Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             41 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique Datta, Kankana

92 C p.
artikel
2 A consent-aware electronic medical records sharing method based on blockchain Qu, Xiao

92 C p.
artikel
3 A lightweight finger multimodal recognition model based on detail optimization and perceptual compensation embedding Guo, Zishuo

92 C p.
artikel
4 A novel secure privacy-preserving data sharing model with deep-based key generation on the blockchain network in the cloud B, Samuel

92 C p.
artikel
5 A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes Abid, Amal

92 C p.
artikel
6 A theory on human factors in DevOps adoption Pérez-Sánchez, Juanjo

92 C p.
artikel
7 A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare Dai, Yue

92 C p.
artikel
8 Authentication communication by using visualization cryptography for UAV networks Jawad, Aqeel Thamer

92 C p.
artikel
9 Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain Sarier, Neyire Deniz

92 C p.
artikel
10 Blockchain-based cross-domain query integrity verification mechanism for outsourced database Ren, Yongjun

92 C p.
artikel
11 DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology Mounnan, Oussama

92 C p.
artikel
12 Delta GUI change detection using inferred models Pastor Ricós, Fernando

92 C p.
artikel
13 Designing usability/user experience heuristics to evaluate e-assessments administered to children Lehnert, Florence

92 C p.
artikel
14 Developing a behavioural cybersecurity strategy: A five-step approach for organisations van Steen, Tommy

92 C p.
artikel
15 Editorial Board
92 C p.
artikel
16 Encrypted data inner product KNN secure query based on BALL-PB tree Liu, Huijie

92 C p.
artikel
17 Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping Reguero, Álvaro Domingo

92 C p.
artikel
18 Enhancing drone network resilience: Investigating strategies for k -connectivity restoration Asci, Mustafa

92 C p.
artikel
19 Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics Stals, Shenando

92 C p.
artikel
20 Framework of standards, guides and methodologies for project, program, portfolio, and PMO management Varajão, João

92 C p.
artikel
21 Grammar-obeying program synthesis: A novel approach using large language models and many-objective genetic programming Tao, Ning

92 C p.
artikel
22 GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism Rockenbach, Dinei A.

92 C p.
artikel
23 Integrating deep learning and data fusion for advanced keystroke dynamics authentication Budžys, Arnoldas

92 C p.
artikel
24 Interpreting the latent space of a Convolutional Variational Autoencoder for semi-automated eye blink artefact detection in EEG signals Criscuolo, Sabatina

92 C p.
artikel
25 LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems Alier, Marc

92 C p.
artikel
26 Large language models for code completion: A systematic literature review Husein, Rasha Ahmad

92 C p.
artikel
27 Lattice-based strong designated verifier signature with non-delegatability Zhang, Yanhua

92 C p.
artikel
28 MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks Sánchez, Luis E.

92 C p.
artikel
29 Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm R, Deepa

92 C p.
artikel
30 Practical two-party SM2 signing using multiplicative-to-additive functionality Li, Shiyang

92 C p.
artikel
31 Privacy-preserving top- k spatio-temporal keyword preference query Zhao, Xuan

92 C p.
artikel
32 Prototype, method, and experiment for evaluating usability of smart home user interfaces Faizrakhmanov, Renat

92 C p.
artikel
33 Quantifying heuristic evaluation Gonzalez Capdevila, Marc

92 C p.
artikel
34 Real-time privacy-preserved auditing for shared outsourced data Tang, Fengmei

92 C p.
artikel
35 Research on the construction and mapping model of knowledge organization system driven by standards Yuan, Jingshu

92 C p.
artikel
36 Revocable identity-based designated verifier proxy re-signature with signature evolution Zhang, Qiu

92 C p.
artikel
37 Specific feature selection in wearable EEG-based transducers for monitoring high cognitive load in neurosurgeons Arpaia, Pasquale

92 C p.
artikel
38 TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms Misalkar, Harshal Devidas

92 C p.
artikel
39 Uncharted dimensions, gaps, and future trends of serious games in software engineering Kharbouch, Manal

92 C p.
artikel
40 Web accessibility barriers and their cross-disability impact in eSystems: A scoping review Droutsas, Nikolaos

92 C p.
artikel
41 Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods Huang, Mengjun

92 C p.
artikel
                             41 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland