Examining the End-user Perspective of Personal Computer Security: A Qualitative Q Methodology Study Subtitle
By : Neha Narayan
Book Info
Explainable Intrusion Detection Systems Using White Box Techniques Subtitle
By : Keshav Saha
Exploiting Structure for Scalable and Robust Deep Learning Subtitle
By : Yuvan Rajput
Exploiting Structure in Data: Sampling and Signal Processing on Graphs Subtitle
By : Prakash Ghosh
Exploratory Mixed-Method Study of Leadership Competencies Used to Transition Technical Cybersecurity Professionals Into First-Time Leaders Subtitle
By : Avni Bose
Exploring and Understanding Rural Educator Perceptions of a Video Conferencing Technology System through the UTAUT Lens Subtitle
By : Vaibhav Raman
Exploring Frontiers in Graph Learning Subtitle
By : Pranav Kashyap
Exploring Racial and Ethnic Differences in the Adoption of Health Technologies: A Comprehensive Study of Health Software Applications, Wearable Devices, and Online Health Resources Subtitle
By : Akanksha Dutta
Exploring Strategies to Establish a Big Data Integration and Harmonization Framework for National Identity Databases Subtitle
By : Madhura Deka
Exploring the Correlation of Municipal ICT Budget to Annual City-Visitor Counts and State Annual Tourism Income in the Southeastern United States of America: A Quantitative Study Subtitle
By : Deepa Kashyap