Computer Information Science | |
Metaverse Security and Privacy |
6 |
The Psychology of Color in Web Design |
6 |
Single-Page Web Applications |
6 |
Smart Home Technology Exploits |
6 |
Responsive and Adaptive Web Design : What is the Best Choice ? |
6 |
Penetration Testing and Ethical Hacking |
7 |
Geolocation Technology : Helpful or Harmful ? |
7 |
Accelerated Mobile Pages |
7 |
Web Vulnerabilities |
7 |
Mobile Phone Malware |
7 |
The Origins of Cryptocurrency |
8 |
Memory-Resident Malware |
8 |
Russian State-Sponsored SolarWinds Attack |
8 |
Cyberattacks |
8 |
The Most Serious Bug in Software History |
8 |
Search Engine Optimization ( SEO ) |
9 |
Fuzz Testing : Detecting Unknown Vulnerabilities in a Program |
9 |
Denial-of-Service ( DoS ) Attacks |
9 |
Nation-State Attacks Against the Power Grid : The New Battlefield |
9 |
Nation-State Hacking : A Closer Look at China ’ s APT1 Hackers |
9 |
Criminal Justice | |
The Public Perception of Online Prostitution |
10 |
Education Entry Requirement for Policing |
10 |
Does Having an Incarcerated Parent Affect Juvenile Crime ? |
10 |
Police Presence and its Impact on Community Fear of Police |
10 |
Perception of Immigration Policy in 2022 |
10 |
An Evaluation of the Public Perception of Police Militarization | |
in 2022 |
11 |
The Public ’ s Perception Regarding Those Diagnosed with | |
Mental Health Disorders and Their Ability to Conduct to Accurate | |
Eyewitness Testimony in Court |
11 |