Browsing by Subject Statistics


jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 102 to 121 of 125 < previous   next >
Published DateTitleAuthor(s)
Sep-2015Security Threats of URL Shortening: A Users PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
28-Aug-2013Simmelian Backbones: Amplifying Hidden Homophily in Facebook NetworksNick, BoboLee, ConradCunningham, PádraigBrandes, Ulrik
13-Feb-2015Simulating SQL-Injection Cyber-attacks using GNS3Al-Mahrouqi, AadilTobin, PatrickAbdalla, SamehKechadi, Tahar
22-May-2015SLAFM: A Service Level Agreements Formal Model for Cloud ComputingDe Marco, LuciaFerrucci, FilomenaKechadi, Tahar
2014Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial ToolFaheem, MuhammadLe-Khac, Nhien-AnKechadi, Tahar
25-May-2016Spreading the News: How Can Journalists Gain More Engagement for their TweetsOrellana-Rodriguez, ClaudiaGreene, DerekKeane, Mark T.
2015The State of the Art Forensic Techniques in Mobile Cloud Environment: A Survey, Challenges and Current TrendsKechadi, TaharFaheem, MuhammadLe-Khac, Nhien-An
12-Sep-2006Statistical computation for extreme bridge traffic load effectsCaprani, Colin C.O'Brien, Eugene J.
Nov-2011A study of principal component analysis applied to spatially distributed wind powerBurke, Daniel J.O'Malley, Mark
2-Jul-2016Time Series Analysis of VLE Activity DataMłynarska, EwaGreene, DerekCunningham, Pádraig
21-Sep-2016Time Series Clustering of Moodle Activity DataMłynarska, EwaGreene, DerekCunningham, Pádraig
23-Sep-2016Topy: Real-time Story Tracking via Social TagsPoghosyan, GevorgQureshi, M. AtifIfrim, Georgiana
12-Jun-2014Toward a new cloud-based approach to preserve the privacy for detecting suspicious cases of money laundering in an investment bankLe-Khac, Nhien-AnKechadi, Tahar
30-Jul-2015Towards middleware security framework for next generation data centers connectivityTalpur, Samar RazaAbdalla, SamehKechadi, Tahar
25-Jun-2016Tweeting Europe: A text-analytic approach to unveiling the content of political actors' Twitter activities in the European ParliamentCross, James P.Greene, DerekBelford, Mark
23-Sep-2016TwitterCracy: Exploratory Monitoring of Twitter Streams for the 2016 U.S. Presidential Election CycleQureshi, M. AtifArjumand, YounusGreene, Derek
Mar-2010The use of predictive likelihood to estimate the distribution of extreme bridge traffic load effectCaprani, Colin C.O'Brien, Eugene J.
2017Using Emotional Attachment as a Lens to Improve Users E-reading ExperienceGirard, AdamCowan, Benjamin R.Shankar, KalpanaCoyle, David
10-Jun-2016Using Icicle Trees to Encode the Hierarchical Structure of Source CodeBacher, IvanMacNamee, BrianKelleher, John
24-Mar-2014Virtual Machine Forensics by means of Introspection and Kernel Code InjectionTobin, PatrickKechadi, Tahar