https://www.temple.edu/academics/degree-programs/information-technology-auditing-cyber-security-ms-bu-itac-ms
Prepare for a career in cyber security, IT risk management or information systems auditing in the business and critical infrastructure sectors.
https://cis.temple.edu/~latecki/Courses/CIS2166-Fall16/Lectures/MatrixAlg1.pdf
A matrix is a rectangular array of numbers or other mathematical objects, for which operations such as addition and multiplication are defined. Most of this article focuses on real matrices, i.e., matrices whose elements are real numbers. For instance, this is a real matrix: The numbers, symbols or expressions in the matrix are called its entries or its elements. The horizontal and vertical ...
https://cis.temple.edu/~ingargio/cis587/readings/wumpus.shtml
A variety of "worlds" are being used as examples for Knowledge Representation, Reasoning, and Planning. Among them the Vacuum World, the Block World, and the Wumpus World. We will examine the Wumpus World and in this context introduce the Situation Calculus, the Frame Problem, and a variety of axioms.
https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf
1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...
https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf
The table’s intent is to provide a one-page overview of the main communication flows on IT risk that should exist in one form or another in any enterprise. More detailed information, e.g., source and destination of information, can be found in the Risk IT process descriptions, in the input and output tables.
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf
Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...