generated by bibbase.org
  2025 (1)
Artificial intelligence (AI) powered chatbots: factors in uptake among early adopters. Ju, B.; Stewart, J B.; Park, S.; and Walker, J. J Aslib Journal of Information Management. 2025.
link   bibtex  
  2023 (2)
Deep Learning Models for Opinion Mining Analysis. Cheikh, S.; Walker, J. J; Lydia, D.; and Ilyas, B. In 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), pages 1–6, 2023. IEEE
link   bibtex  
A study of COVID-19 information behaviors among Black Americans. Stewart, B. J; Ju, B.; and Walker, J. J Proceedings of the Association for Information Science and Technology, 60(1): 388–395. 2023.
link   bibtex  
  2022 (1)
Solving task scheduling problem in the cloud using a hybrid particle swarm optimization approach. Cheikh, S.; and Walker, J. J International Journal of Applied Metaheuristic Computing (IJAMC), 13(1): 1–25. 2022.
link   bibtex  
  2018 (3)
Build it and they will come? Patron engagement via Twitter at historically black college and university libraries. Stewart, B.; and Walker, J. The Journal of Academic Librarianship, 44(1): 118–124. 2018.
link   bibtex  
Data engineering 2.0 and United States workforce: Social implications of technology. Walker, J.; Rock, L.; and Harris, N. In SoutheastCon 2018, pages 1–1, 2018. IEEE
link   bibtex  
Developing a Crisis Informatics Ecosystem for Smart Cities: Geosciences and Remote Sensing. Walker, J.; Rock, L.; Ramos, C.; and Stewart, B. In SoutheastCon 2018, pages 1–1, 2018. IEEE
link   bibtex  
  2017 (1)
Hybrid Knowledge Mining Ecosystem. Ghosh, R.; Gonzalez, N.; Ramos, C.; Walker, J.; Gebre, A.; and Hasan, M. In Proceedings of the 9th International Conference on Management of Digital EcoSystems, pages 22–27, 2017.
link   bibtex  
  2016 (2)
Historically black colleges and university libraries’ utilization of Twitter for patron engagement: an exploratory study. Stewart, B.; and Walker, J. IConference 2016 Proceedings. 2016.
link   bibtex  
Open source cloud management platforms and hypervisor technologies: A review and comparison. Freet, D.; Agrawal, R.; Walker, J. J; and Badr, Y. SoutheastCon 2016,1–8. 2016.
link   bibtex  
  2015 (3)
Scenario-based design for a cloud forensics portal. Jackson, C.; Agrawal, R.; Walker, J.; and Grosky, W. In 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pages 1–6, 2015. IEEE
link   bibtex  
Cloud forensics challenges from a service model standpoint: IaaS, PaaS and SaaS. Freet, D.; Agrawal, R.; John, S.; and Walker, J. J In Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems, pages 148–155, 2015.
link   bibtex  
CC* DNI Campus Design: Developing a Scientific Research Network to Support Data-Driven Research at the University of Arkansas at Pine Bluff. Walker, J. J NSF Award Number 1541456. Directorate for Computer and Information Science and Engineering, 15(1541456): 41456. 2015.
link   bibtex  
  2014 (2)
A layer based architecture for provenance in big data. Agrawal, R.; Imran, A.; Seay, C.; and Walker, J. In 2014 IEEE International Conference on Big Data (Big Data), pages 1–7, 2014. IEEE
link   bibtex  
Engineering Intrusion Detection and Prevention Services for Hypervisor Cloud Computing Infrastructures (EIDP-HCCI). Walker, J. J NSF Award Number 1449411. Directorate for Computer and Information Science and Engineering, 14(1449411): 49411. 2014.
link   bibtex  
  2012 (3)
Cyber Security Concerns for Emergency Management. Walker, J. J 2012.
link   bibtex  
Plan Recognition in Intrusion Detection Systems Using Logic Programming. Chintabathina, S.; Walker, J; Villacis, J.; and Gomez, R In 2012 IEEE International Conference on Technologies for Homeland Security (HST), 2012. IEEE
link   bibtex  
E-learning using Cyberinfrastructure. Walker, J.; Swaid, S; and Mortazvi, M International Journal of Emerging Technologies in Learning (iJET), 7(2): 53–56. 2012.
link   bibtex  
  2011 (5)
Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments. Walker, J. J.; Jones, T.; Mortazavi, M.; and Blount, R. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2011 International Conference on Cyber-enabled distributed computing and knowledge discovery, pages 274–278, 2011. IEEE
link   bibtex  
Intrusion Detection for Ubiquitous & Pervasive Environments using Plan Recognition. J. J, W.; Aydin, K; Blount, R; and Jones, T. In 3rd International Conference on Emerging Ubiquitous Systems and Pervasive Networks, pages 1–4, 2011. JUSPN
link   bibtex  
Visualization, modeling and predictive analysis of cyber security attacks against cyber infrastructure-oriented systems. Walker, J. J; Jones, T.; and Blount, R. In 2011 IEEE International Conference on Technologies for Homeland Security (HST), pages 81–85, 2011. IEEE
link   bibtex  
Intrusion Detection for Ubiquitous & Pervasive Environments using Plan Recognition. Walker, J. J; Jones, T.; Blount, R.; and Aydin, K. J. Ubiquitous Syst. Pervasive Networks, 3(1): 1–5. 2011.
link   bibtex  
Watermarking the Cloud. Walker, J. J Computer Science & Information Systems, 13: 29. 2011.
link   bibtex  
  2010 (3)
Cyber security for emergency management. Walker, J.; Williams, B. J; and Skelton, G. W In 2010 IEEE International Conference on Technologies for Homeland Security (HST), pages 476–480, 2010. IEEE
link   bibtex  
Demonstration Project: Arkansas Minority Cyberinfrastructure Training, Education Consortium (AMC-TEC). Walker, J. J NSF Award Number 1041420. Directorate for Computer and Information Science and Engineering, 10(1041420): 41420. 2010.
link   bibtex  
Automatic Intrusion Detection and Response system for Cyberinfrastructure-Oriented Systems (AIDR-COS). Walker, J. J NSF Award Number 1063831. Directorate for Computer and Information Science and Engineering, 10(1063831): 63831. 2010.
link   bibtex  
  2008 (2)
The ARTSI Alliance: Recruiting Underrepresented Students to Computer Science and Robotics to Improve Society. Williams, A. B; Touretzky, D. S; Manning, L.; Walker, J. J; Boonthum, C.; Forbes, J.; and Doswell, J. T In AAAI Spring Symposium: Using AI to motivate greater participation in computer science, pages 110, 2008.
link   bibtex  
A Weighting Scheme for Security Patterns Using Mobile Agents. Walker, D.; and others VDM Verlag, 2008.
link   bibtex  
  2007 (1)
Collaborative Research: BPC-A: ARTSI: Advancing Robotics Technology for Social Impact. Walker, J. J NSF Award Number 0742098. Directorate for Computer and Information Science and Engineering, 7(742098): 42098. 2007.
link   bibtex  
  2006 (1)
Security patterns and a weighting scheme for mobile agents. Walker, J. J Ph.D. Thesis, The University of Iowa, 2006.
link   bibtex  
  2000 (1)
Unsafe at any key size. Walker, J. An analysis of the WEP encapsulation. 2000.
link   bibtex