| a |
| Accessibility | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |
| AI | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| AI Model | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| AI-based security systems | AI and Cybersecurity: Collaborator or Confrontation |
| Approximate Query Processing | Error Assessment for Multi-Join AQP using Bootstrap Sampling |
| Artificial Intelligence | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth |
| Asymmetric Key | A Survey of Digital Security in Applications and Networking |
| b |
| Bard of Prey | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| Bike sharing system | Bike sharing systems via birth-death process and simulation modelling |
| binary tree | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
| birth-death process | Bike sharing systems via birth-death process and simulation modelling |
| Blockchain | IoT with Blockchain: A New Infrastructure Proposal |
| Boolean function | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
| bootstrap sampling | Error Assessment for Multi-Join AQP using Bootstrap Sampling |
| c |
| Chatbot | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
| ChatGPT | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
| Cloud | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
| communication | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |
| Constant storage | Constant Storage for Storing Shortest Paths for a Polyhedron |
| Cyber-Physical Systems | IoT with Blockchain: A New Infrastructure Proposal |
| d |
| Data Security | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
| Deep Deterministic Policy Gradient | Rear-end Vehicle Collision Avoidance using Reinforced Learning |
| digital signature | A Survey of Digital Security in Applications and Networking |
| document categorization | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |
| e |
| ECC | The Implementations and Applications of Elliptic Curve Cryptography |
| ECDH | The Implementations and Applications of Elliptic Curve Cryptography |
| Education | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |
| ElGamal | The Implementations and Applications of Elliptic Curve Cryptography |
| Elliptic Curve | The Implementations and Applications of Elliptic Curve Cryptography |
| Elliptic Curve Cryptography | The Implementations and Applications of Elliptic Curve Cryptography |
| embeddings | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
| Encryption | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
| error estimation | Error Assessment for Multi-Join AQP using Bootstrap Sampling |
| evaluating | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |
| f |
| Federated Learning | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth |
| g |
| generator | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
| Google Bard | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| GPT | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
| graph | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
| h |
| Homomorphic | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
| human-centered design | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |
| i |
| interaction | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |
| Internet of Things | IoT with Blockchain: A New Infrastructure Proposal |
| k |
| k-anonymity | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth |
| key | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
| l |
| Large Language Models (LLMs) | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
| Latency | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |
| LFSR | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
| m |
| machine learning | Artificial Intelligence Usage and Data Privacy Discoveries within mHealth Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| Malware | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| Markov Network | Bike sharing systems via birth-death process and simulation modelling |
| memoization | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
| n |
| Natural Language Processing | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| Natural Language Processing (NLP) | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
| neural networks | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |
| NIST | AI and Cybersecurity: Collaborator or Confrontation |
| non-linearity | Pseudorandom Binary Generator Based on the Combination of Linear Feedback Shift Registers with Nonlinear Filtering Function |
| o |
| OpenACC | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |
| OpenAI | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| Optimization | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
| p |
| P2P networks | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |
| parallel programming | Evaluating the Use of ChatGPT for Parallel Programming with OpenACC |
| Petri nets | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |
| Phishing | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| Point Operations | The Implementations and Applications of Elliptic Curve Cryptography |
| polyhedron | Constant Storage for Storing Shortest Paths for a Polyhedron |
| private key | A Survey of Digital Security in Applications and Networking |
| pTree | Data Security in the Cloud Using pTree-based Homomorphic Intrinsic Data Encryption System (pHIDES) |
| public key | A Survey of Digital Security in Applications and Networking |
| r |
| rear-end collision | Rear-end Vehicle Collision Avoidance using Reinforced Learning |
| recursion | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
| Reinforcement Learning | Rear-end Vehicle Collision Avoidance using Reinforced Learning |
| Residue class | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |
| robot navigation | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |
| RSA | A Survey of Digital Security in Applications and Networking |
| s |
| Script Kiddie | Evaluating Cybersecurity Risks in NLP Models: Google Bard as Bard of Prey and ChatGPT as Cyber Crime Aide |
| Security | A Survey of Digital Security in Applications and Networking |
| Sentiment Analysis | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |
| SHA | A Survey of Digital Security in Applications and Networking |
| Shortest paths storing and retrieval | Constant Storage for Storing Shortest Paths for a Polyhedron |
| simulation | Bike sharing systems via birth-death process and simulation modelling |
| social networks | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |
| star network | On further improvement of data look-up latency in Residue Class (RC) based Peer-2-Peer networks |
| t |
| Tabulation | Optimizing Time Complexity: A Comparative Analysis of Techniques in Recursive Algorithms - A Case Study with Path Sum Algorithm in Graphs and Binary Trees |
| text classification | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |
| text mining | Unveiling Text Mining Potential: A Comparative Analysis of Document Classification Algorithms |
| Timed Petri nets | Efficient Communication and Navigation for Soccer Robots using a Time Petri net Model |
| transformer | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
| Twitter | Exploring Sentiment on Campus. A Twitter Sentiment Analysis on University Tweets |
| u |
| user experience | Digital Transformation: A Quality Model as a guide to achieve a digital product focused on people |
| v |
| Vector Database | A Case Study on the Generative AI Project Life Cycle Using Large Language Models |
| z |
| Zero Trust Security framework | AI and Cybersecurity: Collaborator or Confrontation |