Laszlo, M., Mukherjee, S. (2015). Iterated local search for microaggregation. Journal of Systems and Software. Volume 100. Pages 15-26.
Guillaume Mercère, Olivier Prot, and José Ramos. (2014). “Identification of parameterized gray-box state space systems: from a black-box linear time-invariant representation to a structured one,” IEEE Transactions on Automatic Control, vol. 59, no. 11, pp. 2873 - 2885.
Raigoza, J., Sun, J. (2014) Temporal join processing with the adaptive replacement cache – temporal data policy. Proceedings of 13th IEEE/ACIS International Conference on Computer and Information Science, June 4-6, 2014, pp. 131-136.
Raigoza, J. and Sun, J. (2014). Temporal join processing with hilbert curve space mapping. Proceedings of the 29th ACM Symposium on Applied Computing, March 24-28, 2014, pp. 839-844.
Snyder, M. M. & Dringus, L. P. (2014). An exploration of metacognition in asynchronous student-led discussions: A qualitative inquiry. Journal of Online Learning Consortium (formerly Asynchronous Learning Networks (JALN).
Marnell, J. W. &, Levy, Y. (2014). Towards a model of factors affecting resistance to using multi-method authentication systems in higher-education environments. Information Security Education Journal, 1(1), 36-44.
Mattord, H. J., Levy, Y., & Furnell, S. (2014). Factors for measuring password-based authentication practices. Journal of Information Privacy and Security, 10(2), 71-94. doi:10.1080/15536548.2014.924812
Lee, A., & Levy, Y. (2014). The effect of information quality on trust in e-government systems' transformation. Journal of Transforming Government: People, Process and Policy, 8(1), 76-100. doi:10.1108/TG-10-2012-0011
Yoas, D., Simco, G. (2014).Using Time-Series Analysis to Provide Long-Term CPU Utilization Prediction.Proceedings of ACM SIGIIT/RIIT 2014.
Yoas, D., Simco, G. (2014). Using Long Term-Prediction for Web Service Network Traffic Load. ITNG '14 Proceedings of the 2014 11th International Conference on Information Technology New Generations.
Terrell, S. (2014). The use of experiential learning styles to predict attrition from a limited residency information systems graduate program. The Online Journal of Applied Knowledge Management, 2(1), 1 – 10.
Lohle, M. & Terrell, S. (2014). Real projects, virtual worlds: coworkers, their avatars and the trust conundrum. The Qualitative Report, 19(15), 1-35.
Terrell, S. (2014). Introduction to the special issue of the American Educational Research Association's online teaching and learning special interest group (SIG-OTL). Internet in Higher Education.
Mason, J., Simco, G. (2013). Target Environment Simulation and its Impact on Architecture Validation. MTV '13 Proceedings of the 2013 14th International Workshop on Microprocessor Test and Verification.
Sun, J., Hong, J. (2013). Index selection: A query pattern mining approach. Proceedings of ACM 2013 Research in Adaptive and Convergent Systems, October 1-4, 2013, pp. 100-106.
Zhou, S., Sun, J. (2013). A novel approach for code match in iris recognition. Proceedings of 12th IEEE/ACIS International Conference on Computer and Information Science, June 16-20, 2013, pp. 123-128.
Yoas, D., Simco, G. (2013). Resource Utilization Prediction: Long Term Network Web Service Traffic. Proceedings of ACM SIGIIT/RIIT 2013.
Wilkins, D., Simco, G. (2013). Download Time Reduction Using Recent Performance- Biased Peer Replacement in Stochastic P2P Content Delivery Networks. Proceedings of MoWNet 2013.
Kevorkian, M., Simco, G. (2013). Improving Academic Quality in a Computer Science Program. Proceedings of WORLDCOMP 2013.
Ellis, T.J. (2013). The Impact of time on sense of community in an asynchronous learningn network. Proceedings of the 46th Hawaii International Conference on System Sciences. Piscatay, NJ:IEEE.
Haraty, R. A., Papadopou.los, A. N., and Sun, J. (2013) Editorial message: Special track on database theory, technology, and applications," in the Proceedings of The 2013 ACM Symposium on Applied Computing, pp. 817.
Scovetta, V. and Ellis, T.J. (2013). Defining leadership as an influence on KM success. Proceedings of the 46th Hawaii International Conference on System Sciences. Piscataway, NJ:IEEE.
Mattord, H. J.,Levy, Y.,& Furnell, S. (2013). Anexpert panel approach ondeveloping a unified systemauthenticationbenchmarking index (USA-BI).International Journal ofInterdisciplinaryTelecommunications andNetworking, 5(2), 32-42.doi:10.4018/jitn.2013040103
Levy, Y., Ramim, M. M., &Hackney, R.A. (2013).Assessing ethical severityof e-learning systemssecurity attacks.Journal ofComputer InformationSystems, 53(3), 75-84.
Mujeye, S., &Levy, Y.(2013). Complexpasswords: How far is toofar? The role of cognitiveload on employeeproductivity.Online Journalof Applied KnowledgeManagement, 1(1), 122-132.
Snyder, M.M. (2013). Kinetic art and transcendental phenomenological analysis. The Qualitative Report, 18 (Research Rookies 1)
Laszlo, M. & Mukherjee, S. (2013). Optimal univariate microaggregation with data suppression. Journal of Systems and Software. 86(3), 677–682.
Snyder, M.M., Dringus, L.P., & Terrell, S.R. (2012). Designing an online dissertation research community of practice. International Journal of Designs for Learning, 3(1), 39-51.
Tejay, G., and Zadig, S. (2012). "Investigating the Effectiveness of IS Security Countermeasures Towards Cyber Attacker Deterrence." Proceedings of the 45th Annual Hawaii International Conference on System Sciences (HICSS'12) 2012, Maui, Hawaii, USA, January 4-7, 2012.
Sun, J. (2012) Mining attribute association in query predicates for access path generation," in Proceedings of ACM 2012 Research in Applied Computation Symposium, pp. 106-111.
P. Lopes dos Santos, J. A. Ramos, and J. L. Martins de Carvalho. (2012). “Identification of a Benchmark Wiener-Hammerstein: A Bilinear and Hammerstein-Bilinear Model Approach,” Control Engineering Practice, Vol. 20, No. 11, pp. 1156 – 1164.
Hejazi(§), S.,& Levy, Y.(2012). The role of responsibility factors of reducing inefficiencies in IS projects on Six Sigma certification in service organizations.International Journal of Information Systems in the Service Sector,4(3), 1-28. doi:10.4018/jisss.2012070101
Nziga, Jean-Pierre & Cannady, James (2012) Minimal dataset for Network Intrusion Detection Systems via MID-PCA: A Hybrid Approach. IEEE Conference of Intelligent Systems 2012. pp.453-460
Levy, Y., & Ramim, M. M. (2012). A study of online exams procrastination using data analytics techniques.Interdisciplinary Journal of E-Learning and Learning Objects, 8, 97-113.***Earlier draft of this paper was therecipient ofThe Best Paper Awardin the Chais 2012 conference***
Yoas, D., Simco, G. (2012). Resource Utilization Prediction: A Proposal for Information Technology Research. Proceedings of ACM RIIT 2012, 25-30.
Heaton, B. & Mukherjee, S. (2012). Record ordering heuristics for disclosure control through microaggregation. ACEEE International Journal on Control System and Instrumentation, 3(1) 22–26.
Dringus, L.P. (2012, June). Learning analytics considered harmful. Journal of Asynchronous Learning Networks, 16(3), 87-100.
Schniederjans, D., Schniederjans, M., & Levy, Y. (2012). Equity theory based strategies for students on overcoming problems in Ph.D. dissertation committees. International Journal of Doctoral Studies, 7, 221-234.
Farid, W., & Mitropoulos, F.J. (2012). Novel lightweight engineering artifacts for modeling non-functional requirements in agile processes. Proceedings of IEEE SoutheastCon 2012.
Tribbey, W., & Mitropoulos, F.J. (2012). Construction and analysis of vector space models for use in aspect mining. Proceedings of the 50th Annual ACM Southeast Conference (ACMSE 2012), 220-225.
Edge, C., & Mitropoulos, F.J. (2012). Modularity tradeoffs with aspect-oriented web-tier security pattern implementations. Third Workshop on Empirical Evaluation of Software Composition Techniques (ESCOT 2012), AOSD 2012, Potsdam, Germany.
Terrell, S. (2012). Mixed-methods research methodologies, The Qualitative Report, 17(1).
Laszlo, M. & Mukherjee, S. (2011). A genetic algorithm for the constrained forest problem. ACEEE International Journal on Information Technology, 1(3), 47–51.
Tejay, G., and Shoraka, B. (2011). "Reducing Cyber Harassment Through de jure Standards: A study on the lack of the information security management standard adoption in the U.S." International Journal of Management and Decision Making, Special Issue on Cyber Harassment Impacts on Corporations and Corporate Valuation, Volume 11, Issue 5/6, pp 324-343.
P. J. Lopes dos Santos, T. P. Azevedo Perdicóulis, G. Jank , J. A. Ramos, and J. L. Martins de Carvalho. (2011). “Leakage detection and location in gas pipelines through an LPV identification approach,” Communications in Nonlinear Science and Numerical Simulation, Vol. 16, No. 12, pp. 4657 – 4665.
Parrish, J. L, Mitchell, R. B., Jensen, B. (2011). The Effect of Technology Choice on Message Form. Journal of Research in Business Information Systems, 4.
Levy, Y. & Ellis, T.J. (2011). A Guide for Novice Researchers on Experimental and Quasi-Experimental Studies in Information Systems Research. The Interdisciplinary Journal of Information, Knowledge, and Management, Volume 6, 151-161.
J. A. Ramos, A. Alenany, H. Shang, and P. J. Lopes dos Santos. (2011). “Subspace Algorithms for Identifying Separable in Denominator 2-D Systems with Deterministic Inputs,” IET Control Theory & Applications, Vol. 5, No. 15, pp. 1748 – 1765.
P. Lopes dos Santos, T. P. Azevedo-Perdicóulis, J. A. Ramos, J. L. Martins de Carvalho, G. Jank, and J. Milhinhos. (2011). “An LPV Modeling and Identification Approach to Leakage Detection in High Pressure Natural Gas Transportation Networks,” IEEE Transactions on Control Systems Technology, Vol. 19, No. 1, pp. 77 – 92.
Snyder, M.M. (2011). Intentional design of an online graduate course using Merrill's first principles: A case in progress. Proceedings of the Association of Educational Communications and Technology, Volume 2, 444-451.
Domínguez-Flores, N., & Wang, L. (2011). Online Learning Communities: Enhancing Undergraduate Students' Acquisition of Information Skills. The Journal of Academic Librarianship, 37(6), 495-503.
Tejay, G., and Lee, A.S. (2011). "A Theory Explaining How an Organization Can Live Up to the Letter, But Not the Spirit, of an Information Security Initiative." Proceedings of the Dewald Roode Workshop on Information Systems Security Research IFIP WG8.11/WG11.13, Blacksburg, Virginia, USA, September 23-24, 2011.
Wang, L. (2010). Integrating communities of practice in e-portfolio assessment: Effects and experiences of mutual assessment in an online course. The Internet and Higher Education, 13(4), 267-271.
Parrish, J. L. (2010). PAPA Knows Best: Ethical Guidelines for Social Networking Sites. Journal of Ethics in Information Technology, 12(2), 187-193.
Lehrfeld, M., Simco, G. (2010). Choke-Based Switching Algorithm inStochastic P2P Networks to Reduce File Download Duration. Proceedings of IEEE SoutheastCon 2010, 127-130.
Farhat, S., Simco, G., & Mitropoulos, F. J. (2010). Using Aspects for Testing
Nonfunctional Requirements in Object-Oriented Systems. Proceedings of IEEE SoutheastCon 2010, 356-359.
Cochran, Theodore & Cannady, James (2010) Not so fast flux networks for concealing scam servers. Fifth International Conference on Risks and Security of Internet and Systems. pp. 1-8
Cannady, James (2010). Detection of Distributed Attacks in Mobile Ad-hoc Networks using Self-organizing Temporal Neural Networks. Second International Conference on Agents and Artificial Intelligence (ICAART). pp. 229-234
Levy, Y., & Green (§), B. D. (2009). An empirical study of computer self-efficacy and the technology acceptance model in the military: A case of a U.S. Navy combat informationsystem.Journal of Organizational and End User Computing, 21(3), 1-23. doi:10.4018/joeuc.2009070101.
Parrish, J. L., Courtney, J. F. (2009). Churchman's Inquirers as Design Templates for Knowledge Management Systems: An Object Oriented Approach. Communications of the ACM, 52(7), 4.
P. L. dos Santos, J. A. Ramos, and J. Martins de Carvalho. (2009). “Identification of Bilinear Systems With White Noise Inputs: An Iterative Deterministic-Stochastic Subspace Approach,” IEEE Transactions on Control Systems Technology, Vol. 17, No. 5, pp. 1145 – 1153.
Terrell, S.R., Snyder, M.M., & Dringus, L.P. (2009). The development, validation, and application of the doctoral student connectedness scale. The Internet and Higher Education, 12, 112-116.
Farhat, S., Simco, G., & Mitropoulos, F. J. (2009). Refining and Reasoning about Nonfunctional Requirements. Proceedings of the 47th Annual ACM Southeast Conference (ACMSE 2009), 1-5.
P. Lopes dos Santos, J. A. Ramos and J. L. Martins de Carvalho. (2008). “Subspace identification of linear parameter varying systems with innovation-type noise models,” International Journal of Systems Science, Vol. 39, No. 9, pp. 897 – 911.
Laszlo, M. & Mukherjee, S. (2009). "Approximation Bounds for Minimum Information Loss Microaggregation". IEEE Transactions on Knowledge and Data Engineering, Volume 21, No. 11, 1643–1647.
Ramim, M. M., & Levy, Y. (2006). Securing e-learning systems: A case of insider cyber attacks and novice IT management in a small university. Journal of Cases on InformationTechnology, 8(4), 24-34. doi: 10.4018/jcit.2006100103
D’Eredita, M. and Barreto, C. (2006). “How does tacit knowledge proliferate? An episodic-based perspective,” Organization Studies, 27(12), 1821-1841.