DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT : C Continued : Part Two




.

.

GOOGLE SITES CIS RESEARCH GUIDE SITE MAP DATABASES

 

AMOUNT OF CIS CONTENT IN A WIDE RANGE OF DATABASES 
WITH CONTENT SAMPLES FOR SOME

 

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE 
FROM SELECTED SEARCH ENGINES DISCOVERY TOOLS

http://tinyurl.com/ya4oggx9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   A THROUGH  B

http://tinyurl.com/ydg8z52h

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C   PART ONE

http://tinyurl.com/y9my4ppp

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   C    PART TWO

http://tinyurl.com/yc4sfdta

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   D

http://tinyurl.com/yay8pkc3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:   E    PART ONE

http://tinyurl.com/ydamheob

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:    E    PART TWO

http://tinyurl.com/y72w6xq6

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT:     F THROUGH G

http://tinyurl.com/ydbxj5o7

 


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT: 
H THROUGH INGENTA
 

http://tinyurl.com/y9vj85y6

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    INSPEC THROUGH  L

http://tinyurl.com/yaxurho3

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    M THROUGH MLA

http://tinyurl.com/yct8k9o9

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    MLA THROUGH N

http://tinyurl.com/ydeyt2d7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   O

http://tinyurl.com/y8kh4r5u

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART ONE

http://tinyurl.com/ybe63hl7

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :   P   PART TWO
POLLUTION THROUGH PROQUEST STATISTICAL INSIGHT

http://tinyurl.com/y9s24mth

 

 

DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT :    PSY THROUGH PZ

http://tinyurl.com/ydgwy6zp

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:   R

http://tinyurl.com/yapzpw7a

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:    S THROUGH SCOPUS

http://tinyurl.com/ydylk7f2

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:
SEARCH.BIOPREPRINT THROUGH SZ

http://tinyurl.com/y8aajt3x

 

 

DATABASES USEFUL FOR COMPUTER SCIENCE AND INFORMATION SCIENCE RESEARCH:     T THROUGH Z

http://tinyurl.com/ya2qprg5

 

 

 




.


DATABASE SEARCH RESULTS FOR COMPUTER AND INFORMATION SCIENCE CONTENT : C Continued : Part Two

LETTER C CONTINUED


*

*

*

C   CONTINUED

*
Search Strategy

"computer science" OR "information science" OR "computer programming" OR informatics
OR "data management" OR "information security" OR "network security" OR forensics OR
"visual computing" OR "data mining" OR "machine learning" OR "multimedia databases"
OR "artificial intelligence"

*

*

Communication Abstracts

Results: 11,350


CONTENT SAMPLE


What algorithms want: imagination in the age of computing.
Review
By: Fu, Tao. Information, Communication & Society, 
Dec 2018, Vol. 21 Issue 12, p1849-1851, 3p; 
DOI: 10.1080/1369118X.2017.1409785


*


We are data: algorithms and the making of our digital selves.
Review
By: Melanson, Sophia. Information, Communication & Society, 
Dec 2018, Vol. 21 Issue 12, p1852-1854, 3p; 
DOI: 10.1080/1369118X.2017.1413124


*


Bring your own device in organizations: 
Extending the reversed IT adoption logic to security paradoxes 
for CEOs and end users.
Academic Journal
By: Baillette, Paméla; Barlette, Yves; Leclercq-Vandelannoitte, Aurélie.  
International Journal of Information Management, Dec2018, Vol. 43, p76-84, 9p; 
DOI: 10.1016/j.ijinfomgt.2018.07.007


*


Management theory and big data literature: From a review to a research agenda.
Academic Journal
By: De Camargo Fiorini, Paula; Roman Pais Seles, Bruno Michel; Chiappetta Jabbour, 
Charbel Jose; Barberio Mariano, Enzo; De Sousa Jabbour, Ana Beatriz Lopes. 
International Journal of Information Management, 
Dec 2018, Vol. 43, p112-129, 18p; DOI: 10.1016/j.ijinfomgt.2018.07.005


*


Developing human resource data risk management in the age of big data.
Academic Journal
By: Calvard, Thomas Stephen; Jeske, Debora. 
International Journal of Information Management, 
Dec 2018, Vol. 43, p159-164, 6p; DOI: 10.1016/j.ijinfomgt.2018.07.011


*


Understanding key skills for information security managers.
Academic Journal
By: Haqaf, Husam; Koyuncu, Murat. 
International Journal of Information Management,  
Dec 2018, Vol. 43, p165-172, 8p; DOI: 10.1016/j.ijinfomgt.2018.07.013


*


Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory
Academic Journal
By: Henriques De Gusmão, Ana Paula; Mendonça Silva, Maisa; Poleto, Thiago; 
Camara E Silva, Lúcio; Cabral Seixas Costa, Ana Paula. 
International Journal of Information Management, Dec2018, Vol. 43, p248-260, 13p; 
DOI: 10.1016/j.ijinfomgt.2018.08.008


*


A case analysis of securing organisations against information leakage 
through online social networking.
Academic Journal
By: Abdul Molok, Nurul Nuha; Ahmad, Atif; Chang, Shanton. 
International Journal of Information Management, 
Dec 2018, Vol. 43, p351-356, 6p; DOI: 10.1016/j.ijinfomgt.2018.08.013



*


An abstractive Arabic text summarizer with user controlled granularity.
Academic Journal
By: Azmi, Aqil M.; Altmami, Nouf I.. Information Processing & Management, 
Nov 2018, Vol. 54 Issue 6, p903-921, 19p; DOI: 10.1016/j.ipm.2018.06.002


*


A deep network model for paraphrase detection in short text messages.
Academic Journal
By: Ramampiaro, Heri; Langseth, Helge; Agarwal, Basant; Ruocco, Massimiliano. 
Information Processing & Management, Nov2018, Vol. 54 Issue 6, p922-937, 16p; 
DOI: 10.1016/j.ipm.2018.06.005


*


Analyzing the discriminative attributes of products 
using text mining focused on cosmetic reviews.
Academic Journal
By: Kim, Sung Guen; Kang, Juyoung. Information Processing & Management, 
Nov 2018, Vol. 54 Issue 6, p938-957, 20p; DOI: 10.1016/j.ipm.2018.06.003


*

*

Compendex

Inspec  





Engineering Village

2,769,822 Results


CONTENT SAMPLE



Study on the computer forensics algorithm
in mass data process based on data mining

Wu, Chunqiong (Yango University, Fuzhou Fujian; 350015, China) 
Source: Boletin Tecnico/Technical Bulletin
v 55, n 18p 267-274November 15, 2017
Database:Compendex
Document type:Journal article (JA)












*


Critical review of machine learning approaches to apply
big data analytics in DDoS forensics

Hoon, Kian Son (Faculty of Computer Science and Information Technology, 
Universiti Malaysia, Sarawak, Malaysia); 
Yeo, Kheng Cher; Azam, Sami; Shunmugam, Bharanidharan; De Boer, Friso 
Source: 2018 International Conference on Computer Communication and Informatics,
ICCCI 2018
August 20, 2018
2018 International Conference on Computer Communication and Informatics, ICCCI 2018
Database:Compendex
Document type:Conference article (CA)















*


Toward effective and reliable digital forensics

Mazurczyk, W. (Inst. of Telecommun., Warsaw Univ. of Technol., Warsaw, Poland); 
Szczypiorski, K. Source: Computer Journalv 55, n 6p 651-2June 2012
Database:Inspec
Document type:Journal article (JA)









*


Data mining techniques to facilitate digital forensics investigations

Lopez, E.M. (Dept. of Comput. Sci. & Eng., Seoul Nat. Univ. of Sci. & Technol., 
Seoul, Korea, Republic of); Yoon Ho Kim; Jong Hyuk Park Source: 
Advances in Computer Science and Ubiquitous Computing, CSA-CUTE 2016: LNEE 421p 376-92017








*


A Quantitative Approach to Triaging in Mobile Forensics

Marturana, F. (Dept. of Comput. Sci., Syst. & Production, 
Univ. of Rome Tor Vergata, Rome, Italy); Me, G.; Berte, R.; Tacconi, S. 
Source: Proceedings of the 2011 International Joint Conference of IEEE TrustCom-11/
IEEE ICESS-11/FCST-11 (TrustCom 2011)p 582-82011
Database:Inspec
Document type:Conference article (CA)












*


An IP Traceback Protocol using a Compressed Hash Table,
a Sinkhole Router and Data Mining based
on Network Forensics against Network Attacks

EunHee Jeong (Dept. of Regional Econ., Kangwon Nat. Univ.,
Samcheok, Korea, Republic of); ByungKwan Lee 
Source: Future Generation Computer Systemsv 33p 42-52April 2014
Database:Inspec
Document type:Journal article (JA)













*


Data mining method based on computer forensics-based ID3 algorithm

Lu Qin (Dept. of Inf. Sci. & Technol., East China Univ. of Political Sci. & Law, Shanghai, China) 
Source: 2010 2nd IEEE International Conference on Information Management and Engineering
(ICIME 2010)
p 4 pp.2010
Database:Inspec
Document type:Conference article (CA)











*


Video Forensics in Temporal Domain using Machine Learning Techniques

Jaiswal, S. (Defence Inst. of Adv. Technol., Pune, India); Dhavale, S. Source: 
International Journal of Computer Network and Information Securityv 5, n 9p 58-67July 2013
Database:Inspec
Document type:Journal article (JA)









*


Computer forensics based on data mining

Zhang Guan-Zhu (Binzhou Polytech., Binzhou, China) 
Source: Applied Mechanics and Materialsv 536-537p 371-52014
Database:Inspec
Document type:Journal article (JA)










*


A Median Filtering Forensics Approach Based on Machine Learning
Bin Yang (Sch. of Design, Jiangnan Univ., Wuxi, China); Zhenyu Li; Weifeng Hu; Enguo Cao 
Source: Cloud Computing and Security. Third International Conference, ICCCS 2017. 
Revised Selected Papers: LNCS 10603, p 518-27, 2017
Database:Inspec
Document type:Conference article (CA)





*


Computing Reviews 
200 Results 


*

Contemporary Women's Issues 
58,693 Results

Content Types

  • Magazines(12,616)
  • Academic Journals(12,275)
  • Books(127)
  • News(32,587)
  • Images(3)
  • Videos(3)



    CONTENT SAMPLE



    Full-text: 
    ARTICLE
    Straight Ai Students--
    Universities Dominate Artificial Intelligence Recruitment
    Database and Network Journal.
    48.3 (June 2018) p9.


    Full-text: 
    ARTICLE
    Allied Market Research Offers Report on the Artificial Intelligence
    as a Service (AIaaS) Market
    Manufacturing Close-Up.
    (Sept. 26, 2018) 


    Full-text: 
    BRIEF ARTICLE
    Eyenuk Introduces EyeArt Artificial Intelligence
    Eye Screening for Diabetic Retinopathy
    Professional Services Close-Up.
    (Oct. 17, 2018) 


    Full-text: 
    ARTICLE
    The State of Artificial Intelligence Around the Globe
    David Skerrett.EContent.
    41.3 (Summer 2018) p14+.



    Full-text: 
    ARTICLE
    SHOP MARKETING FOR ARTIFICIAL INTELLIGENCE:
    "Good data" in AI leads to successful marketing
    David Rogers.Motor Age.
    137.8 (Aug. 2018)





    395 results for "computer science" OR "information science" OR "computer programming"
    OR informatics OR "data management" OR "information security" OR "network security"
    OR forensics OR "visual computing" OR "data mining" OR "machine learning"
    OR "multimedia databases" OR "artificial intelligence"



    *

    CQ Researcher 
    219 results


    *


    CQ Weekly 
    Results 159


    *


    CRCnetBASE contains science, technology, and medical eBooks from the Taylor & Francis Group.
    Results:  17248



    *


    Criminal Justice Abstracts

    Results: 43,136

    CONTENT SAMPLE


    The Academy at 50: past, present and future
    Academic Journal
    By: Robertson, James. Australian Journal of Forensic Sciences. 
    Dec 2018, Vol. 50 Issue 6, p593-595. 3p. 
    DOI: 10.1080/00450618.2018.1510382.


    *

    Forensic science 2020 - the end of the crossroads?
    Academic Journal
    By: Roux, Claude; Ribaux, Olivier; CRISPINO, Frank. 
    Australian Journal of Forensic Sciences. 
    Dec 2018, Vol. 50 Issue 6, p607-618. 12p. 
    DOI: 10.1080/00450618.2018.1485738.


    *

    Clear communication through clear purpose: 
    understanding statistical statements made by forensic scientists.
    Academic Journal
    By: Martire, Kristy A. Australian Journal of Forensic Sciences. 
    Dec 2018, Vol. 50 Issue 6, p619-627. 9p. 
    DOI: 10.1080/00450618.2018.1439101.

    *

    It’s all about the context: reflections on the changing role 
    of forensic anthropology in medico-legal death investigations.
    Academic Journal
    By: Blau, Soren. Australian Journal of Forensic Sciences. 
    Dec 2018, Vol. 50 Issue 6, p628-638. 11p. 
    DOI: 10.1080/00450618.2017.1422022.


    *

    Humanitarian forensic science.
    Academic Journal
    By: Cordner, Stephen. Australian Journal of Forensic Sciences. 
    Dec 2018, Vol. 50 Issue 6, p639-650. 12p. 
    DOI: 10.1080/00450618.2018.1461930.


    *


    Person-portable equipment in environmental forensic investigations: 

    application to fire scenes.

    Academic Journal

    By: Lam, Rylee; Lennard, Chris; Kingsland, Graham; Johnstone, Paul; 

    Symons, Andrew; Wythes, Laura; Fewtrell, Jeremy; O’Brien, David; 

    Spikmans, Val. Australian Journal of Forensic Sciences. 

    Dec 2018, Vol. 50 Issue 6, p672-681. 10p. 

    DOI: 10.1080/00450618.2018.1424242.



    *


    Enhancing forensic investigation 
    through the use of modern three-dimensional (3D) imaging technologies 
    for crime scene reconstruction.
    Academic Journal
    By: Raneri, Domenic. Australian Journal of Forensic Sciences. 
    Dec 2018, Vol. 50 Issue 6, p697-707. 11p. 
    DOI: 10.1080/00450618.2018.1424245.


    *


    A framework for estimating information security risk assessment method completeness.
    Academic Journal
    By: Wangen, Gaute; Snekkenes, Einar; Hallstensen, Christoffer. 
    International Journal of Information Security. 
    Nov 2018, Vol. 17 Issue 6, p681-699. 19p. DOI: 10.1007/s10207-017-0382-0.


    *


    Towards a ‘smart’ cost-benefit tool: using machine learning 
    to predict the costs of criminal justice policy interventions.
    Academic Journal
    By: Manning, Matthew; Wong, Gabriel T. W.; Graham, Timothy; 
    Ranbaduge, Thilina; Cristen, Peter; Taylor, Kerry; 
    Wortley, Richard; Makkai, Toni; Skorich, Pierre. 
    Crime Science. 10/12/2018, Vol. 7 Issue 1, p1-1. 1p. 
    DOI: 10.1186/s40163-018-0086-4.


    *



    Jurors' perceptions of forensic science expert witnesses: 
    Experience, qualifications, testimony style and credibility.
    Academic Journal
    By: McCarthy Wilcox, A.; NicDaeid, N. Forensic Science International. 
    Oct 2018, Vol. 291, p100-108. 9p. DOI: 10.1016/j.forsciint.2018.07.030.


    *

    Current Contents Connect (1998-present)

    Results: 119,714


    CONTENT SAMPLE



    A Multimodal Deep Learning Method for Android Malware Detection Using Various Features
    By: Kim, TaeGuen; Kang, BooJoong; Rho, Mina; et al.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY  
    Volume: 14   Issue:   Pages: 773-788   Published: MAR 2019



    Classification of ransomware families with machine learning based on N-gram of opcodes
    By: Zhang, Hanqi; Xiao, Xi; Mercaldo, Francesco; et al.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE  Volume: 90   Pages: 211-221  Published: JAN 2019



    A Real-time Linked Dataspace for the Internet of Things: Enabling "Pay-As-You-Go" Data Management in Smart Environments
    By: Curry, Edward; Derguech, Wassim; Hasan, Souleiman; et al.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE  
    Volume: 90   Pages: 405-422  Published: JAN 2019




    CPS data streams analytics based on machine learning for Cloud and Fog Computing: A survey
    By: Fei, Xiang; Shah, Nazaraf; Verba, Nandor; et al.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE  
    Volume: 90   Pages: 435-450  Published: JAN 2019




    A context-sensitive offloading system using machine-learning classification algorithms for mobile cloud environment
    By: Junior, Warley; Oliveira, Eduardo; Santos, Albertinin; et al.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE  Volume: 90   Pages: 503-520  Published: JAN 2019






    David Dillard


     

    NET-GOLD

    http://groups.yahoo.com/group/net-gold

    https://groups.io/org/groupsio/net-gold/archives

    http://net-gold.3172864.n2.nabble.com/

     

    Research Guides

    https://sites.google.com/site/researchguidesonsites/

     

     

    Research Paper Writing

    https://sites.google.com/site/howtowriteasuperresearchpaper/
    Employment

    https://sites.google.com/site/employmentsources/

    Internships

    https://sites.google.com/site/internshipsarticles/

    Hospitality

    https://sites.google.com/site/hospitalitydatabasesandtools/


    Disabilities And Employment

    https://sites.google.com/site/disabilitynetsources/Home/employment-and-disabilities

    Indoor Gardening

    https://groups.yahoo.com/neo/groups/indoorgardeningurban/info

    Educator-Gold

    http://groups.yahoo.com/group/educator-gold/

    K12ADMINLIFE

    http://groups.yahoo.com/group/k12adminlife/

     

    Public Health Resources Including Ebola

     

    Blog

    https://educatorgold.wordpress.com/

     

    Research Guide:

    Information Literacy

    http://tinyurl.com/78a4shn

     

    Twitter: davidpdillard

     

    Bushell, R. & Sheldon, P. (Eds),

    Wellness and Tourism: Mind, Body, Spirit,

    Place, New York: Cognizant Communication Books.

    Wellness Tourism: Bibliographic and Webliographic Essay

    David P. Dillard

    http://tinyurl.com/p63whl

     

    Railtram Discussion Group

    from the union pacific to britrail and beyond

    https://groups.yahoo.com/neo/groups/railtram/info

     

    Indoor Gardening

    improve your chances for indoor gardening success

    http://tech.groups.yahoo.com/group/indoorgardeningurban/

     

    Sport-Med

    https://www.jiscmail.ac.uk/lists/sport-med.html

    http://groups.yahoo.com/group/sports-med/


     

    Health Diet Fitness Recreation Sports Tourism

    https://groups.yahoo.com/neo/groups/healthrecsport/info


     

     

     

     

     

     

    .

     

    .

     

    Please Ignore All Links to JIGLU

    in search results for Net-Gold and related lists.

    The Net-Gold relationship with JIGLU has

    been terminated by JIGLU and these are dead links.

    http://groups.yahoo.com/group/Net-Gold/message/30664

    http://health.groups.yahoo.com/group/healthrecsport/message/145


     

    .

     

    .

     

    Comments