an engaging and motivating learning environment for students with hands-on experiences in solving real-world security problems. Each learning topic con... 详细信息
来源: 评论
development of Blockchain-based e-Voting System: Requirements, design and Security Perspective
Development of Blockchain-based e-Voting System: Requirement...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Md Jobair Hossain Faruk Bilash Saha Mazharul Islam Fazlul Alam Hossain Shahriar Maria Valero Akond Rahman Fan Wu Zakirul Alam Department of Software Engineering and Game Development Kennesaw State University USA Department of Information Technology Kennesaw State University USA Department of Computing Sultan Idris Education University Malaysia Department of Computer Science and Engineering Daffodil International University Bangladesh Department of Computer Science and Software Engineering Auburn University USA Department of Computer Science Tuskegee University USA Department of Computer and Information Sciences Fordham University USA
Elections make a fundamental contribution to democratic governance and are very important to select the appropriate person to determine the fate of a nation while a large number of citizens do not trust the ballot-pap... 详细信息
来源: 评论
A Review of Quantum Cybersecurity: Threats, Risks and Opportunities
arXiv
收藏 引用
arXiv 2022年
作者: Faruk, Md Jobair Hossain Tahora, Sharaban Tasnim, Masrura Shahriar, Hossain Sakib, Nazmus Department of Software Engineering and Game Development Kennesaw State University United States Department of Computer Science Kennesaw State University United States Institute for Cybersecurity Workforce Development Kennesaw State University United States Department of Information Technology Kennesaw State University United States Department of Computer Science and Engineering University at Buffalo The State University of New York United States
The promise of quantum computing is not speeding up conventional computing rather delivering an exponential advantage for certain classes of problems, with profound implications for cybersecurity for instance. With th... 详细信息
来源: 评论
A Novel Machine Learning Based Framework for Bridge Condition Analysis
A Novel Machine Learning Based Framework for Bridge Conditio...
收藏 引用
IEEE International Conference on Big Data
作者: Mohammad Masum Nafisa Anjum Md Jobair Hossain Faruk Hossain Shahriar Nazmus Sakib Maria Valero M.A. Karim Akond Rahman Fan Wu Alfredo Cuzzocrea Department of Applied Data Science San Jose State University San Jose USA Department of Information Technology Kennesaw State University USA Department of Software Engineering and Game Development Kennesaw State University USA Department of Civil and Environmental Engineering Kennesaw State University USA Department of Computer Science and Software Engineering Auburn University USA Department of Computer Science Tuskegee University USA iDEA Lab University of Calabria Rende Italy
Bridges play a vital part in the transportation system by ensuring the connectedness of transportation systems, which is critical for a country’s social and economic prosperity by offering daily mobility to the peopl... 详细信息
来源: 评论
Energy Efficiency Improvement System for AC Circuits
Energy Efficiency Improvement System for AC Circuits
收藏 引用
IEEE NW Russia Young Researchers in Electrical and Electronic engineering Conference (EIConRusNW)
作者: Vladimir Kulagin Kirill Selivanov Andrey Vlasov Dmitrii Aminev Lyudmila Bunina Sergey Bikovsky Moscow technical university of communications and informatics Moscow Russian Federation Department of Design and Technology of Electronic Devices Bauman Moscow State Technical University BMSTU Moscow Russian Federation Department of Development of software solutions and system programming Russian Technological University – MIREA Moscow Russian Federation Department of Electrical Engineering Systems Russian Technological University – MIREA Moscow Russian Federation
The problem of the rational use of energy resources remains constantly relevant and requires the search for new approaches. One of them is power control. In AC circuits, the authors see the most promising method of ph...
来源: 评论