nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique
|
Datta, Kankana |
|
|
92 |
C |
p. |
artikel |
2 |
A consent-aware electronic medical records sharing method based on blockchain
|
Qu, Xiao |
|
|
92 |
C |
p. |
artikel |
3 |
A lightweight finger multimodal recognition model based on detail optimization and perceptual compensation embedding
|
Guo, Zishuo |
|
|
92 |
C |
p. |
artikel |
4 |
A novel secure privacy-preserving data sharing model with deep-based key generation on the blockchain network in the cloud
|
B, Samuel |
|
|
92 |
C |
p. |
artikel |
5 |
A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes
|
Abid, Amal |
|
|
92 |
C |
p. |
artikel |
6 |
A theory on human factors in DevOps adoption
|
Pérez-Sánchez, Juanjo |
|
|
92 |
C |
p. |
artikel |
7 |
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare
|
Dai, Yue |
|
|
92 |
C |
p. |
artikel |
8 |
Authentication communication by using visualization cryptography for UAV networks
|
Jawad, Aqeel Thamer |
|
|
92 |
C |
p. |
artikel |
9 |
Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain
|
Sarier, Neyire Deniz |
|
|
92 |
C |
p. |
artikel |
10 |
Blockchain-based cross-domain query integrity verification mechanism for outsourced database
|
Ren, Yongjun |
|
|
92 |
C |
p. |
artikel |
11 |
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology
|
Mounnan, Oussama |
|
|
92 |
C |
p. |
artikel |
12 |
Delta GUI change detection using inferred models
|
Pastor Ricós, Fernando |
|
|
92 |
C |
p. |
artikel |
13 |
Designing usability/user experience heuristics to evaluate e-assessments administered to children
|
Lehnert, Florence |
|
|
92 |
C |
p. |
artikel |
14 |
Developing a behavioural cybersecurity strategy: A five-step approach for organisations
|
van Steen, Tommy |
|
|
92 |
C |
p. |
artikel |
15 |
Editorial Board
|
|
|
|
92 |
C |
p. |
artikel |
16 |
Encrypted data inner product KNN secure query based on BALL-PB tree
|
Liu, Huijie |
|
|
92 |
C |
p. |
artikel |
17 |
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping
|
Reguero, Álvaro Domingo |
|
|
92 |
C |
p. |
artikel |
18 |
Enhancing drone network resilience: Investigating strategies for k -connectivity restoration
|
Asci, Mustafa |
|
|
92 |
C |
p. |
artikel |
19 |
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics
|
Stals, Shenando |
|
|
92 |
C |
p. |
artikel |
20 |
Framework of standards, guides and methodologies for project, program, portfolio, and PMO management
|
Varajão, João |
|
|
92 |
C |
p. |
artikel |
21 |
Grammar-obeying program synthesis: A novel approach using large language models and many-objective genetic programming
|
Tao, Ning |
|
|
92 |
C |
p. |
artikel |
22 |
GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism
|
Rockenbach, Dinei A. |
|
|
92 |
C |
p. |
artikel |
23 |
Integrating deep learning and data fusion for advanced keystroke dynamics authentication
|
Budžys, Arnoldas |
|
|
92 |
C |
p. |
artikel |
24 |
Interpreting the latent space of a Convolutional Variational Autoencoder for semi-automated eye blink artefact detection in EEG signals
|
Criscuolo, Sabatina |
|
|
92 |
C |
p. |
artikel |
25 |
LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems
|
Alier, Marc |
|
|
92 |
C |
p. |
artikel |
26 |
Large language models for code completion: A systematic literature review
|
Husein, Rasha Ahmad |
|
|
92 |
C |
p. |
artikel |
27 |
Lattice-based strong designated verifier signature with non-delegatability
|
Zhang, Yanhua |
|
|
92 |
C |
p. |
artikel |
28 |
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks
|
Sánchez, Luis E. |
|
|
92 |
C |
p. |
artikel |
29 |
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm
|
R, Deepa |
|
|
92 |
C |
p. |
artikel |
30 |
Practical two-party SM2 signing using multiplicative-to-additive functionality
|
Li, Shiyang |
|
|
92 |
C |
p. |
artikel |
31 |
Privacy-preserving top- k spatio-temporal keyword preference query
|
Zhao, Xuan |
|
|
92 |
C |
p. |
artikel |
32 |
Prototype, method, and experiment for evaluating usability of smart home user interfaces
|
Faizrakhmanov, Renat |
|
|
92 |
C |
p. |
artikel |
33 |
Quantifying heuristic evaluation
|
Gonzalez Capdevila, Marc |
|
|
92 |
C |
p. |
artikel |
34 |
Real-time privacy-preserved auditing for shared outsourced data
|
Tang, Fengmei |
|
|
92 |
C |
p. |
artikel |
35 |
Research on the construction and mapping model of knowledge organization system driven by standards
|
Yuan, Jingshu |
|
|
92 |
C |
p. |
artikel |
36 |
Revocable identity-based designated verifier proxy re-signature with signature evolution
|
Zhang, Qiu |
|
|
92 |
C |
p. |
artikel |
37 |
Specific feature selection in wearable EEG-based transducers for monitoring high cognitive load in neurosurgeons
|
Arpaia, Pasquale |
|
|
92 |
C |
p. |
artikel |
38 |
TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms
|
Misalkar, Harshal Devidas |
|
|
92 |
C |
p. |
artikel |
39 |
Uncharted dimensions, gaps, and future trends of serious games in software engineering
|
Kharbouch, Manal |
|
|
92 |
C |
p. |
artikel |
40 |
Web accessibility barriers and their cross-disability impact in eSystems: A scoping review
|
Droutsas, Nikolaos |
|
|
92 |
C |
p. |
artikel |
41 |
Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods
|
Huang, Mengjun |
|
|
92 |
C |
p. |
artikel |