


default search action
IT Professional, Volume 25
Volume 25, Number 1, January - February 2023
- Charalampos Z. Patrikakis

:
IT Professional Enters its 25th Year: Ready to Face the Challenges Ahead. 4-6 - Irena Bojanova

, Carlos Eduardo Galhardo:
Bug, Fault, Error, or Weakness: Demystifying Software Security Vulnerabilities. 7-12 - Jayson Andrew Killoran

, Yuanyuan Gina Cui
, Andrew Park
, Patrick van Esch
, Amir Dabirian
, Jan Kietzmann
:
Implementing Behavioral Biometrics With TRUST. 13-16 - Adnan Akhunzada

, Sherali Zeadally
, Saif ul Islam
:
Toward Performance and Energy-Efficient Edge-of-Things. 17-23 - Arash Heidari

, Mohammad Ali Jabraeil Jamali
, Nima Jafari Navimipour
, Shahin Akbarpour:
A QoS-Aware Technique for Computation Offloading in IoT-Edge Platforms Using a Convolutional Neural Network and Markov Decision Process. 24-39 - Cheng You, Yanjia Qin

, Qi Chen
, Chang Chen
, Jiahui Huang:
HADPoS: Improvement of DPoS Consensus Mechanism Based on Heat Attenuation. 40-51 - Sonia Salman

, Jawwad Ahmed Shamsi
, Rizwan Qureshi
:
Deep Fake Generation and Detection: Issues, Challenges, and Solutions. 52-59 - Elio San Cristóbal Ruiz

, Rafael Pastor Vargas
, Rosario Gil Ortego
, Russ Meier
, Hamadou Saliah-Hassane, Manuel Castro
:
Vulnerability Assessment of Learning Management Systems. 60-67 - Varun Gupta

, Luis Rubalcaba
, Chetna Gupta
:
Connecting Dots Between Entrepreneurs, Research Publishers, and Software Engineering Researchers: An Outcome of Mixed Methods Empirical Research. 68-80 - Stephen J. Andriole

:
New Ways of Working Are Already Old. 81-83 - Nir Kshetri

:
The Economics of the Industrial Metaverse. 84-88 - George F. Hurlburt

:
Perception of Time and Its Representation in Technical Systems. 89-91
Volume 25, Number 2, March - April 2023
- George F. Hurlburt

:
What If Ethics Got in the Way of Generative AI? 4-6 - Harshitha Menon

, James Diffenderfer, Giorgis Georgakoudis
, Ignacio Laguna
, Michael O. Lam
, Daniel Osei-Kuffuor, Konstantinos Parasyris
, Jackson Vanover
:
Approximate High-Performance Computing: A Fast and Energy-Efficient Computing Paradigm in the Post-Moore Era. 7-15 - Nir Kshetri

:
ChatGPT in Developing Economies. 16-19 - Julián Grigera

, Jordán Pascual Espada
, Gustavo Rossi
:
AI in User Interface Design and Evaluation. 20-22 - Maxim Bakaev

, Sebastian Heil
, Vladimir Khvorostov
, Martin Gaedke
:
How Many Data Does Machine Learning in Human-Computer Interaction Need?: Re-Estimating the Dataset Size for Convolutional Neural Network-Based Models of Visual Perception. 23-29 - He Yu

, Simon Harper
, Markel Vigo
:
Modeling Search Behavior Evolution on a Specialist Search Engine. 30-35 - Chen-Hao Huang

, Tzu-Chuan Chou:
Examining the Dilemma Between Artificial Intelligence Techniques and Professional Medical Service: A Hybrid Balancing Perspective. 36-40 - Mohamed Saied Essa

, Ahmed Mohamed Elfatatry
, Shawkat K. Guirguis
:
Deeper Understanding of Software Change. 41-51 - Aos Mulahuwaish

, Matthew Loucks
, Basheer Qolomany
, Ala I. Al-Fuqaha
:
Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin. 52-63 - Zerong Xie

, Gary K. W. Wong
, Dickson K. W. Chiu
, Junru Lei:
Bridging K-12 Mathematics and Computational Thinking in the Scratch Community: Implications Drawn From a Creative Learning Context. 64-70 - Valeria Henríquez

, Ana María Moreno
, José Antonio Calvo-Manzano Villalón
, Tomás San Feliu
, Eliana Scheihing
:
Organizational Type Mismatch in Agile SMEs. 71-76 - Stephen J. Andriole

, Noah P. Barsky
:
How Accountants Stay in the C-Suite (or Disappear Into the Digital Back Office). 77-80 - George O. Strawn

:
IT, 21st Century Employment, and Demography. 81-82 - Irena Bojanova

, Carlos Eduardo Galhardo:
Heartbleed Revisited: Is it Just a Buffer Over-Read? 83-89
Volume 25, Number 3, May - June 2023
- Evangelos Katsadouros

, Charalampos Z. Patrikakis
, George F. Hurlburt
:
Can Large Language Models Better Predict Software Vulnerability? 4-8 - Nir Kshetri

:
Cybercrime and Privacy Threats of Large Language Models. 9-13 - Stephen J. Andriole

:
Truth Talking in the C-Suite. 14-16 - Bhuvan Unhelkar

, Timothy R. Weil
, Jason W. Rupe, Reza Djavanshi:
The x in xG. 17-18 - Osama AlQahtani

:
Effects of User Equipment and Integrated Access and Backhaul Schedulers on the Throughput of 5G Millimeter-Wave Networks. 19-23 - Uthpala Premarathne

, S. Rajasingham:
Priority-Based Redeployment Algorithm for Decentralized Nodes in xG Access Networks. 24-29 - Lila Rajabion

, Bhuvan Unhelkar
:
Impact of xG on Cybersecurity. 30-35 - Anmol Kumar

, Gaurav Somani
:
DDoS at a Glance: Attack Launch to Solutions. 36-42 - Hsiang-Yu Chuang, Jiann-Liang Chen

, Yi-Wei Ma
:
Malware Detection and Classification Based on Graph Convolutional Networks and Function Call Graphs. 43-53 - Akashdeep Bhardwaj

, Keshav Kaushik
:
Metaverse or Metaworst with Cybersecurity Attacks. 54-60 - Luis Enrique Sánchez

, Antonio Santos-Olmo
, Haralambos Mouratidis
, Eduardo Fernández-Medina
:
New Frontiers in Security Risk Management. 61-67 - Suraj G. Jadhav

, Surendra Sarnikar
:
Digital Twin of a Digital World: Process, Data, and Experience Perspectives. 68-73 - Clayton S. Ferner

:
Card Game to Demonstrate Quantum Key Exchange. 74-77
Volume 25, Number 4, July - August 2023
- Sorel Reisman

:
COMPSAC Returns In-Person - A Remarkable Post-Covid Success. 4-6 - George O. Strawn

:
Masterminds of Computer Design: Charles Babbage and Ada Lovelace. 7-10 - Assane Gueye

, Carlos Eduardo Galhardo
, Irena Bojanova
:
Critical Software Security Weaknesses. 11-16 - George F. Hurlburt

:
The Edgy Nature of Green IT. 17-20 - Noman Nasir Minhas

, Maida Naveed
:
Using Internet of Things Application for Energy-Efficient and Lightweight Internet of Drones Networks. 21-28 - Stelios Prekas

, Panagiotis Karkazis, Panagiotis Trakadas:
An Energy-Aware Path Enumeration Solution Based on the Path Algebra Framework. 29-35 - Anirban Sengupta

, Mahendra Rathor
, Rahul Chaurasia
:
Biometrics for Hardware Security and Trust: Discussion and Analysis. 36-44 - Ghazanfar Ali Safdar

, Ali Mansour
:
Security and Trust Issues in BYOD Networks. 45-51 - Abdul Majeed

, Seong Oun Hwang
:
The Changing Landscape of Privacy- Countermeasures in the Era of the COVID-19 Pandemic. 52-60 - Ángel F. Alcaide

, Carlos Núñez-Gómez
, Francisco M. Delicado Martínez
, Carmen Carrión
, María Blanca Caminero
:
A Blockchain-Based e-Government Service for Quantity Surveyors. 61-66 - Hande Aka Uymaz

, Senem Kumova Metin
:
Enriching Transformer-Based Embeddings for Emotion Identification in an Agglutinative Language: Turkish. 67-73 - Nalinee Sophatsathit

:
Bridging the Gap From Concrete Building Construction to Flexible Software Process - Way of Working. 74-84 - Wenda Wei

, Chenyang Wang
, Xinyang Zheng
, Hengshan Yue
:
An Approximate Fault-Tolerance Design for a Convolutional Neural Network Accelerator. 85-90 - Stephen J. Andriole

:
C-Suite Dysfunction. 91-93 - Nir Kshetri

:
Can China Catch Up to the United States in Generative Artificial Intelligence? 94-97
Volume 25, Number 5, September - October 2023
- Hoda Diba

:
Employer Branding: The Impact of COVID-19 on New Employee Hires in IT Companies. 4-9 - Axel Legay

:
Design, Validate, Implement, and Validate: From Dreaming Approaches to Realities. 10-13 - Stephen J. Andriole

:
How Competitive Are You? 14-16 - José Luis Hernández-Ramos

, Paolo Bellavista
, Georgios Kambourakis
, Jason R. C. Nurse
, J. Morris Chang
:
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond. 17-19 - Geetanjali Rathee

, Chaker Abdelaziz Kerrache
, Anissa Cheriguene:
Blockchain-Based Mechanism for Smart Record Monitoring During and After the COVID-19 Pandemic. 20-28 - Zubair A. Baig

, Sri Harsha Mekala
, Sherali Zeadally
:
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors. 37-44 - Mohamed Saied Essa

, Shawkat Kamal Guirguis
:
Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things. 45-56 - Michail Tsikerdekis

, Sherali Zeadally
:
Misinformation Detection Using Deep Learning. 57-63 - Irena Bojanova

, John J. Guerrerio
:
Labeling Software Security Vulnerabilities. 64-70 - Nir Kshetri

:
Generative Artificial Intelligence in Marketing. 71-75 - Chen Zhong

, J. B. (Joo Baek) Kim
, Ali Alper Yayla
:
Enhancing Communication Among Remote Cybersecurity Analysts With Visual Traces. 29-36
Volume 25, Number 6, November - December 2023
- Charalampos Z. Patrikakis

:
First Responder Superheroes Are Wearing Smart Wearables, Not Capes. 4-7 - Nir Kshetri

:
The Future of Education: Generative Artificial Intelligence's Collaborative Role With Teachers. 8-12 - Andrew Park

, Jan Kietzmann
, Jayson Andrew Killoran, Yuanyuan Gina Cui
, Patrick van Esch
, Amir Dabirian
:
Nothing Is Harder to Resist Than the Temptation of AI. 13-20 - Stephen J. Andriole

:
An Executive Guide to AI, Machine Learning, and Generative AI - With Some Help From ChatGPT and Bard. 21-25 - Stephen J. Andriole

:
IT Empowering Rescuers and First Responders in Saving Lives. 26-28 - Philip Wright

, Ilmija Asani, Nelson Pimenta
, Paulo Chaves Ferreira
, William Oliff, Georgia Sakellari
:
Infrastructure-Less Prioritized Communication Platform for First Responders. 29-37 - Susanna Kaiser

, Stephan Sand
, Magdalena M. Linkiewicz
, Henry Meißner
, Dirk Baumbach
, Ralf Berger
:
An Overall First Responder Tracking and Coordination Framework. 38-44 - Anaida Fernández-García

, Xabier Oregui Biain
, Konstantinos Lingos
, Konstantinos Konstantoudakis
, Alberto Belmonte-Hernández
, Izar Azpiroz Iragorri
, Dimitrios Zarpalas
:
Smart Helmet: Combining Sensors, AI, Augmented Reality, and Personal Protection to Enhance First Responders' Situational Awareness. 45-53 - Priyanka Ganesan

, Senthil Kumar Jagatheesaperumal
:
Revolutionizing Emergency Response: The Transformative Power of Smart Wearables Through Blockchain, Federated Learning, and Beyond 5G/6G Services. 54-61 - Abdul Majeed

, Seong Oun Hwang
:
Technical Analysis of Data-Centric and Model-Centric Artificial Intelligence. 62-70 - Mohamed Rahouti

, Damian M. Lyons
, Senthil Kumar Jagatheesaperumal
, Kaiqi Xiong
:
A Decentralized Cooperative Navigation Approach for Visual Homing Networks. 71-81 - Jae Hun Kim

, Han Woo Park
:
Identifying Networked Patterns in Memecoin Twitter Accounts Using Exponential Random Graph Modeling. 82-89 - George O. Strawn

:
Masterminds of Punched Card Data Processing: Herman Hollerith and John Billings. 90-93 - Giuseppe De Palma

, Saverio Giallorenzo
, Jacopo Mauro
, Matteo Trentin
, Gianluigi Zavattaro
:
Formally Verifying Function Scheduling Properties in Serverless Applications. 94-99

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














