IT Professional

Papers
(The median citation count of IT Professional is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
IEEE Quantum Week57
Call for Papers: IEEE Computer Society53
Call for Papers: IEEE Computer Society48
IEEE Computer Society46
Masthead39
IEEE Computer Graphics and Applications37
IT Professional: Call for Articles35
IEEE Transactions on Big Data33
Humphrey Award33
Front Cover31
IEEE Computer Society Information31
IEEE Computer Society Jobs Board27
Table of Contents25
Call for Papers: IEEE Computer Society24
Masthead22
Table of Contents20
Computing in Science & Engineering19
[Front cover]17
Table of Contents17
[Masthead]16
In This Issue16
IEEE Access15
IEEE Transactions on Big Data15
ComputingEdge14
IEEE Computer Society14
IEEE Transactions on Big Data14
IEEE Computer Society: Call for Papers13
IEEE Computer Society Has You Covered!13
COMPSAC 202213
IEEE Computer Graphics and Applications12
Computing in Science & Engineering12
Front Cover11
Front Cover10
Computing Edge10
IEEE Transactions on Big Data10
Over the Rainbow: 21st Century Security & Privacy Podcast10
IEEE Computer Society Volunteer Service Awards10
IEEE Computer Society Information9
IEEE Transactions on Sustainable Computing9
IEEE Computer Society Computing Edge8
IEEE Transactions on Big Data8
IEEE Access: A multidisplinary open access journal8
Computing in Science & Engineering8
COMPSAC 2021 in Review7
The Future of Education: Generative Artificial Intelligence’s Collaborative Role With Teachers7
Blockchain-Based Semantic Exchange Framework for Summarized Video Contents in Wireless Edge Intelligence Network Enabled Web 3.07
Corrections to “Modernizing Legacy Software as Context-Sensitive and Portable Mobile-Enabled Application”7
Computing in Science & Engineering7
Call for Papers: IEEE Computer Society7
Improving the Design of a User Interface Through Automated Usability Checks7
Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI)7
IEEE Computer Society Computing Edge7
A Process Model for Service-Oriented Development of Embedded Software Systems6
Makers’ Studio: Enabling Education and Skill Development Through ICT6
If Snowstorms are Easier Than Sea Changes, Should Sea Changes Still Be Welcome in the C-Suite?6
Internet of Planets (IoP): A New Era of the Internet6
Aerial Data Aiding Smart Societal Reformation: Current Applications and Path Ahead6
How Emotional is Your C-Suite?6
Online Feedback Management Tools for Early-Stage Startups: Hidden Treasures in the Rocky Mountains6
Docker Swarm and Kubernetes Containers for Smart Home Gateway6
iTrace: When IOTA Meets COVID-19 Contact Tracing6
Business Technology Trends + Lists + Awareness = Executive Optimization5
A Novel Framework for Smart Systems Using Blockchain-Enabled Internet of Things5
Modeling Search Behavior Evolution on a Specialist Search Engine5
Generalized Deepfake Video Detection Through Time-Distribution and Metric Learning5
Investigate Financial Crime Patterns Using Graph Databases5
Toward Performance and Energy-Efficient Edge-of-Things5
A Periscopic IT Outlook5
Vulnerability Assessment of Learning Management Systems5
Coping With Technological Shifts: Organizational Actions to Adapt IT Infrastructures5
Formally Verifying Function Scheduling Properties in Serverless Applications4
Integrated Cellular and Cell-Free Communication Systems Toward Global Connectivity: Motivations, Challenges, and Research Roadmap4
Applying Explainable Artificial Intelligence Models for Understanding Depression Among IT Workers4
Security and Trust Issues in BYOD Networks4
IT Empowering Rescuers and First Responders in Saving Lives4
An Ethical Trio—AI, Cybersecurity, and Coding at Scale4
An Energy-Aware Path Enumeration Solution Based on the Path Algebra Framework4
Identifying Networked Patterns in Memecoin Twitter Accounts Using Exponential Random Graph Modeling4
The Metaverse and Higher Education Institutions4
IT, 21st Century Employment, and Demography4
A Blockchain-Based e-Government Service for Quantity Surveyors4
Deeper Understanding of Software Change4
What Gets You Hired Now Will Not Get You Hired Then4
5G/SDR-Assisted Cognitive Communication in UAV Swarms: Architecture and Applications4
Card Game to Demonstrate Quantum Key Exchange4
Critical Software Security Weaknesses4
Technical Analysis of Data-Centric and Model-Centric Artificial Intelligence4
Table of Contents3
IEEE Computer Society Computing Edge3
A New Lexicon and Its Implications3
Unlock your Potential3
Security-by-Design Issues in Autonomous Vehicles3
IEEE Computer Society Computing Edge3
IEEE Computer Society: Call for Papers3
IEEE Computer Society Information3
Harnessing AI Augmentation for Effective Digital Transformation Leadership3
Computing Edge: Your one-stop resource for industry hot topics, technical overviews, and in-depth articles3
Enhancing Decision-Making for Imbalanced Medical Datasets Using BDDs and Low-Code/No-Code3
Mastermind of the Future: Ray Kurzweil3
Agriculture 5.0: Cutting-Edge Technologies, Trends, and Challenges3
IEEE Computer Society D&I Fund3
IEEE Computer Society Information3
Enhancing Connectivity in Rural Areas: Secure Spectrum Access in 6G Networks Using Advanced Encryption and Spectrum Sensing Techniques3
Masthead3
Harnessing Generative Artificial Intelligence: A Game-Changer for Small and Medium Enterprises3
HADPoS: Improvement of DPoS Consensus Mechanism Based on Heat Attenuation3
IEEE Open Journal of the Computer Society2
IEEE Computer Society Has You Covered!2
IT Professional: CALL FOR ARTICLES2
IEEE Computer Society Has You Covered!2
Nominate a Worthy Colleague Today! [IEEE Computer Society Awards]2
IEEE Computer Society Jobs Board2
Get Published in the IEEE Open Journal of the Computer Society2
Over the Rainbow: 21st Century Security & Privacy Podcast2
IEEE Quantum Week2
Table of Contents2
IEEE Computer Society: Call for Papers2
IEEE COMPUTER SOCIETY: Call for Papers2
Masthead2
IEEE COMPUTER SOCIETY: Call for Papers2
IEEE Transactions on Sustainable Computing2
ComputingEdge2
Masthead2
COMPSAC 20222
IEEE Computer Society D&I FUND2
IEEE Multimedia2
Table of Contents2
IEEE Dataport2
2022 IEEE CS Charles Babbage Award: Call for award nominations1
Learning Lessons From the Scrum Adoption in the Brazilian Air Force1
Trust Considerations in Open Banking1
The Metaverse: Ecosystem, Technologies, Business Opportunities, and Challenges1
Intelligent IoT- and UAV-Assisted Architecture for Pipeline Monitoring in OGI1
Monetizing Quantum Computing1
The “X-Factor” of 6G Networks: Optical Transport Empowering 6G Innovations1
From the Editors1
IT Professional Special Issue on Security and Data Protection During the COVID-19 Pandemic and Beyond1
Compiler-Aided Type Correctness of Hybrid MPI-OpenMP Applications1
Questions CEOs Should Ask About Digital Technology Meeting #3: “Tell Me About the Business—Technology Strategy”1
IEEE Computer Society Info1
IEEE Computer Society - Call for Papers1
AI in User Interface Design and Evaluation1
Front Cover1
C-Suite Dysfunction1
Call for Articles: IEEE Pervasive Computing1
How Machine Learning May Prevent the Breakdown of Democracy by Contributing to Fake News Detection1
Masthead1
Masterminds of the NSFnet: Jennings, Wolff, and Van Houweling1
Cognitive AI for Mitigation of Misinformation in Online Social Networks1
Beyond 5G Satellite Transmission and Indoor UAVs in Dams Monitoring: An Opportunistic Data Collection Strategy for Isolated Rural Areas1
Company Name Matching Using Job Market Data Enrichment1
Revolutionizing Emergency Response: The Transformative Power of Smart Wearables Through Blockchain, Federated Learning, and Beyond 5G/6G Services1
Rigorous Data Validation for Accurate Dashboards: Experience From a Higher Education Institution1
Comprehensively Labeled Weakness and Vulnerability Datasets via Unambiguous Formal Bugs Framework Specifications1
The Continuing IT Evolution and Revolution1
Smart Helmet: Combining Sensors, AI, Augmented Reality, and Personal Protection to Enhance First Responders’ Situational Awareness1
A Transparent and Traceable Coverage Analysis Model for Vaccine Supply-Chain Using Blockchain Technology1
Evaluating the Effect of Human Factors on Big Data Analytics and Cloud of Things Adoption in the Manufacturing Micro, Small, and Medium Enterprises1
Front Cover1
IEEE Transactions on Big Data1
The Edgy Nature of Green IT1
IT Pro Call for Articles1
The Metaverses of Yesteryear, Today, and Tomorrow1
On the Use of Blockchain Technology for Education During Pandemics1
Front Cover1
SAME: The Design Space for Seamless Automotive Multimodal Experience1
Information Revealed by Vision: A Review on the Next-Generation OCC Standard for AIoV1
An Optimization Perspective on the Interactions Between Models in the Internet of Drones1
A Data-Driven Classification Framework for Cybersecurity Breaches1
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors1
A Pilot Study on Online-Education Supportive Tools in COVID-19 Context1
COMPSAC 2024: A Resounding Success1
Formal Methods Boost Experimental Performance for Explainable AI1
Blockchain's Roles in Fighting Corruption and Improving Public Sector Efficiency in Developing Countries1
ComputingEdge1
IEEE Computer Society D&I Fund1
Smart Software: The Real Force of Smart Things1
IEEE Security & Privacy1
Masterminds of Computer Design: Charles Babbage and Ada Lovelace1
Call for Papers: IEEE Transactions on Computers1
Priority-Based Redeployment Algorithm for Decentralized Nodes in xG Access Networks0
Generative Artificial Intelligence: Current Trends, Issues, and Challenges0
Masthead0
Call for Articles: IEEE Pervasive Computing0
Spectrum-Based Hybrid Deep Learning for Intact Prediction of Postharvest Avocado Ripeness0
IT Pro Updates & Looking Forward0
Hospital and Home Environments Automation for Amyotrophic Lateral Sclerosis Patients: Building Information Modeling and the Internet of Things in Digital Environments0
ComputingEdge0
Reversible Execution for Robustness in Embodied AI and Industrial Robots0
Hello Quantum! How Quantum Computing Will Change the World0
Mitigating Disinformation and Building Trust in Social Media0
A Postdisaster Network Resource Allocation in a Mobile Communication Network0
Power and Performance Efficient SDN-Enabled Fog Architecture0
Will Algorithms Rule Us?0
Approximate High-Performance Computing: A Fast and Energy-Efficient Computing Paradigm in the Post-Moore Era0
Cybersecurity Assessment Methods—Why Aren’t They Used?0
IT and 21st Century Employment0
The Beginnings of IT Professional— A Personal Retrospective0
New Ways of Working Are Already Old0
Alleviating Challenges Related to FDA-Approved Medical Wearables Using Blockchain Technology0
The x in xG0
IEEE Annals of the History of Computing0
Table of Contents0
A Comparative Analysis of Consensus Algorithms for Decentralized Storage Systems0
Table of Contents0
Right to Explanation in Large Language Models: Lessons from the European Union AI Act and General Data Protection Regulation0
The Rise of Accelerator-Based Data Centers: Opportunities and Challenges0
IEEE Security & Privacy0
Call for Articles: IEEE Pervasive Computing0
Masthead0
Harnessing Blockchain Technology to Enhance Trust and Traceability in Wine Trading Among Wineries0
Smart Cities in China: A Brief Overview0
Evaluation of Tree-Based Machine Learning Algorithms for Network Intrusion Detection in the Internet of Things0
The Environmental Impact of Artificial Intelligence0
A Review of Artificial Intelligence's Neural Networks (Deep Learning) Applications in Medical Diagnosis and Prediction0
Revisiting Rural and Remote Connectivity Challenges in B5G and 6G Networks0
Assessing Prehospital Seismic Resilience: An Agent-Based Modeling Approach0
How Good Is the Team?0
The AI-Cybersecurity Nexus: The Good and the Evil0
Smart Waste Management Using Blockchain0
Malware Detection and Classification Based on Graph Convolutional Networks and Function Call Graphs0
A Framework for the Deployment of Cybersecurity Monitoring Tools in the Industrial Environment0
Design, Validate, Implement, and Validate: From Dreaming Approaches to Realities0
Cybercrime and Privacy Threats of Large Language Models0
Bridging the Gap From Concrete Building Construction to Flexible Software Process—Way of Working0
IEEE Internet Computing0
Call for Papers, Presentations and Tutorials0
Truth Talking in the C-Suite0
IEEE Computer Society0
IEEE Transactions on Privacy0
Industrial-Internet-of-Things-Based Digital Twin and Metaverse Privacy and Security Measures for a Trustworthy Industrial Metaverse Ecosystem0
Front Cover0
Artificial Intelligence in Higher Education: Community Perceptions at a Large U.S. University0
IEEE Access0
Labeling Software Security Vulnerabilities0
IEEE Computer Society Information0
6B Model for Business-Aligned Digital Transformation0
Trajectory Analysis in UKF: Predicting Table Tennis Ball Flight Parameters0
I3City: An Interoperated, Intelligent, and Integrated Platform for Smart City Ecosystem0
Phenomenon of Fake Agile in Software Development0
Connecting Dots Between Entrepreneurs, Research Publishers, and Software Engineering Researchers: An Outcome of Mixed Methods Empirical Research0
ChatGPT for Software Development: Opportunities and Challenges0
Thinking and Feeling Cognitive Security?0
Evidence-Based Guidelines for Advancing Continuous Experimentation0
Using Internet of Things Application for Energy-Efficient and Lightweight Internet of Drones Networks0
Corrections to “A Linear Programming Model for Determining Distribution of User Sessions in a Voice Over Internet Protocol Network”0
COMPSAC Returns In-Person—A Remarkable Post-Covid Success0
IEEE Security & Privacy0
Enriching Transformer-Based Embeddings for Emotion Identification in an Agglutinative Language: Turkish0
IEEE Computer Society: Call for Papers0
0.26232814788818