| | CATA2022: Author Index| Author | Papers | 
|---|
 | A |  | Ahmed Alam, Parveen | Cost Effective Service Oriented Model for Recruitment |  | Anbro, Steven | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |  | B |  | Bagui, Sikha | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |  | Bagui, Subhash | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |  | Banerjee, Shreya | An Ontology Based Approach towards End User Development of IoT |  | C |  | Chen, Hongkai | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |  | Chen, Natcha | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |  | Chowdhury, Md Minhaz | Mobile Devices Vulnerabilities Ethical Hacking: Skills to Fight Cybersecurity Threats
 |  | Crosswell, Laura | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |  | D |  | Daoud, Luka | Performance Study of Software-based Encrypting Data at Rest |  | Day, Logan | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |  | d |  | de Oliveira Rech, Luciana | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |  | D |  | Debnath, Narayan | An Ontology Based Approach towards End User Development of IoT Dynamic Meta-Information Management for IoT-based Applications
 |  | Debnath, Narayan | Cost Effective Service Oriented Model for Recruitment |  | Diaz-Juarez, Sven | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |  | G |  | Ghosh, Tirthankar | Entropy Analysis for Modbus Traffic over TCP/IP in Industrial Control Systems |  | Gouru, Aishwarya | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |  | H |  | Harris Jr, Frederick C. | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |  | Hexmoor, Henry | DSRBT - Driving Safety Reward based on Blockchain Technology |  | Hossain, Mohammad | Application of Machine Learning on Software Quality Assurance and Testing: A Chronological Survey |  | Hossain Molla, Md Jakir | Cost Effective Service Oriented Model for Recruitment |  | Houmanfar, Ramona | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |  | Huen, Hingkwan | Performance Study of Software-based Encrypting Data at Rest |  | J |  | Jin, Ying | Event and Query Processing in a Fuzzy Active Graph Database System |  | Johnson, Quinn | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |  | K |  | Kanchanaporn, Nattapach | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |  | Kumari, Madhu | Dynamic Meta-Information Management for IoT-based Applications |  | L |  | Latif, Shadman | Mobile Devices Vulnerabilities Ethical Hacking: Skills to Fight Cybersecurity Threats
 |  | Lewis, Christopher | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |  | M |  | Macedo Maiwald Santos, Ian | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |  | Mishra, Sugyan Kumar | Dynamic Meta-Information Management for IoT-based Applications |  | Moraes, Ricardo | A Topic Modeling Method for Analyzes of Short-Text Data in Social Media Networks |  | P |  | Patanasakpinyo, Thitivatr | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |  | Q |  | Quang, Phat Tat | An Ontology Based Approach towards End User Development of IoT |  | R |  | Rachamalla, Sruthi | DSRBT - Driving Safety Reward based on Blockchain Technology |  | Rebaleati, Michelle | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |  | Redei, Alexander | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |  | S |  | Sarkar, Anirban | Dynamic Meta-Information Management for IoT-based Applications |  | Schneider, Melissa | Mobile Devices Vulnerabilities |  | Sen, Soumya | Cost Effective Service Oriented Model for Recruitment |  | Shen, Dakun | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search |  | Singsornsri, Natthikarn | Verifying and Assessing a Performance of an Automatic Vacuum Robot under Different Room Conditions |  | Sk, Md Obaidullah | Cost Effective Service Oriented Model for Recruitment |  | Smith, Logan | Ethical Hacking: Skills to Fight Cybersecurity Threats |  | Starmer, Luka | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |  | Suthaharan, Shan | Facial Emotion Characterization and Detection using Fourier Transform and Machine Learning |  | Szarko, Alison | An Application for Simulating Patient Handoff Using 360 Video and Eye Tracking in Virtual Reality |  | T |  | Thanh, Dai Nguyen | An Ontology Based Approach towards End User Development of IoT |  | Towle Jr., Bradford | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |  | Tristani, Gabrielle | Designing Application Appropriateness for Augmented Reality with Requirement Integration from the User-Cursor Paradigm |  | V |  | Vadwala, Ayushi | Event and Query Processing in a Fuzzy Active Graph Database System |  | Van, Giau Ung | An Ontology Based Approach towards End User Development of IoT |  | Z |  | Zolboot, Namuunbadralt | Hearthstone Battleground: An AI Assistant with Monte Carlo Tree Search | 
 | 
 |