- Information and Cyber Security
- Advanced Malware Detection Techniques
- Software Engineering Research
- Big Data and Business Intelligence
- Political Influence and Corporate Strategies
- COVID-19 diagnosis using AI
- Disaster Management and Resilience
- Cybercrime and Law Enforcement Studies
- COVID-19 Pandemic Impacts
- Artificial Intelligence in Healthcare and Education
- Public Relations and Crisis Communication
- Topic Modeling
- Open Source Software Innovations
- Quality and Safety in Healthcare
- Wikis in Education and Collaboration
- Privacy, Security, and Data Protection
- Dental Research and COVID-19
- Scientific and Engineering Research Topics
- Organizational and Employee Performance
- Disaster Response and Management
- Smart Systems and Machine Learning
- Occupational Health and Safety Research
North Carolina State University
2022-2025
Florida Gulf Coast University
2024
King Saud University
2024
North Carolina Agricultural and Technical State University
2022-2023
North Central State College
2023
Florida International University
2022
Reusable software libraries, frameworks, and components, such as those provided by open-source ecosystems third-party suppliers, accelerate digital innovation. However, recent years have shown almost exponential growth in attackers leveraging these artifacts to launch supply chain attacks. Past well-known attacks include the SolarWinds, log4j, xz utils incidents. Supply are considered three major attack vectors: through vulnerabilities malware accidentally or intentionally injected into...
Executive order 14028 on improving the nation's cybersecurity highlights software bill of materials (SBOM) as an essential security practice for security. This article outlines top five benefits and challenges adopting SBOMs, identified by reviewing 200 Internet articles.
Abstract The purpose of the investigation was to evaluate utility ChatGPT, a state‐of‐the‐art language model developed by Open AI, in context civil engineering education. To achieve this objective, 44 students from large state university United States were recruited and asked respond three questions pertaining Construction Surveying Geomatics . then introduced ChatGPT provided with guidelines on how platform could be utilized for educational purposes, including obtaining answers like those...
The COVID-19 pandemic has been the largest global crisis in recent decades. Apart from countless deaths and health emergencies, disrupted several industries—including construction. For example, a significant number of construction projects have interrupted, delayed, even abandoned. In such information gathering dissemination are vital for effective management. role social media platforms as YouTube, Facebook, Twitter, sources, these contexts received much attention. purpose this...
Purpose Co nstruction Hazard Prevention through Design (CHPtD) is recognized as a pivotal strategy for enhancing workplace safety. Despite its theoretical potential, practical implementation faces challenges, particularly regarding designers' familiarity with field-level operations and hazard recognition. This study aims to investigate whether ChatGPT can address these challenges by assisting in recognition during CHPtD sessions. Design/methodology/approach The research utilized randomized...
Post-disaster reconstruction efforts are becoming increasingly more important with the increase in natural disasters recent years. These support rapid recovery and fundamental to resilience of impacted communities. However, such that involve complex activities difficult uncertain environments impose considerable health safety challenges. The challenges particularly heightened context developing nations lack necessary resources as compared their developed counterparts. An understanding these...
Security vulnerabilities can put users at risk if they do not promptly install necessary security updates. To minimize risk, software developers regularly release updates that address known or potential vulnerabilities. However, previous studies have revealed numerous reasons why may adopt Additionally, the National Vulnerability Database (NVD) demonstrated all types of are equally vulnerable to breaches. Therefore, this study investigates users' perceptions while delving into complex realm...
Software updates are essential to enhance security, fix bugs, and add better features existing software. However, while some users comply update their systems upon notification, non-compliance is common. Delaying or ignoring leaves exposed security vulnerabilities. Despite research efforts, users' noncompliance behavior with software still prevalent. In this study, we explored how psychological factors influence perception toward updates. addition, proposed a model assess the risk score...
The novel Coronavirus (COVID-19) pandemic has become a real challenge for healthcare providers around the world. Recently, it been recorded that among all health care professionals dentists, dental assistants, and hygienists are at high risk as they in close contact with patients exposed to body fluids of patients. To assess knowledge create awareness changes practice emergency non – procedures during COVID-19 interns. A cross-sectional study was conducted 100dental As time, web-based survey...
The COVID-19 pandemic is one of the biggest challenges world has faced in recent decades. disrupted human life significant ways. Similar to many other industries, construction industry numerous due pandemic. Some include project shutdowns, supply chain disruptions, health and safety challenges, delays, economic hardships. This study focused on unveiling workforce-related experienced during early stages investigation leveraged YouTube as source information given presence rich relevant...
Developers rely on open-source packages and must review dependencies to safeguard against vulnerable or malicious upstream code. A careful of all changes often does not occur in practice. Therefore, developers need signals inform dependency that require additional examination. The goal this study is help prioritize efforts by analyzing contributor reputation measures as a signal. We use network centrality proxy using collaboration activity. employ mixed method methodology from the top 1,644...
In 2023, Sonatype reported a 200\% increase in software supply chain attacks, including major build infrastructure attacks. To secure the chain, practitioners can follow security framework guidance like Supply-chain Levels for Software Artifacts (SLSA). However, recent surveys and industry summits have shown that despite growing interest, adoption of SLSA is not widespread. understand challenges, \textit{the goal this study to aid authors improving development Supply-Chain (SLSA) through...
This study compares the information foraging behavior of developers on two prominent platforms, StackOverflow and GitHub, which are widely used for code hosting question answer purposes. Understanding how seek retrieve is crucial designing effective interfaces. In a gender expertise-balanced involving 12 developers, we utilized Information Foraging Theory to analyze their behavior. Our findings revealed contrasting patterns, with women spending 30% more time utilizing 21.24% cues while men...