default search action
5. RIIT 2016: Boston, MA, USA
- Deborah Boisvert, Stephen J. Zilora:
Proceedings of the 5th Annual Conference on Research in Information Technology, RIIT 2016, Boston, MA, USA, September 28 - October 1, 2016. ACM 2016, ISBN 978-1-4503-4453-1
Keynote Address
- Nigel Jacob:
Using Technology to Build Compassion. 1
C1: RIIT Paper Session
- Anthony Ramirez, Alfredo Fernandez:
MP4 Steganography: Analyzing and Detecting TCSteg. 2-6 - Ricardo A. Calix, Armando Cabrera, Irshad Iqbal:
Analysis of Parallel Architectures for Network Intrusion Detection. 7-12 - Sam Chung, Cheolmin Sky Moon, Barbara Endicott-Popovsky:
Architecture-Driven Penetration Testing against an Identity Access Management (IAM) System. 13-18
C2: RIIT Paper Session
- C. Richard G. Helps, Clarissa Helps:
Measuring Stylus and Tablet Performance for Usability in Sketching. 19-24 - Deborah LaBelle, Jawaher Alsulami, Jim Leone:
Effects of using iPads on First Grade Students' Achievements in Arabic Language Classes In Saudi Arabia. 25-28 - Zahra Alqubaiti, Lei Li, Jing He:
The Paradox of Social Media Security: Users' Perceptions versus Behaviors. 29-34
C3: RIIT Paper Session
- Marc J. Dupuis, Samreen Khadeer:
Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider Threat. 35-40 - Amos O. Olagunju, Farouk Samu:
In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and Prevention. 41-46 - Raymond A. Hansen, Benjamin Peterson, Timothy Becker:
Investigating the Security of Nexus 1000V Virtual Switches in VMware ESXi Hypervisors. 47-52
C4: RIIT Lightning Talk Session
- Debasis Bhattacharya, Mario Canul, Saxon Knight:
Impact of the Physical Web and BLE Beacons. 53
C5: RIIT Posters
- Chad A. Arney, Xinli Wang:
Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort Rules. 54 - Marc J. Dupuis:
"Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being Compromised. 55
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.