Now showing items 1-5 of 5

    • Characteristics of malicious insiders and their relationships with different types of malicious attacks 

      Liang, Nan (2017-07)
      Malicious insiders continue to pose a great threat to organizations. With their knowledge and access to organizational resources, malicious insiders could launch attacks more easily that result in more damaging impacts ...
    • Examination of risks in AI/ML applications 

      Sharma, Madhav (2022-05)
      Artificial Intelligence (AI) and Machine Learning (ML) systems powered by Natural Language Processing (NLP) and Computer Vision (CV) are permeating across industries and in our daily lives. Due to novelty of technology, ...
    • Impact of inferred comorbidity networks on health outcomes 

      Kalgotra, Pankush (2017-07)
      High dimensionality in Big Data can be modeled using network approach. The traditional networks (e.g. online social network) are explicit and easily observed. However, there are certain networks that are implicit and exist ...
    • Leadership climate, attitudes, and evidence-based management behavior 

      Bosman, Michael (2015-12)
      There is a huge gap between knowing and doing in organizations. Why do organizations find it so difficult to bridge the gap between practice and research? evidence-based management is an approach that tries to bridge this ...
    • Look into Systemic Lupus Erythematosus diagnoses 

      Hickerson, Brittany (2020-05-05)
      An autoimmune disease or disorder occurs when the individual's immune system becomes confused and attacks/destroys healthy blood tissue by mistake (LFA). Now, in a perfect world, the immune system is supposed to protect ...