Computer and Information Science
2020 - 2024
From Canadian Center of Science and Education Contact information at EDIRC. Bibliographic data for series maintained by Canadian Center of Science and Education (). Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 17, issue 2, 2024
- Opportunities for Using Machine Learning and Artificial Intelligence in Business Analytics pp. 1

- Conrad Onesime Oboulhas Tsahat, Ngoulou-A -Ndzeli and Charmolavy Goslavy Lionel Nkouka Moukengue
- Study of the Simulation and Application of the PEEC Method for Modeling the Prediction of Emissions Radiated by the Onboard Electronic Wiring System pp. 7

- Anthony Bassesuka Sandoka Nzao
- Proactively Defending Enterprise Computer Systems Against Threats and Vulnerabilities pp. 28

- Faris Sharaf, Abdullah Alhayajneh and Thaier Hayajneh
- Generative AI Increases Cybersecurity Risks for Seniors pp. 39

- Zahm Siyed
- Application and Innovation of Artificial Intelligence in Forensic Medicine pp. 52

- Minni Qi, Dan Zhou and Xiaojun Yu
- Reviewer Acknowledgements for Computer and Information Science, Vol. 17, No. 2 pp. 60

- Chris Lee
Volume 17, issue 1, 2024
- Expanding the Breadth of Ability in Artificial Intelligence Systems with Decision Trees pp. 1

- Andrew McInnis, Mohammad Alshibli, Ahmad Alzaghal and Samir Hamada
- On Preventing and Mitigating Cache Based Side-Channel Attacks on AES System in Virtualized Environments pp. 9

- Abdullah Albalawi
- A Model for Total Cost Determination in Open-Source Software Ownership: Case of Kenyan Universities’ Learning Management System pp. 18

- Duncan Kereu Kodhek, John Wachira Kamau and Faith Mueni Musyoka
- Principal Components and Assortativity-based Assessment of the Similarity of Crime Metrics across Coterminous Wards in the City of Chicago pp. 36

- Natarajan Meghanathan
- Ethical Implication of Artificial Intelligence (AI) Adoption in Financial Decision Making pp. 49

- Omoshola S. Owolabi, Prince C. Uche, Nathaniel T. Adeniken, Christopher Ihejirika, Riyad Bin Islam and Bishal Jung Thapa Chhetri
- Reviewer Acknowledgements for Computer and Information Science, Vol. 17, No. 1 pp. 57

- Chris Lee
Volume 16, issue 4, 2023
- The Evolution of Information Security Strategies: A Comprehensive Investigation of INFOSEC Risk Assessment in the Contemporary Information Era pp. 1

- Abdullah Al Hayajneh, Hasnain Nizam Thakur and Kutub Thakur
- Electronic Health System Integration Framework for Secure M-Health Services: A Case of University of Nairobi Hospital pp. 21

- Samuel Nandasaba, Gregory Wanyembi and Geoffrey Mariga Wambugu
- Malware Investigation and Analysis for Cyber Threat Intelligence: A Case Study of Flubot Malware pp. 47

- Uchenna J. Nzenwata, Frank Uchendu, Haruna Ismail, Eluwa M. Jumoke and Himikaiye O. Johnson
- Proposal of a Visualization System for a Hierarchical Clustering Algorithm: The Visualize Proximity Matrix pp. 65

- Sulaiman Abdullah Alateyah
- Applying AI in the Healthcare Sector: Difficulties pp. 78

- Abdussalam Garba, Muhammad Baballe Ahmad and Mukhtar Ibrahim Bello
- Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 4 pp. 84

- Chris Lee
Volume 16, issue 3, 2023
- Identifying and Navigating the Current Trends in Business Librarianship and Data Librarianship pp. 1

- Renee Pistone
- The Effect of the Educational Robot on the Motor Reaction on Some Karate Skills pp. 7

- Mohammed Asim Ghazi
- On the Convergence of Hypergeometric to Binomial Distributions pp. 15

- Upul Rupassara and Bishnu Sedai
- Improving the Classification Ability of Delegating Classifiers Using Different Supervised Machine Learning Algorithms pp. 22

- Basra Farooq Dar, Malik Sajjad Ahmed Nadeem, Samina Khalid, Farzana Riaz, Yasir Mahmood and Ghias Hameed
- Drawbacks of Traditional Environmental Monitoring Systems pp. 30

- Sadiku Aminu Sani, Amina Ibrahim, Abuhuraira Ado Musa, Muntaka Dahiru and Muhammad Ahmad Baballe
- Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 3 pp. 36

- Chris Lee
Volume 16, issue 2, 2023
- Studying the Effects of Being Einstein: An Experiment in Social Virtual Reality pp. 1

- Ian Cummins and Damian Schofield
- The Role of Machine Learning in the Detection and Classification of Brain Tumors: A Literature Review of the Past Two Years pp. 20

- Jianyi Wang
- From Zero to Infinity: Research on the Development Process of Intelligent Manufacturing pp. 29

- Chen Peng
- Suhail: A Deep Learning-Based System for Identifying Missing People pp. 36

- Wareef K. Aljohani, Reem A. Alshehri, Abrar A. Alghamdi, Mashael M. Aljuhani, Dareen A. Alrefaei, Rahaf S. Aljohani and Abdulqader M. Almars
- Automation-Based User Input Sql Injection Detection and Prevention Framework pp. 51

- Fredrick Ochieng Okello, Dennis Kaburu and Ndia G. John
- Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 2 pp. 63

- Chris Lee
Volume 16, issue 1, 2023
- A Reference Framework for Variability Management of Software Product Lines pp. 1

- Saiqa Aleem, Luiz Fernando Capretz and Faheem Ahmed
- Analysis of the Influence of the Earthing Resistance of Pylones on the Performance of the HVAC Line Facing Electromagnetic Transitories Lightning pp. 25

- Anthony Bassesuka Sandoka Nzao
- CNN Model for Sleep Apnea Detection Based on SpO2 Signal pp. 39

- Maryah Abdullah Albuhayri
- The Role of Digital Technologies in Combating Cyber-Trafficking in Persons Crimes pp. 49

- Sami Saad Alsemairi
- Simulation and Analysis of Fully Adiabatic Circuit Designing with Single Power Clock for High-Frequency Low-Power VLSI Circuits pp. 65

- Yashu Swami
- Reviewer Acknowledgements for Computer and Information Science, Vol. 16, No. 1 pp. 73

- Chris Lee
Volume 15, issue 4, 2022
- Uni-CARE: Universal Interface via Cloud Archive Repository Express pp. 1

- Sheldon Liang
- Analysis of Current Trends in Software Aging: A Literature Survey pp. 19

- Tajmilur Rahman, Joshua Nwokeji and Tejas Veeraganti Manjunath
- Objects Movement Detection Based on Impulsed Neural Network of the Analogue of the Biological Retinal Model pp. 46

- Ihar Yeuseyenka and Ihar Melnikau
- Analysis of Engineering Students Acceptance and Usage of 5G Technology: A Case Study of Gannon University pp. 57

- Jay Shah, Joshua Nwokeji, Tejas Veeraganti Manjunath and Tajmilur Rahman
- Security and Performance through Operating System Services; Development of an Anti-Hacking System pp. 66

- Sahar Badri and Daniyal Alghazzawi
- Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 4 pp. 80

- Chris Lee
Volume 15, issue 3, 2022
- Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning pp. 1

- Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala and Evelyn Sowells-Boone
- Social Media Behaviour Analysis in Disaster-Response Messages of Floods and Heat Waves via Artificial Intelligence pp. 18

- VÃctor Ponce-López and Catalina Spataru
- Integration of AI Supported Risk Management in ERP Implementation pp. 37

- Petya Biolcheva and Miglena Molhova
- Homogenous Multiple Classifier System for Software Quality Assessment Based on Support Vector Machine pp. 47

- Udoinyang G. Inyang, Olufemi S. Adeoye, Edward N. Udo, Edidiong F. Bassey, Enefiok A. Etuk, Fidelia N. Ugwoke and Emmanuel B. Usoro
- Using a Modified Technology Acceptance Model for a Learning Management System Platform: A Questionnaire Design for Evaluating the Blackboard Learning Management System pp. 61

- Hussain Mohammad Abu-Dalbouh
- Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 3 pp. 72

- Chris Lee
Volume 15, issue 2, 2022
- Darwinism & Other Crumbling Theories in Science pp. 1

- Nikolaos E Myridis
- A Brief Presentation of the Knowledge Paths for Semiotics (KPS) Project: Creating Digital Research Tools pp. 2

- Dimitra Sarakatsianou
- Out of the Box Artificial Intelligence (OBAI): The Beginning of a New Era in Artificial Intelligence pp. 6

- Satish Gajawada and Hassan M. H. Mustafa
- Transcendental Logic-Based Formalism for Semantic Representation of Software Project Requirements Architecture pp. 15

- Oleg V. Moroz, Oleksii O. Pysarchuk and Tetiana I. Konrad
- A Geometry Consisting of Singularities Containing Only Integers pp. 38

- Qing Li
- A Survey of Biometric Authentication Technologies Towards Secure And Robust Systems: A Case Study of Mount Kenya University pp. 43

- Boniface Mwangi Wambui, Joyce W Gikandi and Geoffrey Mariga Wambugu
- Efficient and Traceable Anonymous Credentials on Smart Cards pp. 58

- Wei Wu
- Multi-Issuer Attribute-based Anonymous Credential with Traceability and Revocation pp. 68

- Ye Yang
- Anomaly Detection Methodology of In-vehicle Network Based on Graph Pattern Matching pp. 78

- Mengsi Sun and Jiarun Wu
- Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 2 pp. 89

- Chris Lee
Volume 15, issue 1, 2022
- A Decision Support System for Undecided and Exploratory Students pp. 1

- Sobitha Samaranayake, Athula D. A. Gunawardena and Robert Meyer
- A New Method for Calculating Energy of Matter pp. 13

- Qing Li
- A Review of Factors Affecting the Effectiveness of Phishing pp. 20

- Robert Karamagi
- Divergence and Curl of COVID19 Spreading in the Lower Peninsula of Michigan pp. 32

- Yanshuo Wang
- VR Users Are More Relaxed and Optimistic during COVID Lockdown than Others pp. 47

- Erik Geslin and Erik Hammer
- MiniWarner: An Novel and Automatic Malicious Phishing Mini-apps Detection Approach pp. 57

- Junhan Chen
- Dual Fine-Grained Public-Key Searchable Encryption from Lattices pp. 66

- Zike Jiang and Shixin Chen
- Reviewer Acknowledgements for Computer and Information Science, Vol. 15, No. 1 pp. 81

- Chris Lee
| |