Manish Agrawal

Orcid: 0000-0001-7447-2367

According to our database1, Manish Agrawal authored at least 49 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unsupervised Threat Hunting using Continuous Bag-of-Terms-and-Time (CBoTT).
CoRR, 2024

A novel data generation scheme for surrogate modelling with deep operator networks.
CoRR, 2024

Introduction to the Minitrack on Machine Learning and AI: Cybersecurity and Threat Hunting.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC).
Decis. Support Syst., May, 2023

RQ Labs: A Cybersecurity Workforce Skills Development Framework.
Inf. Syst. Frontiers, April, 2023

2021

Process Design to Use Amazon MTurk for Cognitively Complex Tasks.
IT Prof., 2021

Industry Norms as Predictors of IT Outsourcing Behaviors.
Int. J. Inf. Manag., 2021

RQ Labs: A Cybersecurity Workforce Talent Program Design.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

Workshop: Using Virtual Machine Labs for the Data Comm Class.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Impacts of process audit review and control efforts on software project outcomes.
IET Softw., 2020

A Novel Multimodal Music Genre Classifier using Hierarchical Attention and Convolutional Neural Network.
CoRR, 2020

2018
ICT mediated rumor beliefs and resulting user actions during a community crisis.
Gov. Inf. Q., 2018

Impact of incorrect and new requirements on waterfall software project outcomes.
Empir. Softw. Eng., 2018

Decision support for the optimal allocation of security controls.
Decis. Support Syst., 2018

2017
A quadratic time finite element method for nonlinear elastodynamics within the context of hybrid finite elements.
Appl. Math. Comput., 2017

2016
Cyber Insurance at USF.
J. Inf. Technol. Educ. Discuss. Cases, 2016

Effects of Project Owner's Title on the Financial Impacts of IT Systems Integration Outsourcing Projects.
Inf. Syst. Manag., 2016

The time finite element as a robust general scheme for solving nonlinear dynamic equations including chaotic systems.
Appl. Math. Comput., 2016

2015
Message diffusion through social network service: The case of rumor and non-rumor related tweets during Boston bombing 2013.
Inf. Syst. Frontiers, 2015

A process model for information retrieval context learning and knowledge discovery.
Artif. Intell. Law, 2015

Sentiment Analysis of Twitter Users Over Time: The Case of the Boston Bombing Tragedy.
Proceedings of the E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life, 2015

An Examination of Emotions in the Boston Bombing Twitterverse.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2014
Exploring multiplexity in Twitter - the 2013 Boston Marathon Bombing Case.
Proceedings of the International Conference on Information Systems, 2014

2013
Community Intelligence and Social Media Services: A Rumor Theoretic Analysis of Tweets During Social Crises.
MIS Q., 2013

Competition In Mediation Services: Modeling The Role of Expertise, Satisfaction, and Switching Costs.
J. Organ. Comput. Electron. Commer., 2013

Mobile Application Development Strategy at Vology.
J. Inf. Technol. Educ. Discuss. Cases, 2013

2012
Infinity Computer solutions: Ramping up.
J. Inf. Technol. Educ. Discuss. Cases, 2012

Nation Technologies.
J. Inf. Technol. Educ. Discuss. Cases, 2012

2011
Information control and terrorism: Tracking the Mumbai terrorist attack through twitter.
Inf. Syst. Frontiers, 2011

Using social media to study social pheonomena: An example using Twitter data.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

Choice of Information: A Study of Twitter News Sharing during the 2009 Israel-Gaza Conflict.
Proceedings of the International Conference on Information Systems, 2011

Emergency Response to Mumbai Terror Attacks: An Activity Theory Analysis.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

A Comparison of Cyber-Crime Definitions in India and the United States.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

2009
Information Market-Based Decision Fusion.
Manag. Sci., 2009

Negotiation Behaviors in Agent-Based Negotiation Support Systems.
Int. J. Intell. Inf. Technol., 2009

2008
Security analysis of Internet technology components enabling globally distributed workplaces - a framework.
ACM Trans. Internet Techn., 2008

2007
Software Effort, Quality, and Cycle Time: A Study of CMM Level 5 Projects.
IEEE Trans. Software Eng., 2007

Multi-Issue Automated Negotiations Using Agents.
INFORMS J. Comput., 2007

2006
Market reactions to E-business outsourcing announcements: An event study.
Inf. Manag., 2006

2005
Matching intermediaries for information goods in the presence of direct search: an examination of switching costs and obsolescence of information.
Decis. Support Syst., 2005

2004
A Behavioral Model of Digital Music Piracy.
J. Organ. Comput. Electron. Commer., 2004

Determinants of Sourcing During Technology Growth and Maturity: An Empirical Study of e-Commerce Sourcing.
J. Manag. Inf. Syst., 2004

Design and Evaluation of Agent-Based Negotiation Heuristic for Online Negotiations.
Proceedings of the ICEIS 2004, 2004

A conceptual approach to information security in financial account aggregation.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Impact of Mobile Computing Terminals in Police Work.
J. Organ. Comput. Electron. Commer., 2003

Demystifying Wireless Technologies: Navigating Through The Wireless Technology Maze.
Commun. Assoc. Inf. Syst., 2003

A comparison of B2B e-service solutions.
Commun. ACM, 2003

2002
Electronic Commerce, Infrastructure for.
Proceedings of the Encyclopedia of Information Systems, 2002


  Loading...