a |
Accessibility | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |
AI | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
AI Model | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
AI-based security systems | AI and Cybersecurity: Collaborator or Confrontation |
Approximate Query Processing | Error Assessment for Multi-Join AQP using Bootstrap Sampling |
Artificial Intelligence | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth |
Asymmetric Key | A Survey of Digital Security in Applications and Networking |
b |
Bard of Prey | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
Bike sharing system | Bike sharing systems via birth-death process and simulation modelling |
binary tree | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
birth-death process | Bike sharing systems via birth-death process and simulation modelling |
Blockchain | IoT with Blockchain: A New Infrastructure Proposal |
Boolean function | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
bootstrap sampling | Error Assessment for Multi-Join AQP using Bootstrap Sampling |
c |
Chatbot | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
ChatGPT | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
Cloud | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
communication | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |
Constant storage | Constant Storage for Storing Shortest Paths for a Polyhedron |
Cyber-Physical Systems | IoT with Blockchain: A New Infrastructure Proposal |
d |
Data Security | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
Deep Deterministic Policy Gradient | Rear-end Vehicle Collision Avoidance using Reinforced Learning |
digital signature | A Survey of Digital Security in Applications and Networking |
document categorization | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |
e |
ECC | The Implementations and Applications of Elliptic Curve Cryptography |
ECDH | The Implementations and Applications of Elliptic Curve Cryptography |
Education | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |
ElGamal | The Implementations and Applications of Elliptic Curve Cryptography |
Elliptic Curve | The Implementations and Applications of Elliptic Curve Cryptography |
Elliptic Curve Cryptography | The Implementations and Applications of Elliptic Curve Cryptography |
embeddings | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
Encryption | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
error estimation | Error Assessment for Multi-Join AQP using Bootstrap Sampling |
evaluating | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |
f |
Federated Learning | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth |
g |
generator | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
Google Bard | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
GPT | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
graph | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
h |
Homomorphic | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
human-centered design | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |
i |
interaction | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |
Internet of Things | IoT with Blockchain: A New Infrastructure Proposal |
k |
k-anonymity | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth |
key | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
l |
Large Language Models (LLMs) | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
Latency | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |
LFSR | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
m |
machine learning | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
Malware | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
Markov Network | Bike sharing systems via birth-death process and simulation modelling |
memoization | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
n |
Natural Language Processing | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
Natural Language Processing (NLP) | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
neural networks | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |
NIST | AI and Cybersecurity: Collaborator or Confrontation |
non-linearity | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
o |
OpenACC | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |
OpenAI | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
Optimization | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
p |
P2P networks | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |
parallel programming | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |
Petri nets | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |
Phishing | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
Point Operations | The Implementations and Applications of Elliptic Curve Cryptography |
polyhedron | Constant Storage for Storing Shortest Paths for a Polyhedron |
private key | A Survey of Digital Security in Applications and Networking |
pTree | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
public key | A Survey of Digital Security in Applications and Networking |
r |
rear-end collision | Rear-end Vehicle Collision Avoidance using Reinforced Learning |
recursion | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
Reinforcement Learning | Rear-end Vehicle Collision Avoidance using Reinforced Learning |
Residue class | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |
robot navigation | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |
RSA | A Survey of Digital Security in Applications and Networking |
s |
Script Kiddie | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
Security | A Survey of Digital Security in Applications and Networking |
Sentiment Analysis | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |
SHA | A Survey of Digital Security in Applications and Networking |
Shortest paths storing and retrieval | Constant Storage for Storing Shortest Paths for a Polyhedron |
simulation | Bike sharing systems via birth-death process and simulation modelling |
social networks | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |
star network | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |
t |
Tabulation | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
text classification | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |
text mining | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |
Timed Petri nets | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |
transformer | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
Twitter | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |
u |
user experience | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |
v |
Vector Database | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
z |
Zero Trust Security framework | AI and Cybersecurity: Collaborator or Confrontation |