IT Professional

Papers
(The TQCC of IT Professional is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
Toward a Quantum Software Engineering62
Web 3.0 and the Metaverse Shaping Organizations’ Brand and Product Strategies51
Intrusion Detection System Through Advance Machine Learning for the Internet of Things Networks47
The Evolution of Nonfungible Tokens: Complexity and Novelty of NFT Use-Cases46
Deep Learning-Based COVID-19 Detection Using CT and X-Ray Images: Current Analytics and Comparisons45
Digital Twins: Properties, Software Frameworks, and Application Scenarios38
Taking on the “Dark Side”––Coping With Technostress34
Scarcity and Global Insecurity: The Semiconductor Shortage33
A QoS-Aware Technique for Computation Offloading in IoT-Edge Platforms Using a Convolutional Neural Network and Markov Decision Process32
Real-Time Diagnosis System of COVID-19 Using X-Ray Images and Deep Learning31
A Machine-Learning-Based Approach for Autonomous IoT Security30
Fake News and Misinformation During the Pandemic: What We Know and What We Do Not Know30
Building Digital Twins of Cyber Physical Systems With Metaverse for Industry 5.0 and Beyond30
Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI)28
Policy, Ethical, Social, and Environmental Considerations of Web3 and the Metaverse25
A Review of Artificial Intelligence's Neural Networks (Deep Learning) Applications in Medical Diagnosis and Prediction22
Simulation-Based Training via a “Readymade” Virtual World Platform: Teaching and Learning With Minecraft Education19
The Metaverse and Higher Education Institutions17
The Economics of the Industrial Metaverse16
Blockchain-Based Smart Contracts to Provide Crop Insurance for Smallholder Farmers in Developing Countries16
A Novel Framework for Smart Systems Using Blockchain-Enabled Internet of Things15
Bridging K–12 Mathematics and Computational Thinking in the Scratch Community: Implications Drawn From a Creative Learning Context14
Digital Scent Technology: Toward the Internet of Senses and the Metaverse14
Economics of Artificial Intelligence in Cybersecurity14
COVID-19 Fake News Detection Using Ensemble-Based Deep Learning Model13
Virtual Dimension—A Primer to Metaverse12
ChatGPT in Developing Economies12
The 5G Revolution: Expectations Versus Reality12
Smart Cities in China: A Brief Overview12
Software, Sustainability, and UN Sustainable Development Goals12
Intelligent Traffic Signal Automation Based on Computer Vision Techniques Using Deep Learning12
Cybercrime and Privacy Threats of Large Language Models12
Metaverse and Developing Economies12
Life, IoT, and the Pursuit of Happiness11
COVID-19 Detection Using Integration of Deep Learning Classifiers and Contrast-Enhanced Canny Edge Detected X-Ray Images11
A Transparent and Traceable Coverage Analysis Model for Vaccine Supply-Chain Using Blockchain Technology11
A Three-Pronged View on Organizational Agility11
Educating Minoritized Students in the United States During COVID-19: How Technology Can be Both the Problem and the Solution10
Enhancing Artificial Intelligence Decision Making Frameworks to Support Leadership During Business Disruptions10
Low-Code, No-Code, What's Under the Hood?10
Ransomware as a Business (RaaB)10
Elastic Resilience for Software-Defined Satellite Networking: Challenges, Solutions, and Open Issues9
What If Ethics Got in the Way of Generative AI?9
DeFakePro: Decentralized Deepfake Attacks Detection Using ENF Authentication9
Hello Quantum! How Quantum Computing Will Change the World8
Deep Fake Generation and Detection: Issues, Challenges, and Solutions8
Docker Swarm and Kubernetes Containers for Smart Home Gateway8
Data Labeling for the Artificial Intelligence Industry: Economic Impacts in Developing Countries7
Masterminds of Deep Learning7
Financial Technology in Latin America7
On the Use of Blockchain Technology for Education During Pandemics7
Alleviating Challenges Related to FDA-Approved Medical Wearables Using Blockchain Technology7
Technology-Enhanced Educational Escape Rooms: A Road Map7
Global Requirement Engineering Through Secondary Market Research: Lessons From Real Consulting Projects6
Trusted Platform Module-Based Privacy in the Public Cloud: Challenges and Future Perspective6
How Machine Learning May Prevent the Breakdown of Democracy by Contributing to Fake News Detection6
Explainable Artificial Intelligence for Smart Grid Intrusion Detection Systems6
International Comparative Studies on the Software Testing Profession6
Misinformation Detection on Social Media: Challenges and the Road Ahead6
Aerial Data Aiding Smart Societal Reformation: Current Applications and Path Ahead6
Smart Waste Management Using Blockchain6
Strategic Prototyping Technology Adoption in Startups: Framework, Challenges, and Opportunities6
Bug, Fault, Error, or Weakness: Demystifying Software Security Vulnerabilities6
Software Development Process Assessment With MMIS v.2, an ISO/IEC 33000-Based Model5
Resilience in Smart City Applications: Faults, Failures, and Solutions5
Digital Health and Artificial Intelligence: Advancing Healthcare Provision in Latin America5
Generalized Deepfake Video Detection Through Time-Distribution and Metric Learning5
Sensing-Based Analytics in Education: The Rise of Multimodal Data Enabled Learning Systems5
Detecting Drift in Deep Learning: A Methodology Primer5
Evaluating the Effect of Human Factors on Big Data Analytics and Cloud of Things Adoption in the Manufacturing Micro, Small, and Medium Enterprises5
Improved Generalization for Secure Personal Data Publishing Using Deviation5
Low-Code Versus Code-Based Software Development: Which Wins the Productivity Game?5
Collaboration of Digital Twins Through Linked Open Data: Architecture With FIWARE as Enabling Technology5
Adversarial Attacks and Defenses for Deployed AI Models4
Reversible Computing in Debugging of Erlang Programs4
Bitcoin's Adoption as Legal Tender: A Tale of Two Developing Countries4
A Supervised-Learning-Based Garbage Collection in Solid-State Drives (SSDs)4
Benefit From the Internet of Things Right Now by Accessing Dark Data4
Power and Performance Efficient SDN-Enabled Fog Architecture4
A Decentralized Cooperative Navigation Approach for Visual Homing Networks4
Implementing Behavioral Biometrics With TRUST4
Economics of Supply Chain Cyberattacks4
Generative Artificial Intelligence in Marketing4
Trust Considerations in Open Banking4
On the Generation of E-Learning Resources Using Business Process, Natural Language Processing, and Web Services4
The AI-Cybersecurity Nexus: The Good and the Evil4
Resiliency by Retrograded Communication-the Revival of Shortwave as a Military Communication Channel4
A Practical Anonymization Approach for Imbalanced Datasets4
Multimodal AI to Improve Agriculture4
Formal Methods Boost Experimental Performance for Explainable AI4
Investigate Financial Crime Patterns Using Graph Databases4
Metaverse or Metaworst with Cybersecurity Attacks4
Online Feedback Management Tools for Early-Stage Startups: Hidden Treasures in the Rocky Mountains3
SpoofCatch: A Client-Side Protection Tool Against Phishing Attacks3
An Approximate Fault-Tolerance Design for a Convolutional Neural Network Accelerator3
Smart Contracts in the Global South3
Blockchain: A Privacy Centered Standard for Corporate Compliance3
Open Source Software as the Main Driver for Evolving Software Systems Toward a Distributed and Performant E-Commerce Platform: A Zalando Fashion Store Case Study3
A Process Model for Service-Oriented Development of Embedded Software Systems3
From Human-AI Confrontation to Human-AI Symbiosis in Society 5.0: Transformation Challenges and Mechanisms3
Economics of the Internet of Things in Sub-Saharan Africa3
Evolutionary Consideration on User Authentication: Security, Privacy, and Safety3
Connecting Dots Between Entrepreneurs, Research Publishers, and Software Engineering Researchers: An Outcome of Mixed Methods Empirical Research3
Information Hygiene: The Fight Against the Misinformation “Infodemic”3
A Pilot Study on Online-Education Supportive Tools in COVID-19 Context3
An Energy-Aware Path Enumeration Solution Based on the Path Algebra Framework3
Modernizing Legacy Software as Context—Sensitive and Portable Mobile-Enabled Application3
Topic Modeling Based on Two-Step Flow Theory: Application to Tweets about Bitcoin3
How Many Data Does Machine Learning in Human–Computer Interaction Need?: Re-Estimating the Dataset Size for Convolutional Neural Network-Based Models of Visual Perception3
Lessons Learned From Applying the NIST Privacy Framework3
Information Revealed by Vision: A Review on the Next-Generation OCC Standard for AIoV3
Agriculture 5.0: Cutting-Edge Technologies, Trends, and Challenges3
The “X-Factor” of 6G Networks: Optical Transport Empowering 6G Innovations2
Standards for Cloud Risk Assessments—What's Missing?2
The Duality of Data and Knowledge Across the Three Waves of AI2
The IT Challenges in Disaster Relief: What We Learned From Hurricane Harvey2
Can Large Language Models Better Predict Software Vulnerability?2
Technical Analysis of Data-Centric and Model-Centric Artificial Intelligence2
Executive Education for C-Suiters2
I3City: An Interoperated, Intelligent, and Integrated Platform for Smart City Ecosystem2
Mitigating Disinformation and Building Trust in Social Media2
A Critical Review of Open Source Software Development: Freedom or Benefit Libertarian View Versus Corporate View2
Fake Agile: What Is It and How to Avoid It?2
Low-Latency Intrusion Detection Using a Deep Neural Network2
Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review2
Smart Helmet: Combining Sensors, AI, Augmented Reality, and Personal Protection to Enhance First Responders’ Situational Awareness2
SAME: The Design Space for Seamless Automotive Multimodal Experience2
Learning Lessons From the Scrum Adoption in the Brazilian Air Force2
Deeper Understanding of Software Change2
Heartbleed Revisited: Is it Just a Buffer Over-Read?2
75 Years of Astonishing Evolution of IT: 1946–20212
Assessing Prehospital Seismic Resilience: An Agent-Based Modeling Approach2
Quantum Pliers Cutting the Blockchain2
Sharing Enterprise Cloud Securely at IBM2
Questions CEOs Should Ask About Digital Technology Meeting #1: “Tell Me How Technology Works Around Here?”2
Smart Contracts: Some Practical Considerations2
Process Design to Use Amazon MTurk for Cognitively Complex Tasks2
Masterminds of Computer Design: Charles Babbage and Ada Lovelace2
AI in User Interface Design and Evaluation2
Applying Explainable Artificial Intelligence Models for Understanding Depression Among IT Workers2
HADPoS: Improvement of DPoS Consensus Mechanism Based on Heat Attenuation2
Active Behavior Mining for Digital Twins Extraction2
Design Challenges on Machine-Learning Enabled Resource Optimization2
Reversible Execution for Robustness in Embodied AI and Industrial Robots2
Employer Branding: The Impact of COVID-19 on New Employee Hires in IT Companies2
Nothing Is Harder to Resist Than the Temptation of AI2
Resilience and Elasticity for Continuous Service-Based Processes in Pandemic Ages2
The Knowledge Graph as an Ontological Framework2
Demanding Fair and Ethically Aligned IT for the Future1
The Metaverses of Yesteryear, Today, and Tomorrow1
Measuring the Exploitation of Weaknesses in the Wild1
Internet of Planets (IoP): A New Era of the Internet1
The Mastermind Department Wishes IT Professional a Happy 25th Birthday!1
The Future of Education: Generative Artificial Intelligence’s Collaborative Role With Teachers1
An Overall First Responder Tracking and Coordination Framework1
A Linear Programming Model for Determining Distribution of User Sessions in a Voice Over Internet Protocol Network1
A Comparative Analysis of Consensus Algorithms for Decentralized Storage Systems1
CAPTCHA-Based Secret-Key Sharing Using Quantum Communication1
Will Algorithms Rule Us?1
Automation is a 10-Step Competitive Necessity1
Using Internet of Things Application for Energy-Efficient and Lightweight Internet of Drones Networks1
A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack1
Preference Biased Edge Weight Assignment for Connectivity-Based Resilience Computation in Telecommunication Networks1
Toward Trustworthy Urban IT Systems: The Bright and Dark Sides of Smart City Development1
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors1
New Frontiers in Security Risk Management1
COMPSAC 20221
Quantified Self: From Self-Learning to Machine Learning1
Infrastructure-Less Prioritized Communication Platform for First Responders1
Compiler-Aided Type Correctness of Hybrid MPI-OpenMP Applications1
Could Blockchain Help With COVID-19 Crisis?1
A Blockchain-Based e-Government Service for Quantity Surveyors1
A Disruptive Transformation in Digital Transformation1
Coping With Technological Shifts: Organizational Actions to Adapt IT Infrastructures1
Design Thinking in Practice1
Data Anonymization for Maintenance Knowledge Sharing1
Using Context-Awareness for Storage Services in Edge Computing1
Can Business Architecture Modeling be Adaptive?1
Digital Twin of a Digital World: Process, Data, and Experience Perspectives1
6B Model for Business-Aligned Digital Transformation1
Masterminds of Generative AI: Vaswani and Altman1
IEEE Computer Society1
Doing for Data What the Internet Did for Networking1
Monetizing Quantum Computing1
Enabling Autonomous Teams and Continuous Deployment at Scale1
Masterminds of the NSFnet: Jennings, Wolff, and Van Houweling1
IEEE COMPUTER SOCIETY1
IT Pro Special Issue on Communications Recovery and Resilience—Editor's Column1
IEEE Computer Society Information1
Formal Methods for Autonomous Vehicles1
Toward Performance and Energy-Efficient Edge-of-Things1
An Automatic and Intelligent Internet of Things for Future Agriculture1
Formally Verifying Function Scheduling Properties in Serverless Applications1
The Changing Landscape of Privacy– Countermeasures in the Era of the COVID-19 Pandemic1
Algorithms and Data Structures for New Models of Computation1
How Accountants Stay in the C-Suite (or Disappear Into the Digital Back Office)1
Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things1
Piracy's Impact on “the Silver Screen”1
IEEE Computer Society1
Confidential Ethereum Smart Contracts1
Labeling Software Security Vulnerabilities1
Questions CEOs Should Ask About Digital Technology Meeting #2: “Tell Me How Good—Or Poorly—Technology Performs Here?”1
Influence of Technological Resources on the Development of Mathematical Competence in High School1
2021 C-Suite Awareness—From Privacy to Misinformation to Diversity, Inclusion, and Equality1
Carnegie Mellon University1
First Responder Superheroes Are Wearing Smart Wearables, Not Capes1
Cognitive AI for Mitigation of Misinformation in Online Social Networks1
IEEE Security & Privacy1
0.055309057235718