Social software engineering

Results: 749



#Item
11INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 13:03:55
12Go to http://www.siu.edu/ Click on People Finder You may edit personal information by clicking on

Go to http://www.siu.edu/ Click on People Finder You may edit personal information by clicking on

Add to Reading List

Source URL: hr.siu.edu

Language: English - Date: 2015-03-23 16:32:01
13J. Mt. Sci): DOI: s11629e-mail:   http://jms.imde.ac.cn

J. Mt. Sci): DOI: s11629e-mail: http://jms.imde.ac.cn

Add to Reading List

Source URL: homepage.univie.ac.at

Language: English - Date: 2015-06-01 23:37:01
14INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

INFOGRAPHIC - MalwareBytes - Ransomware Infographic UPDATE

Add to Reading List

Source URL: pl.malwarebytes.com

Language: English - Date: 2016-07-07 13:05:33
15CE881-7-SP  MSc Progress Test Sample – Mobile and Social Application Programming Question 1 Suppose the following attribute declaration occurs in AndroidManifest.xml: <application android:label=" title="CE881-7-SP MSc Progress Test Sample – Mobile and Social Application Programming Question 1 Suppose the following attribute declaration occurs in AndroidManifest.xml: " class="img-responsive img-polaroid">

CE881-7-SP MSc Progress Test Sample – Mobile and Social Application Programming Question 1 Suppose the following attribute declaration occurs in AndroidManifest.xml:

Add to Reading List

Source URL: orb.essex.ac.uk

Language: English - Date: 2016-01-31 15:08:29
16Reverse Engineering Socialbot Infiltration Strategies in Twitter Carlos Freitas⇤ , Fabricio Benevenuto⇤ , Saptarshi Ghosh†‡ and Adriano Veloso⇤ † Max  ⇤ Universidade

Reverse Engineering Socialbot Infiltration Strategies in Twitter Carlos Freitas⇤ , Fabricio Benevenuto⇤ , Saptarshi Ghosh†‡ and Adriano Veloso⇤ † Max ⇤ Universidade

Add to Reading List

Source URL: socialnetworks.mpi-sws.org

Language: English - Date: 2015-09-14 09:16:28
17North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for State Agency Social Media Usage in North Carolina Version

North Carolina Office of the Governor North Carolina Office of Information Technology Services North Carolina Department of Cultural Resources Best Practices for State Agency Social Media Usage in North Carolina Version

Add to Reading List

Source URL: digitalpreservation.ncdcr.gov

Language: English - Date: 2016-05-02 15:16:04
18Dependency-based Topic-Oriented Sentiment Analysis in Microposts  Prasadith Buddhitha and Diana Inkpen University of Ottawa School of Information Technology and Engineering Ottawa, ON, K1N6N5, Canada

Dependency-based Topic-Oriented Sentiment Analysis in Microposts Prasadith Buddhitha and Diana Inkpen University of Ottawa School of Information Technology and Engineering Ottawa, ON, K1N6N5, Canada

Add to Reading List

Source URL: ceur-ws.org

Language: English - Date: 2015-10-12 18:58:30
19Web-Scale Workflow  Editor: Schahram Dustdar •  The Social Compute Unit Schahram Dustdar • Technical University of Vienna

Web-Scale Workflow Editor: Schahram Dustdar • The Social Compute Unit Schahram Dustdar • Technical University of Vienna

Add to Reading List

Source URL: www.infosys.tuwien.ac.at

Language: English - Date: 2011-05-02 06:45:21
20Phishing Simulation Programs A Higher Education Information Security Council (HEISC) Resource AprilHigher Education Information Security Council

Phishing Simulation Programs A Higher Education Information Security Council (HEISC) Resource AprilHigher Education Information Security Council

Add to Reading List

Source URL: library.educause.edu

Language: English - Date: 2016-04-07 15:30:18