nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abelian combinatorics on words: A survey
|
Fici, Gabriele |
|
|
13-14 |
C |
p. |
artikel |
2 |
A brief survey on probability distribution approximation
|
Melucci, Massimo |
|
2019 |
13-14 |
C |
p. 91-97 |
artikel |
3 |
Abstractive text summarization: A comprehensive survey of techniques, systems, and challenges
|
Almohaimeed, Norah |
|
|
13-14 |
C |
p. |
artikel |
4 |
A comparative review of Urdu stemmers: Approaches and challenges
|
Jabbar, Abdul |
|
|
13-14 |
C |
p. |
artikel |
5 |
A comparative study on popular MAC protocols for mixed Wireless Sensor Networks: From implementation viewpoint
|
Maitra, Tanmoy |
|
2016 |
13-14 |
C |
p. 107-134 28 p. |
artikel |
6 |
A comprehensive and systematic look up into deep learning based object detection techniques: A review
|
Sharma, Vipal Kumar |
|
|
13-14 |
C |
p. |
artikel |
7 |
A comprehensive review of cybersecurity vulnerabilities, threats, and solutions for the Internet of Things at the network-cum-application layer
|
Razaque, Abdul |
|
|
13-14 |
C |
p. |
artikel |
8 |
A comprehensive review of few-shot object detection on aerial imagery
|
Nguyen, Khang |
|
|
13-14 |
C |
p. |
artikel |
9 |
A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services
|
Kumar, Surendra |
|
|
13-14 |
C |
p. |
artikel |
10 |
A comprehensive review on applications of Raspberry Pi
|
Mathe, Sudha Ellison |
|
|
13-14 |
C |
p. |
artikel |
11 |
A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions
|
Hildebrand, Brian |
|
|
13-14 |
C |
p. |
artikel |
12 |
A comprehensive review on current issues and advancements of Internet of Things in precision agriculture
|
Dhanasekar, S. |
|
|
13-14 |
C |
p. |
artikel |
13 |
A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges
|
Guerra-Manzanares, Alejandro |
|
|
13-14 |
C |
p. |
artikel |
14 |
A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions
|
Kaur, Amandeep |
|
|
13-14 |
C |
p. |
artikel |
15 |
A comprehensive review on transformer network for natural and medical image analysis
|
Thirunavukarasu, Ramkumar |
|
|
13-14 |
C |
p. |
artikel |
16 |
A comprehensive study of simulation frameworks and research directions in fog computing
|
Gill, Monika |
|
|
13-14 |
C |
p. |
artikel |
17 |
A comprehensive survey and analysis of generative models in machine learning
|
GM, Harshvardhan |
|
|
13-14 |
C |
p. |
artikel |
18 |
A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture
|
Kaur, Karamjeet |
|
|
13-14 |
C |
p. |
artikel |
19 |
A comprehensive survey of text classification techniques and their research applications: Observational and experimental insights
|
Taha, Kamal |
|
|
13-14 |
C |
p. |
artikel |
20 |
A comprehensive survey on authentication and privacy-preserving schemes in VANETs
|
Mundhe, Pravin |
|
|
13-14 |
C |
p. |
artikel |
21 |
A comprehensive survey on deep learning based malware detection techniques
|
M., Gopinath |
|
|
13-14 |
C |
p. |
artikel |
22 |
A comprehensive survey on sentiment analysis: Framework, techniques, and applications
|
Chandan, Manish Kumar |
|
|
13-14 |
C |
p. |
artikel |
23 |
A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy
|
Cheikhrouhou, Omar |
|
|
13-14 |
C |
p. |
artikel |
24 |
A comprehensive survey with critical analysis for deepfake speech detection
|
Pham, Lam |
|
|
13-14 |
C |
p. |
artikel |
25 |
A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs
|
Khanna, Nitin |
|
2019 |
13-14 |
C |
p. 24-44 |
artikel |
26 |
A conceptual framework to mitigate ransomware attacks on IoMT devices using threat intelligence: a systematic literature review
|
Selvaraj, Kalaivani |
|
|
13-14 |
C |
p. |
artikel |
27 |
A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions
|
Casheekar, Avyay |
|
|
13-14 |
C |
p. |
artikel |
28 |
A critical overview of outlier detection methods
|
Smiti, Abir |
|
|
13-14 |
C |
p. |
artikel |
29 |
Adaptive gamification in Collaborative systems, a systematic mapping study
|
Dalponte Ayastuy, María |
|
|
13-14 |
C |
p. |
artikel |
30 |
Adaptive user interfaces and universal usability through plasticity of user interface design
|
Miraz, Mahdi H. |
|
|
13-14 |
C |
p. |
artikel |
31 |
Adding relevance to rigor: Assessing the contributions of SLRs in Software Engineering through Citation Context Analysis
|
Díaz, Oscar |
|
|
13-14 |
C |
p. |
artikel |
32 |
Addressing the challenges of modern DNS a comprehensive tutorial
|
van der Toorn, Olivier |
|
|
13-14 |
C |
p. |
artikel |
33 |
A decade: Review of scene text detection methods
|
Rainarli, Ednawati |
|
|
13-14 |
C |
p. |
artikel |
34 |
A decade systematic review of fusion techniques in financial market prediction
|
Mehrmolaei, Soheila |
|
|
13-14 |
C |
p. |
artikel |
35 |
Advancement from neural networks to deep learning in software effort estimation: Perspective of two decades
|
Suresh Kumar, P. |
|
|
13-14 |
C |
p. |
artikel |
36 |
Advancements in image encryption: A comprehensive review of design principles and performance metrics
|
Yogi, Biswarup |
|
|
13-14 |
C |
p. |
artikel |
37 |
Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey
|
Nssibi, Maha |
|
|
13-14 |
C |
p. |
artikel |
38 |
Advances in online handwritten recognition in the last decades
|
Ghosh, Trishita |
|
|
13-14 |
C |
p. |
artikel |
39 |
Advancing IoT-driven WSNs with context-aware routing: A comprehensive review
|
Khedr, Ahmed M. |
|
|
13-14 |
C |
p. |
artikel |
40 |
Aeronautical communication transition from analog to digital data: A network security survey
|
Ben Mahmoud, Mohamed Slim |
|
2014 |
13-14 |
C |
p. 1-29 29 p. |
artikel |
41 |
Affective recommender systems in the educational field. A systematic literature review
|
Salazar, Camilo |
|
|
13-14 |
C |
p. |
artikel |
42 |
Agent Based Modelling and Simulation tools: A review of the state-of-art software
|
Abar, Sameera |
|
2017 |
13-14 |
C |
p. 13-33 21 p. |
artikel |
43 |
AI-driven cluster-based routing protocols in WSNs: A survey of fuzzy heuristics, metaheuristics, and machine learning models
|
Shokouhifar, Mohammad |
|
|
13-14 |
C |
p. |
artikel |
44 |
AI-generated text detection: A comprehensive review of methods, datasets, and applications
|
Kehkashan, Tanzila |
|
|
13-14 |
C |
p. |
artikel |
45 |
Aiming at methods’ wider adoption: Applicability determinants and metrics
|
Leszczyna, Rafał |
|
|
13-14 |
C |
p. |
artikel |
46 |
AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges
|
Bala, Bindu |
|
|
13-14 |
C |
p. |
artikel |
47 |
An annotated bibliography on 1-planarity
|
Kobourov, Stephen G. |
|
2017 |
13-14 |
C |
p. 49-67 19 p. |
artikel |
48 |
Anonymity on blockchain based e-cash protocols—A survey
|
Andola, Nitish |
|
|
13-14 |
C |
p. |
artikel |
49 |
An overview of self-adaptive technologies within virtual reality training
|
Vaughan, Neil |
|
2016 |
13-14 |
C |
p. 65-87 23 p. |
artikel |
50 |
Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review
|
Lone, Auqib Hamid |
|
|
13-14 |
C |
p. |
artikel |
51 |
Applicability of genetic algorithms for stock market prediction: A systematic survey of the last decade
|
Thakkar, Ankit |
|
|
13-14 |
C |
p. |
artikel |
52 |
Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions
|
Dar, Aaqib Bashir |
|
|
13-14 |
C |
p. |
artikel |
53 |
Application of deep learning for retinal image analysis: A review
|
Badar, Maryam |
|
|
13-14 |
C |
p. |
artikel |
54 |
Approximation and online algorithms for multidimensional bin packing: A survey
|
Christensen, Henrik I. |
|
2017 |
13-14 |
C |
p. 63-79 17 p. |
artikel |
55 |
A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties
|
Sokouti, Massoud |
|
2018 |
13-14 |
C |
p. 14-20 |
artikel |
56 |
Arabic Machine Translation: A survey of the latest trends and challenges
|
Ameur, Mohamed Seghir Hadj |
|
|
13-14 |
C |
p. |
artikel |
57 |
A recent review of conventional vs. automated cybersecurity anti-phishing techniques
|
Qabajeh, Issa |
|
2018 |
13-14 |
C |
p. 44-55 |
artikel |
58 |
A review of attack graph and attack tree visual syntax in cyber security
|
Lallie, Harjinder Singh |
|
|
13-14 |
C |
p. |
artikel |
59 |
A review of background, methods, limitations and opportunities of knowledge graph completion
|
Li, Daiyi |
|
|
13-14 |
C |
p. |
artikel |
60 |
A review of using object-orientation properties of C++ for designing expert system in strategic planning
|
Ahmadi, Mohsen |
|
|
13-14 |
C |
p. |
artikel |
61 |
A review on fingerprint based authentication-its challenges and applications
|
Maiti, Diptadip |
|
|
13-14 |
C |
p. |
artikel |
62 |
A review on specification evaluation of broadcasting routing protocols in VANET
|
Shah, Priyanka |
|
|
13-14 |
C |
p. |
artikel |
63 |
Artificial intelligence in COVID-19 research: A comprehensive survey of innovations, challenges, and future directions
|
Annan, Richard |
|
|
13-14 |
C |
p. |
artikel |
64 |
A search for good pseudo-random number generators: Survey and empirical studies
|
Bhattacharjee, Kamalika |
|
|
13-14 |
C |
p. |
artikel |
65 |
Aspect based sentiment analysis using deep learning approaches: A survey
|
Chauhan, Ganpat Singh |
|
|
13-14 |
C |
p. |
artikel |
66 |
A state-of-the-art review of FMEA/FMECA including patents
|
Spreafico, Christian |
|
2017 |
13-14 |
C |
p. 19-28 10 p. |
artikel |
67 |
A still simpler way of introducing interior-point method for linear programming
|
Mehlhorn, Kurt |
|
2016 |
13-14 |
C |
p. 1-11 11 p. |
artikel |
68 |
A survey of active learning in collaborative filtering recommender systems
|
Elahi, Mehdi |
|
2016 |
13-14 |
C |
p. 29-50 22 p. |
artikel |
69 |
A survey of android application and malware hardening
|
Sihag, Vikas |
|
|
13-14 |
C |
p. |
artikel |
70 |
A survey of automated negotiation: Human factor, learning, and application
|
Luo, Xudong |
|
|
13-14 |
C |
p. |
artikel |
71 |
A survey of Beluga whale optimization and its variants: Statistical analysis, advances, and structural reviewing
|
Lee, Sang-Woong |
|
|
13-14 |
C |
p. |
artikel |
72 |
A survey of blockchain, artificial intelligence, and edge computing for Web 3.0
|
Zhu, Jianjun |
|
|
13-14 |
C |
p. |
artikel |
73 |
A survey of Community Detection algorithms and its comparative performance analysis
|
Singh, Dipika |
|
|
13-14 |
C |
p. |
artikel |
74 |
A survey of data center consolidation in cloud computing systems
|
Helali, Leila |
|
|
13-14 |
C |
p. |
artikel |
75 |
A survey of deep learning techniques for detecting and recognizing objects in complex environments
|
Dogra, Ashish Kumar |
|
|
13-14 |
C |
p. |
artikel |
76 |
A survey of identifier–locator split addressing architectures
|
Komu, Miika |
|
2015 |
13-14 |
C |
p. 25-42 18 p. |
artikel |
77 |
A survey of Konkani NLP resources
|
Rajan, Annie |
|
|
13-14 |
C |
p. |
artikel |
78 |
A survey of lattice based expressive attribute based encryption
|
Fu, Xingbing |
|
|
13-14 |
C |
p. |
artikel |
79 |
A survey of live Virtual Machine migration techniques
|
Le, Tuan |
|
|
13-14 |
C |
p. |
artikel |
80 |
A survey of low-latency transmission strategies in software defined networking
|
Yan, Binghao |
|
|
13-14 |
C |
p. |
artikel |
81 |
A survey of malware detection in Android apps: Recommendations and perspectives for future research
|
Razgallah, Asma |
|
|
13-14 |
C |
p. |
artikel |
82 |
A survey of memory management techniques in virtualized systems
|
Mishra, Debadatta |
|
2018 |
13-14 |
C |
p. 56-73 |
artikel |
83 |
A survey of multidisciplinary domains contributing to affective computing
|
Arya, Resham |
|
|
13-14 |
C |
p. |
artikel |
84 |
A survey of neighborhood construction algorithms for clustering and classifying data points
|
Pourbahrami, Shahin |
|
|
13-14 |
C |
p. |
artikel |
85 |
A survey of outlier detection in high dimensional data streams
|
Souiden, Imen |
|
|
13-14 |
C |
p. |
artikel |
86 |
A survey of parameterized algorithms and the complexity of edge modification
|
Crespelle, Christophe |
|
|
13-14 |
C |
p. |
artikel |
87 |
A survey of privacy-preserving mechanisms for heterogeneous data types
|
Cunha, Mariana |
|
|
13-14 |
C |
p. |
artikel |
88 |
A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability
|
Huang, Xiaowei |
|
|
13-14 |
C |
p. |
artikel |
89 |
A survey of set accumulators for blockchain systems
|
Loporchio, Matteo |
|
|
13-14 |
C |
p. |
artikel |
90 |
A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications
|
Calatrava, Amanda |
|
|
13-14 |
C |
p. |
artikel |
91 |
A survey of the modified Moran process and evolutionary graph theory
|
Díaz, Josep |
|
|
13-14 |
C |
p. |
artikel |
92 |
A survey of timed automata for the development of real-time systems
|
Waez, Md Tawhid Bin |
|
2013 |
13-14 |
C |
p. 1-26 26 p. |
artikel |
93 |
A survey on algorithms for Nash equilibria in finite normal-form games
|
Li, Hanyu |
|
|
13-14 |
C |
p. |
artikel |
94 |
A survey on aspect sentiment triplet extraction methods and challenges
|
Zou, Wang |
|
|
13-14 |
C |
p. |
artikel |
95 |
A survey on computation offloading in edge systems: From the perspective of deep reinforcement learning approaches
|
Peng, Peng |
|
|
13-14 |
C |
p. |
artikel |
96 |
A survey on decentralized identity management systems
|
Xian, Jia |
|
|
13-14 |
C |
p. |
artikel |
97 |
A survey on deep learning and its applications
|
Dong, Shi |
|
|
13-14 |
C |
p. |
artikel |
98 |
A survey on deep matrix factorizations
|
De Handschutter, Pierre |
|
|
13-14 |
C |
p. |
artikel |
99 |
A survey on design and implementation of protected searchable data in the cloud
|
Dowsley, Rafael |
|
2017 |
13-14 |
C |
p. 17-30 |
artikel |
100 |
A survey on detecting mental disorders with natural language processing: Literature review, trends and challenges
|
Montejo-Ráez, Arturo |
|
|
13-14 |
C |
p. |
artikel |
101 |
A survey on essential components of a self-sovereign identity
|
Mühle, Alexander |
|
2018 |
13-14 |
C |
p. 80-86 |
artikel |
102 |
A survey on GANs for computer vision: Recent research, analysis and taxonomy
|
Iglesias, Guillermo |
|
|
13-14 |
C |
p. |
artikel |
103 |
A survey on graph problems parameterized above and below guaranteed values
|
Gutin, Gregory |
|
|
13-14 |
C |
p. |
artikel |
104 |
A survey on Hedetniemi’s conjecture
|
Zhu, Xuding |
|
|
13-14 |
C |
p. |
artikel |
105 |
A survey on image cryptography mechanisms: hitherto, and future directions
|
Gupta, Tanisha |
|
|
13-14 |
C |
p. |
artikel |
106 |
A survey on legal question–answering systems
|
Martinez-Gil, Jorge |
|
|
13-14 |
C |
p. |
artikel |
107 |
A Survey on malware analysis and mitigation techniques
|
Sibi Chakkaravarthy, S. |
|
2019 |
13-14 |
C |
p. 1-23 |
artikel |
108 |
A survey on mobile affective computing
|
Politou, Eugenia |
|
2017 |
13-14 |
C |
p. 79-100 22 p. |
artikel |
109 |
A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks
|
Lv, Yali |
|
|
13-14 |
C |
p. |
artikel |
110 |
A survey on parallel and distributed multi-agent systems for high performance computing simulations
|
Rousset, Alban |
|
2016 |
13-14 |
C |
p. 27-46 20 p. |
artikel |
111 |
A survey on privacy and security of Internet of Things
|
Ogonji, Mark Mbock |
|
|
13-14 |
C |
p. |
artikel |
112 |
A survey on privacy in decentralized online social networks
|
De Salve, Andrea |
|
2018 |
13-14 |
C |
p. 154-176 |
artikel |
113 |
A Survey on quantum computing technology
|
Gyongyosi, Laszlo |
|
2019 |
13-14 |
C |
p. 51-71 |
artikel |
114 |
A survey on quantum-safe blockchain security infrastructure
|
Wicaksana, Arya |
|
|
13-14 |
C |
p. |
artikel |
115 |
A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges
|
Ahmed, Manzoor |
|
|
13-14 |
C |
p. |
artikel |
116 |
A survey on semi-structured web data manipulations by non-expert users
|
Tekli, Gilbert |
|
|
13-14 |
C |
p. |
artikel |
117 |
A survey on socio-semantic information retrieval
|
Schoefegger, Karin |
|
2013 |
13-14 |
C |
p. 25-46 22 p. |
artikel |
118 |
A survey on system level energy optimisation for MPSoCs in IoT and consumer electronics
|
Ali, Haider |
|
|
13-14 |
C |
p. |
artikel |
119 |
A survey on the Distributed Computing stack
|
Ramon-Cortes, Cristian |
|
|
13-14 |
C |
p. |
artikel |
120 |
A survey on the parameterized complexity of reconfiguration problems
|
Bousquet, Nicolas |
|
|
13-14 |
C |
p. |
artikel |
121 |
A survey on the usability and practical applications of Graphical Security Models
|
Hong, Jin B. |
|
2017 |
13-14 |
C |
p. 1-16 |
artikel |
122 |
A survey on tree matching and XML retrieval
|
Tahraoui, Mohammed Amin |
|
2013 |
13-14 |
C |
p. 1-23 23 p. |
artikel |
123 |
A survey: When moving target defense meets game theory
|
Tan, Jinglei |
|
|
13-14 |
C |
p. |
artikel |
124 |
A systematic literature review on chaotic maps-based image security techniques
|
Singh, Dilbag |
|
|
13-14 |
C |
p. |
artikel |
125 |
A systematic literature review on cross-language source code clone detection
|
Alshabib, Asra Sulaiman |
|
|
13-14 |
C |
p. |
artikel |
126 |
A systematic literature review on machine learning applications for consumer sentiment analysis using online reviews
|
Jain, Praphula Kumar |
|
|
13-14 |
C |
p. |
artikel |
127 |
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations
|
Kondaveeti, Hari Kishan |
|
|
13-14 |
C |
p. |
artikel |
128 |
A systematic literature review on the use of machine learning in code clone research
|
Kaur, Manpreet |
|
|
13-14 |
C |
p. |
artikel |
129 |
A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation
|
Agarwal, Neha |
|
|
13-14 |
C |
p. |
artikel |
130 |
A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes
|
Vallejo-Correa, Paola |
|
|
13-14 |
C |
p. |
artikel |
131 |
A systematic mapping study of API usability evaluation methods
|
Rauf, Irum |
|
2019 |
13-14 |
C |
p. 49-68 |
artikel |
132 |
A systematic mapping study of clone visualization
|
Hammad, Muhammad |
|
|
13-14 |
C |
p. |
artikel |
133 |
A systematic review of explainability in computational intelligence for optimization
|
Almeida, José |
|
|
13-14 |
C |
p. |
artikel |
134 |
A systematic review of quantum image processing: Representation, applications and future perspectives
|
Farooq, Umar |
|
|
13-14 |
C |
p. |
artikel |
135 |
A systematic review on Deep Learning approaches for IoT security
|
Aversano, Lerina |
|
|
13-14 |
C |
p. |
artikel |
136 |
A systematic review on moving objects’ trajectory data and trajectory data warehouse modeling
|
Oueslati, Wided |
|
|
13-14 |
C |
p. |
artikel |
137 |
A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions
|
Kaur, Navjeet |
|
|
13-14 |
C |
p. |
artikel |
138 |
A systematic survey on fault-tolerant solutions for distributed data analytics: Taxonomy, comparison, and future directions
|
Isukapalli, Sucharitha |
|
|
13-14 |
C |
p. |
artikel |
139 |
A taxonomy and survey of attacks against machine learning
|
Pitropakis, Nikolaos |
|
|
13-14 |
C |
p. |
artikel |
140 |
Attention-based transformer models for image captioning across languages: An in-depth survey and evaluation
|
Albadarneh, Israa A. |
|
|
13-14 |
C |
p. |
artikel |
141 |
Attention to news and its dissemination on Twitter: A survey
|
Orellana-Rodriguez, Claudia |
|
2018 |
13-14 |
C |
p. 74-94 |
artikel |
142 |
Automated knowledge base management: A survey
|
Martinez-Gil, Jorge |
|
2015 |
13-14 |
C |
p. 1-9 9 p. |
artikel |
143 |
Automatic hand gesture recognition using hybrid meta-heuristic-based feature selection and classification with Dynamic Time Warping
|
Kowdiki, Manisha |
|
|
13-14 |
C |
p. |
artikel |
144 |
Auto-scaling mechanisms in serverless computing: A comprehensive review
|
Tari, Mohammad |
|
|
13-14 |
C |
p. |
artikel |
145 |
Autoscaling techniques in cloud-native computing: A comprehensive survey
|
Jeong, Byeonghui |
|
|
13-14 |
C |
p. |
artikel |
146 |
Backbones-review: Feature extractor networks for deep learning and deep reinforcement learning approaches in computer vision
|
Elharrouss, Omar |
|
|
13-14 |
C |
p. |
artikel |
147 |
Background subtraction in real applications: Challenges, current models and future directions
|
Garcia-Garcia, Belmar |
|
|
13-14 |
C |
p. |
artikel |
148 |
Beyond linear subspace clustering: A comparative study of nonlinear manifold clustering algorithms
|
Abdolali, Maryam |
|
|
13-14 |
C |
p. |
artikel |
149 |
Big data and IoT-based applications in smart environments: A systematic review
|
Hajjaji, Yosra |
|
|
13-14 |
C |
p. |
artikel |
150 |
Big networks: A survey
|
Bedru, Hayat Dino |
|
|
13-14 |
C |
p. |
artikel |
151 |
Blockchain-based recommender systems: Applications, challenges and future opportunities
|
Himeur, Yassine |
|
|
13-14 |
C |
p. |
artikel |
152 |
Blockchain technology in the energy sector: From basic research to real world applications
|
Wang, Qiang |
|
|
13-14 |
C |
p. |
artikel |
153 |
Blockchain verification and validation: Techniques, challenges, and research directions
|
Marijan, Dusica |
|
|
13-14 |
C |
p. |
artikel |
154 |
Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages
|
Kazi, Samreen |
|
|
13-14 |
C |
p. |
artikel |
155 |
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems
|
Liu, Yizhong |
|
|
13-14 |
C |
p. |
artikel |
156 |
Caching methodologies in Content centric networking (CCN): A survey
|
Lal, Nidhi |
|
2019 |
13-14 |
C |
p. 39-50 |
artikel |
157 |
Catastrophic event phenomena in communication networks: A survey
|
Dabrowski, Christopher |
|
2015 |
13-14 |
C |
p. 10-45 36 p. |
artikel |
158 |
Change point detection in social networks—Critical review with experiments
|
Kendrick, Lucy |
|
2018 |
13-14 |
C |
p. 1-13 |
artikel |
159 |
Chaos-based video encryption techniques: A review
|
Gao, Suo |
|
|
13-14 |
C |
p. |
artikel |
160 |
Chaos Game Optimization: A comprehensive study of its variants, applications, and future directions
|
Oueslati, Raja |
|
|
13-14 |
C |
p. |
artikel |
161 |
Characterising harmful API uses and repair techniques: Insights from a systematic review
|
Ochoa, Lina |
|
|
13-14 |
C |
p. |
artikel |
162 |
Characterizing DDoS attacks and flash events: Review, research gaps and future directions
|
Behal, Sunny |
|
2017 |
13-14 |
C |
p. 101-114 14 p. |
artikel |
163 |
Citations, research topics and active countries in software engineering: A bibliometrics study
|
Garousi, Vahid |
|
2016 |
13-14 |
C |
p. 56-77 22 p. |
artikel |
164 |
Cloud services selection: A systematic review and future research directions
|
Thakur, Neha |
|
|
13-14 |
C |
p. |
artikel |
165 |
Cluster ensembles: A survey of approaches with recent extensions and applications
|
Boongoen, Tossapon |
|
2018 |
13-14 |
C |
p. 1-25 |
artikel |
166 |
Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions
|
Rawat, Piyush |
|
|
13-14 |
C |
p. |
artikel |
167 |
Combining UML and ontology: An exploratory survey
|
Mejhed Mkhinini, Meriem |
|
|
13-14 |
C |
p. |
artikel |
168 |
Community detection in node-attributed social networks: A survey
|
Chunaev, Petr |
|
|
13-14 |
C |
p. |
artikel |
169 |
Compactors for parameterized counting problems
|
Thilikos, Dimitrios M. |
|
|
13-14 |
C |
p. |
artikel |
170 |
Comparative analysis of Android and iOS from security viewpoint
|
Garg, Shivi |
|
|
13-14 |
C |
p. |
artikel |
171 |
Comparative analysis on cross-modal information retrieval: A review
|
Kaur, Parminder |
|
|
13-14 |
C |
p. |
artikel |
172 |
Comparative study for 8 computational intelligence algorithms for human identification
|
Abdulrahman, Shaymaa Adnan |
|
|
13-14 |
C |
p. |
artikel |
173 |
Comprehensive analysis of embeddings and pre-training in NLP
|
Tripathy, Jatin Karthik |
|
|
13-14 |
C |
p. |
artikel |
174 |
Comprehensive survey on resource allocation for edge-computing-enabled metaverse
|
Baidya, Tanmay |
|
|
13-14 |
C |
p. |
artikel |
175 |
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE)
|
Anowar, Farzana |
|
|
13-14 |
C |
p. |
artikel |
176 |
Conjunctive and Boolean grammars: The true general case of the context-free grammars
|
Okhotin, Alexander |
|
2013 |
13-14 |
C |
p. 27-59 33 p. |
artikel |
177 |
Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams
|
Morandini, Marcelo |
|
|
13-14 |
C |
p. |
artikel |
178 |
Content and link-structure perspective of ranking webpages: A review
|
Ali, Fayyaz |
|
|
13-14 |
C |
p. |
artikel |
179 |
Content-driven music recommendation: Evolution, state of the art, and challenges
|
Deldjoo, Yashar |
|
|
13-14 |
C |
p. |
artikel |
180 |
Context Aware Recommendation Systems: A review of the state of the art techniques
|
Kulkarni, Saurabh |
|
|
13-14 |
C |
p. |
artikel |
181 |
Conversational agents in business: A systematic literature review and future research directions
|
Bavaresco, Rodrigo |
|
|
13-14 |
C |
p. |
artikel |
182 |
Corrigendum to “Catastrophic event phenomena in communication networks: A survey” [Comput. Sci. Rev. 18 (2015) 10–45]
|
Dabrowski, Christopher |
|
2016 |
13-14 |
C |
p. 51- 1 p. |
artikel |
183 |
Crowdsourcing: A taxonomy and systematic mapping study
|
Hosseini, Mahmood |
|
2015 |
13-14 |
C |
p. 43-69 27 p. |
artikel |
184 |
Current status and key issues in image steganography: A survey
|
Subhedar, Mansi S. |
|
2014 |
13-14 |
C |
p. 95-113 19 p. |
artikel |
185 |
Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey
|
Falkowski-Gilski, Przemysław |
|
|
13-14 |
C |
p. |
artikel |
186 |
Cyber-insurance survey
|
Marotta, Angelica |
|
2017 |
13-14 |
C |
p. 35-61 27 p. |
artikel |
187 |
Cyber security training for critical infrastructure protection: A literature review
|
Chowdhury, Nabin |
|
|
13-14 |
C |
p. |
artikel |
188 |
DAG-based attack and defense modeling: Don’t miss the forest for the attack trees
|
Kordy, Barbara |
|
2014 |
13-14 |
C |
p. 1-38 38 p. |
artikel |
189 |
Data Mining and Information Retrieval in the 21st century: A bibliographic review
|
Liu, Jiaying |
|
|
13-14 |
C |
p. |
artikel |
190 |
Data mining of social networks represented as graphs
|
Nettleton, David F. |
|
2013 |
13-14 |
C |
p. 1-34 34 p. |
artikel |
191 |
DDoS attacks & defense mechanisms in SDN-enabled cloud: Taxonomy, review and research challenges
|
Chahal, Jasmeen Kaur |
|
|
13-14 |
C |
p. |
artikel |
192 |
Dealing with high dimensional multi-view data: A comprehensive review of non-negative matrix factorization approaches in data mining and machine learning
|
Soleymani, Nafiseh |
|
|
13-14 |
C |
p. |
artikel |
193 |
Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems
|
Manimaran, Praveensankar |
|
|
13-14 |
C |
p. |
artikel |
194 |
Decomposition into low-rank plus additive matrices for background/foreground separation: A review for a comparative evaluation with a large-scale dataset
|
Bouwmans, Thierry |
|
2017 |
13-14 |
C |
p. 1-71 71 p. |
artikel |
195 |
Deep anomaly detection for time series: A survey
|
Jia, Xudong |
|
|
13-14 |
C |
p. |
artikel |
196 |
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
|
Dixit, Priyanka |
|
|
13-14 |
C |
p. |
artikel |
197 |
Deep learning for hyperspectral image classification: A survey
|
Kumar, Vinod |
|
|
13-14 |
C |
p. |
artikel |
198 |
Deep learning for intelligent demand response and smart grids: A comprehensive survey
|
Boopathy, Prabadevi |
|
|
13-14 |
C |
p. |
artikel |
199 |
Deep learning for unmanned aerial vehicles detection: A review
|
Al-lQubaydhi, Nader |
|
|
13-14 |
C |
p. |
artikel |
200 |
Deep Learning Methods for Multi-Species Animal Re-identification and Tracking – a Survey
|
Ravoor, Prashanth C. |
|
|
13-14 |
C |
p. |
artikel |
201 |
Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions
|
Ahmad, Shahnawaz |
|
|
13-14 |
C |
p. |
artikel |
202 |
Deep learning with the generative models for recommender systems: A survey
|
Nahta, Ravi |
|
|
13-14 |
C |
p. |
artikel |
203 |
Deep study on autonomous learning techniques for complex pattern recognition in interconnected information systems
|
Amiri, Zahra |
|
|
13-14 |
C |
p. |
artikel |
204 |
Defense strategies for Adversarial Machine Learning: A survey
|
Bountakas, Panagiotis |
|
|
13-14 |
C |
p. |
artikel |
205 |
Denoising and completion filters for human motion software: A survey with code
|
Martini, Enrico |
|
|
13-14 |
C |
p. |
artikel |
206 |
Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions
|
Singh, Jagdeep |
|
|
13-14 |
C |
p. |
artikel |
207 |
Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges
|
Ahmad, Kashif |
|
|
13-14 |
C |
p. |
artikel |
208 |
Development of improved whale optimization-based FCM clustering for image watermarking
|
Soppari, Kavitha |
|
|
13-14 |
C |
p. |
artikel |
209 |
DevOps and software quality: A systematic mapping
|
Mishra, Alok |
|
|
13-14 |
C |
p. |
artikel |
210 |
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art
|
AlSabhany, Ahmed A. |
|
|
13-14 |
C |
p. |
artikel |
211 |
Digital image watermarking using deep learning: A survey
|
Hosny, Khalid M. |
|
|
13-14 |
C |
p. |
artikel |
212 |
Digital to quantum watermarking: A journey from past to present and into the future
|
Dhar, Swapnaneel |
|
|
13-14 |
C |
p. |
artikel |
213 |
Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review
|
Qasim, Asaad F. |
|
2018 |
13-14 |
C |
p. 45-60 |
artikel |
214 |
Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions
|
Bhardwaj, Aanshi |
|
|
13-14 |
C |
p. |
artikel |
215 |
Distributed virtual machine consolidation: A systematic mapping study
|
Ashraf, Adnan |
|
2018 |
13-14 |
C |
p. 118-130 |
artikel |
216 |
Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions
|
Chaâri, Rihab |
|
|
13-14 |
C |
p. |
artikel |
217 |
Eco-assessment software: A quantitative review involving papers and patents
|
Spreafico, Christian |
|
|
13-14 |
C |
p. |
artikel |
218 |
Edge-AI empowered Cyber-Physical Systems: A comprehensive review on performance analysis
|
Singh, Raj Kumar Baliyar |
|
|
13-14 |
C |
p. |
artikel |
219 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
220 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
221 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
222 |
Editorial Board
|
|
|
2017 |
13-14 |
C |
p. IFC- 1 p. |
artikel |
223 |
Editorial Board
|
|
|
2018 |
13-14 |
C |
p. ii |
artikel |
224 |
Editorial Board
|
|
|
2017 |
13-14 |
C |
p. IFC |
artikel |
225 |
Editorial Board
|
|
|
2018 |
13-14 |
C |
p. ii |
artikel |
226 |
Editorial Board
|
|
|
2018 |
13-14 |
C |
p. ii |
artikel |
227 |
Editorial Board
|
|
|
2019 |
13-14 |
C |
p. ii |
artikel |
228 |
Editorial Board
|
|
|
2018 |
13-14 |
C |
p. ii |
artikel |
229 |
Editorial Board
|
|
|
2019 |
13-14 |
C |
p. ii |
artikel |
230 |
Editorial Board
|
|
|
2019 |
13-14 |
C |
p. ii |
artikel |
231 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
232 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
233 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
234 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
235 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
236 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
237 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
238 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
239 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
240 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
241 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
242 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
243 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
244 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
245 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
246 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
247 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
248 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
249 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
250 |
Editorial Board
|
|
|
|
13-14 |
C |
p. |
artikel |
251 |
Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey
|
Ullah, Shamsher |
|
|
13-14 |
C |
p. |
artikel |
252 |
Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques
|
Wang, Rui |
|
|
13-14 |
C |
p. |
artikel |
253 |
Empowering multimodal analysis with visualization: A survey
|
Wang, Jiachen |
|
|
13-14 |
C |
p. |
artikel |
254 |
Energy aware optimized clustering for hierarchical routing in wireless sensor network
|
Yadav, Rakesh Kumar |
|
|
13-14 |
C |
p. |
artikel |
255 |
Energy, performance and cost efficient cloud datacentres: A survey
|
Khan, Ayaz Ali |
|
|
13-14 |
C |
p. |
artikel |
256 |
Energy price prediction using data-driven models: A decade review
|
Lu, Hongfang |
|
|
13-14 |
C |
p. |
artikel |
257 |
Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation
|
Tama, Bayu Adhi |
|
|
13-14 |
C |
p. |
artikel |
258 |
Evaluation of information retrieval systems using structural equation modeling
|
Melucci, Massimo |
|
2019 |
13-14 |
C |
p. 1-18 |
artikel |
259 |
Event detection in online social network: Methodologies, state-of-art, and evolution
|
Hu, Xiangyu |
|
|
13-14 |
C |
p. |
artikel |
260 |
Facial expression and body gesture emotion recognition: A systematic review on the use of visual data in affective computing
|
Leong, Sze Chit |
|
|
13-14 |
C |
p. |
artikel |
261 |
Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions
|
Wang, Miaomiao |
|
|
13-14 |
C |
p. |
artikel |
262 |
Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools
|
Ruijters, Enno |
|
2015 |
13-14 |
C |
p. 29-62 34 p. |
artikel |
263 |
Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019
|
Al-Hashedi, Khaled Gubran |
|
|
13-14 |
C |
p. |
artikel |
264 |
Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges
|
Hazra, Abhishek |
|
|
13-14 |
C |
p. |
artikel |
265 |
From accuracy to approximation: A survey on approximate homomorphic encryption and its applications
|
Liu, Weinan |
|
|
13-14 |
C |
p. |
artikel |
266 |
From past to present: A survey of malicious URL detection techniques, datasets and code repositories
|
Tian, Ye |
|
|
13-14 |
C |
p. |
artikel |
267 |
Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities
|
Adnan, Mohd Hirzi |
|
|
13-14 |
C |
p. |
artikel |
268 |
Future FANET with application and enabling techniques: Anatomization and sustainability issues
|
Srivastava, Ashish |
|
|
13-14 |
C |
p. |
artikel |
269 |
Future of cyberspace: A critical review of standard security protocols in the post-quantum era
|
Taleby Ahvanooey, Milad |
|
|
13-14 |
C |
p. |
artikel |
270 |
General classification of the authenticated encryption schemes for the CAESAR competition
|
Abed, Farzaneh |
|
2016 |
13-14 |
C |
p. 13-26 14 p. |
artikel |
271 |
Generalizing input-driven languages: Theoretical and practical benefits
|
Mandrioli, Dino |
|
2018 |
13-14 |
C |
p. 61-87 |
artikel |
272 |
Getting into the mind of an “in-auction” fraud perpetrator
|
Trevathan, Jarrod |
|
2018 |
13-14 |
C |
p. 1-15 |
artikel |
273 |
Graph grammars according to the type of input and manipulated data: A survey
|
Albane, Saadia |
|
2018 |
13-14 |
C |
p. 178-203 |
artikel |
274 |
Graph spanners: A tutorial review
|
Ahmed, Reyan |
|
|
13-14 |
C |
p. |
artikel |
275 |
Harnessing Heterogeneous Information Networks: A systematic literature review
|
Outemzabet, Leila |
|
|
13-14 |
C |
p. |
artikel |
276 |
Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing
|
Jackson, Jehoiada |
|
|
13-14 |
C |
p. |
artikel |
277 |
Higher order mutation testing: A Systematic Literature Review
|
Ghiduk, Ahmed S. |
|
2017 |
13-14 |
C |
p. 29-48 20 p. |
artikel |
278 |
Homomorphic encryption systems statement: Trends and challenges
|
Alaya, Bechir |
|
|
13-14 |
C |
p. |
artikel |
279 |
How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management
|
Hamid, Rula A. |
|
|
13-14 |
C |
p. |
artikel |
280 |
Hybridizations of evolutionary algorithms with Large Neighborhood Search
|
Blum, Christian |
|
|
13-14 |
C |
p. |
artikel |
281 |
Hyperbolic geometric graph representation learning: A survey
|
Wang, Siman |
|
|
13-14 |
C |
p. |
artikel |
282 |
I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion
|
Keshavarzi, Masoudeh |
|
|
13-14 |
C |
p. |
artikel |
283 |
Image processing and artificial intelligence for apple detection and localization: A comprehensive review
|
Azizi, Afshin |
|
|
13-14 |
C |
p. |
artikel |
284 |
Improved node localization using K-means clustering for Wireless Sensor Networks
|
El Khediri, Salim |
|
|
13-14 |
C |
p. |
artikel |
285 |
Indoor environment propagation review
|
Obeidat, H. |
|
|
13-14 |
C |
p. |
artikel |
286 |
Indoor location based services challenges, requirements and usability of current solutions
|
Basiri, Anahid |
|
2017 |
13-14 |
C |
p. 1-12 12 p. |
artikel |
287 |
Indoor location identification technologies for real-time IoT-based applications: An inclusive survey
|
Oguntala, George |
|
2018 |
13-14 |
C |
p. 55-79 |
artikel |
288 |
Influence decision models: From cooperative game theory to social network analysis
|
Molinero, Xavier |
|
|
13-14 |
C |
p. |
artikel |
289 |
In praise of homomorphisms
|
Hell, Pavol |
|
|
13-14 |
C |
p. |
artikel |
290 |
Insight into code clone management through refactoring: a systematic literature review
|
Kaur, Manpreet |
|
|
13-14 |
C |
p. |
artikel |
291 |
Integrating blockchain technology into the energy sector — from theory of blockchain to research and application of energy blockchain
|
Wang, Qiang |
|
|
13-14 |
C |
p. |
artikel |
292 |
Integration of SDN into UAV, edge computing, & Blockchain: A review, challenges, & future directions
|
Modi, Tejas M. |
|
|
13-14 |
C |
p. |
artikel |
293 |
Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey
|
Mishra, Shaili |
|
|
13-14 |
C |
p. |
artikel |
294 |
Intelligent food processing: Journey from artificial neural network to deep learning
|
Nayak, Janmenjoy |
|
|
13-14 |
C |
p. |
artikel |
295 |
Intelligent retrieval and classification in three-dimensional biomedical images — A systematic mapping
|
Bergamasco, Leila Cristina C. |
|
2019 |
13-14 |
C |
p. 19-38 |
artikel |
296 |
Intelligent visual analytics for food safety: A comprehensive review
|
Zhang, Qinghui |
|
|
13-14 |
C |
p. |
artikel |
297 |
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain
|
Rafique, Wajid |
|
|
13-14 |
C |
p. |
artikel |
298 |
Intervention scenarios and robot capabilities for support, guidance and health monitoring for the elderly
|
Aldawsari, Saja |
|
|
13-14 |
C |
p. |
artikel |
299 |
Introducing article numbering to Computer Science Review
|
Li, Jimeng |
|
|
13-14 |
C |
p. |
artikel |
300 |
ISO/IEC quality standards for AI engineering
|
Oviedo, Jesús |
|
|
13-14 |
C |
p. |
artikel |
301 |
Julia language in machine learning: Algorithms, applications, and open issues
|
Gao, Kaifeng |
|
|
13-14 |
C |
p. |
artikel |
302 |
Landscape of IoT security
|
Schiller, Eryk |
|
|
13-14 |
C |
p. |
artikel |
303 |
Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions
|
Atitallah, Safa Ben |
|
|
13-14 |
C |
p. |
artikel |
304 |
Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review
|
Ahmad, Hafiz Farooq |
|
|
13-14 |
C |
p. |
artikel |
305 |
Localization schemes for Underwater Acoustic Sensor Networks - A Review
|
Toky, Archana |
|
|
13-14 |
C |
p. |
artikel |
306 |
Location management in mobile network: A survey
|
Mukherjee, Anwesha |
|
2016 |
13-14 |
C |
p. 1-14 14 p. |
artikel |
307 |
Logo and seal based administrative document image retrieval: A survey
|
Alaei, Alireza |
|
2016 |
13-14 |
C |
p. 47-63 17 p. |
artikel |
308 |
Low-light multimodal object detection: A survey
|
Li, Gang |
|
|
13-14 |
C |
p. |
artikel |
309 |
Machine learning algorithms for social media analysis: A survey
|
T.K., Balaji |
|
|
13-14 |
C |
p. |
artikel |
310 |
Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm
|
Kotsiopoulos, Thanasis |
|
|
13-14 |
C |
p. |
artikel |
311 |
Machine learning and multi-agent systems in oil and gas industry applications: A survey
|
Hanga, Khadijah M. |
|
|
13-14 |
C |
p. |
artikel |
312 |
Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions
|
Ayo, Femi Emmanuel |
|
|
13-14 |
C |
p. |
artikel |
313 |
Machine learning through the lens of e-commerce initiatives: An up-to-date systematic literature review
|
Micol Policarpo, Lucas |
|
|
13-14 |
C |
p. |
artikel |
314 |
Malicious application detection in android — A systematic literature review
|
Sharma, Tejpal |
|
|
13-14 |
C |
p. |
artikel |
315 |
Maria Serna and her years in Patras
|
Spirakis, Paul G. |
|
|
13-14 |
C |
p. |
artikel |
316 |
Maria Serna in Barcelona
|
Àlvarez, Carme |
|
|
13-14 |
C |
p. |
artikel |
317 |
Maria Serna’s contributions to adversarial queuing theory
|
Blesa, Maria J. |
|
|
13-14 |
C |
p. |
artikel |
318 |
Maritime search and rescue missions with aerial images: A survey
|
Martinez-Esteso, Juan P. |
|
|
13-14 |
C |
p. |
artikel |
319 |
Maximal cliques summarization: Principles, problem classification, and algorithmic approaches
|
D’Elia, Marco |
|
|
13-14 |
C |
p. |
artikel |
320 |
Maximum cliques in graphs with small intersection number and random intersection graphs
|
Nikoletseas, Sotiris E. |
|
|
13-14 |
C |
p. |
artikel |
321 |
mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects
|
Shuwandy, Moceheb Lazam |
|
|
13-14 |
C |
p. |
artikel |
322 |
Mobile robot localization: Current challenges and future prospective
|
Ullah, Inam |
|
|
13-14 |
C |
p. |
artikel |
323 |
Model-based testing using UML activity diagrams: A systematic mapping study
|
Ahmad, Tanwir |
|
2019 |
13-14 |
C |
p. 98-112 |
artikel |
324 |
Modelling web-service uncertainty: The angel/daemon approach
|
Gabarro, Joaquim |
|
|
13-14 |
C |
p. |
artikel |
325 |
More than a framework: Sketching out technical enablers for natural language-based source code generation
|
Yang, Chen |
|
|
13-14 |
C |
p. |
artikel |
326 |
Motif discovery in networks: A survey
|
Yu, Shuo |
|
|
13-14 |
C |
p. |
artikel |
327 |
Moving objects detection with a moving camera: A comprehensive review
|
Chapel, Marie-Neige |
|
|
13-14 |
C |
p. |
artikel |
328 |
Multidisciplinary Pattern Recognition applications: A review
|
Paolanti, Marina |
|
|
13-14 |
C |
p. |
artikel |
329 |
Multilayer network simplification: Approaches, models and methods
|
Interdonato, Roberto |
|
|
13-14 |
C |
p. |
artikel |
330 |
Multiple clusterings: Recent advances and perspectives
|
Yu, Guoxian |
|
|
13-14 |
C |
p. |
artikel |
331 |
Named Data Networking: A survey
|
Saxena, Divya |
|
2016 |
13-14 |
C |
p. 15-55 41 p. |
artikel |
332 |
Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey
|
Singh, Abhilash |
|
|
13-14 |
C |
p. |
artikel |
333 |
Near infrared face recognition: A literature survey
|
Farokhi, Sajad |
|
2016 |
13-14 |
C |
p. 1-17 17 p. |
artikel |
334 |
Negative selection in anomaly detection—A survey
|
Saurabh, Praneet |
|
|
13-14 |
C |
p. |
artikel |
335 |
Network embedding: Taxonomies, frameworks and applications
|
Hou, Mingliang |
|
|
13-14 |
C |
p. |
artikel |
336 |
Network resource management mechanisms in SDN enabled WSNs: A comprehensive review
|
Tyagi, Vikas |
|
|
13-14 |
C |
p. |
artikel |
337 |
Neural Natural Language Processing for unstructured data in electronic health records: A review
|
Li, Irene |
|
|
13-14 |
C |
p. |
artikel |
338 |
Neurological and physiological measures to evaluate the usability and user-experience (UX) of information systems: A systematic literature review
|
Zaki, Tarannum |
|
|
13-14 |
C |
p. |
artikel |
339 |
New trends in influence maximization models
|
Azaouzi, Mehdi |
|
|
13-14 |
C |
p. |
artikel |
340 |
New trends on moving object detection in video images captured by a moving camera: A survey
|
Yazdi, Mehran |
|
2018 |
13-14 |
C |
p. 157-177 |
artikel |
341 |
NLP-based techniques for Cyber Threat Intelligence
|
Arazzi, Marco |
|
|
13-14 |
C |
p. |
artikel |
342 |
[No title]
|
Bálek, Martin |
|
2013 |
13-14 |
C |
p. 35-46 12 p. |
artikel |
343 |
[No title]
|
Zuhair Mahmoud, Khaled |
|
2013 |
13-14 |
C |
p. 31-34 4 p. |
artikel |
344 |
[No title]
|
Díaz, Josep |
|
|
13-14 |
C |
p. |
artikel |
345 |
Offline recognition of handwritten Indic scripts: A state-of-the-art survey and future perspectives
|
Sharma, Reya |
|
|
13-14 |
C |
p. |
artikel |
346 |
Offline Script Identification from multilingual Indic-script documents: A state-of-the-art
|
Singh, Pawan Kumar |
|
2015 |
13-14 |
C |
p. 1-28 28 p. |
artikel |
347 |
On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
|
Kumar, Rakesh |
|
2019 |
13-14 |
C |
p. 1-48 |
artikel |
348 |
On the role and the importance of features for background modeling and foreground detection
|
Bouwmans, Thierry |
|
2018 |
13-14 |
C |
p. 26-91 |
artikel |
349 |
Ontology learning: Grand tour and challenges
|
Khadir, Ahlem Chérifa |
|
|
13-14 |
C |
p. |
artikel |
350 |
Open-source IP cores for space: A processor-level perspective on soft errors in the RISC-V era
|
Di Mascio, Stefano |
|
|
13-14 |
C |
p. |
artikel |
351 |
Optimized traffic engineering in Software Defined Wireless Network based IoT (SDWN-IoT): State-of-the-art, research opportunities and challenges
|
Kumar, Rohit |
|
|
13-14 |
C |
p. |
artikel |
352 |
Parameterized algorithms on geometric intersection graphs
|
Xue, Jie |
|
|
13-14 |
C |
p. |
artikel |
353 |
Parameterized analysis and crossing minimization problems
|
Zehavi, Meirav |
|
|
13-14 |
C |
p. |
artikel |
354 |
Parametric survey on cross-layer designs for wireless sensor networks
|
Sah, Dinesh Kumar |
|
2018 |
13-14 |
C |
p. 112-134 |
artikel |
355 |
PCG signals for biometric authentication systems: An in-depth review
|
El-Dahshan, El-Sayed A. |
|
|
13-14 |
C |
p. |
artikel |
356 |
Polynomial property testing
|
Gishboliner, Lior |
|
|
13-14 |
C |
p. |
artikel |
357 |
Practical algorithms for MSO model-checking on tree-decomposable graphs
|
Langer, Alexander |
|
2014 |
13-14 |
C |
p. 39-74 36 p. |
artikel |
358 |
Prediction methods and applications in the science of science: A survey
|
Hou, Jie |
|
|
13-14 |
C |
p. |
artikel |
359 |
Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review
|
Matias, Igor |
|
|
13-14 |
C |
p. |
artikel |
360 |
Preface
|
Díaz, Josep |
|
|
13-14 |
C |
p. |
artikel |
361 |
Privacy and verifiability in voting systems: Methods, developments and trends
|
Jonker, Hugo |
|
2013 |
13-14 |
C |
p. 1-30 30 p. |
artikel |
362 |
Privacy issues in intrusion detection systems: A taxonomy, survey and future directions
|
Niksefat, Salman |
|
2017 |
13-14 |
C |
p. 69-78 10 p. |
artikel |
363 |
Privacy preserving publication of relational and transaction data: Survey on the anonymization of patient data
|
Puri, Vartika |
|
2019 |
13-14 |
C |
p. 45-61 |
artikel |
364 |
Private set intersection: A systematic literature review
|
Morales, Daniel |
|
|
13-14 |
C |
p. |
artikel |
365 |
Progress in context-aware recommender systems — An overview
|
Raza, Shaina |
|
2019 |
13-14 |
C |
p. 84-97 |
artikel |
366 |
Publication trends in gamification: A systematic mapping study
|
Kasurinen, Jussi |
|
2018 |
13-14 |
C |
p. 33-44 |
artikel |
367 |
Publisher’s Note
|
Faez, Telli |
|
2017 |
13-14 |
C |
p. 31 |
artikel |
368 |
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges
|
Babu, Ponnuru Raveendra |
|
|
13-14 |
C |
p. |
artikel |
369 |
Quantum walk and its application domains: A systematic review
|
Kadian, Karuna |
|
|
13-14 |
C |
p. |
artikel |
370 |
Real-time detection of shill bidding in online auctions: A literature review
|
Majadi, Nazia |
|
2017 |
13-14 |
C |
p. 1-18 18 p. |
artikel |
371 |
Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review
|
Ingale, Anupama K. |
|
|
13-14 |
C |
p. |
artikel |
372 |
Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives
|
Adhikari, Deepak |
|
|
13-14 |
C |
p. |
artikel |
373 |
Recent Named Entity Recognition and Classification techniques: A systematic review
|
Goyal, Archana |
|
2018 |
13-14 |
C |
p. 21-43 |
artikel |
374 |
Relational intelligence recognition in online social networks — A survey
|
Zhang, Ji |
|
|
13-14 |
C |
p. |
artikel |
375 |
Remarks on some misconceptions about unequal probability sampling without replacement
|
Tillé, Yves |
|
|
13-14 |
C |
p. |
artikel |
376 |
Reproducibility, Replicability and Repeatability: A survey of reproducible research with a focus on high performance computing
|
Antunes, Benjamin |
|
|
13-14 |
C |
p. |
artikel |
377 |
Research communities in cyber security: A comprehensive literature review
|
Katsikeas, Sotirios |
|
|
13-14 |
C |
p. |
artikel |
378 |
Research communities in cyber security vulnerability assessments: A comprehensive literature review
|
Heiding, Fredrik |
|
|
13-14 |
C |
p. |
artikel |
379 |
Resilience of deep learning applications: A systematic literature review of analysis and hardening techniques
|
Bolchini, Cristiana |
|
|
13-14 |
C |
p. |
artikel |
380 |
Review of Distributed Quantum Computing: From single QPU to High Performance Quantum Computing
|
Barral, David |
|
|
13-14 |
C |
p. |
artikel |
381 |
Review of the use of human senses and capabilities in cryptography
|
Halunen, Kimmo |
|
|
13-14 |
C |
p. |
artikel |
382 |
Revolutionizing textual data insights: A comprehensive review of the dual relationship between transformers and clustering in textual data analysis
|
Aghayengejeh, Nazila Pourhaji |
|
|
13-14 |
C |
p. |
artikel |
383 |
Robust defense mechanisms for protecting Wireless Sensor Networks from Denial-of-Service Threats, A comprehensive in-depth analysis
|
Osamy, Walid |
|
|
13-14 |
C |
p. |
artikel |
384 |
Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis
|
Chakraborty, Rajat |
|
|
13-14 |
C |
p. |
artikel |
385 |
Role of machine learning in medical research: A survey
|
Garg, Arunim |
|
|
13-14 |
C |
p. |
artikel |
386 |
Routing optimization strategies in data center networks: A survey
|
Xu, Bin |
|
|
13-14 |
C |
p. |
artikel |
387 |
Sand cat swarm optimization: A comprehensive review of algorithmic advances, structural enhancements, and engineering applications
|
Hosseinzadeh, Mehdi |
|
|
13-14 |
C |
p. |
artikel |
388 |
Scenario analysis, from BigData to black swan
|
Batrouni, Marwan |
|
2018 |
13-14 |
C |
p. 131-139 |
artikel |
389 |
Scheduling in distributed systems: A cloud computing perspective
|
Bittencourt, Luiz F. |
|
2018 |
13-14 |
C |
p. 31-54 |
artikel |
390 |
Science of Scientific Team Science: A survey
|
Yu, Shuo |
|
2019 |
13-14 |
C |
p. 72-83 |
artikel |
391 |
Secret sharing: A comprehensive survey, taxonomy and applications
|
Chattopadhyay, Arup Kumar |
|
|
13-14 |
C |
p. |
artikel |
392 |
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions
|
Perez, Alfredo J. |
|
|
13-14 |
C |
p. |
artikel |
393 |
Secure storage—Confidentiality and authentication
|
Benadjila, Ryad |
|
|
13-14 |
C |
p. |
artikel |
394 |
Securing microservices and microservice architectures: A systematic mapping study
|
Hannousse, Abdelhakim |
|
|
13-14 |
C |
p. |
artikel |
395 |
Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions
|
Adil, Muhammad |
|
|
13-14 |
C |
p. |
artikel |
396 |
Security and privacy aspects in MapReduce on clouds: A survey
|
Derbeko, Philip |
|
2016 |
13-14 |
C |
p. 1-28 28 p. |
artikel |
397 |
Security in fog computing: A systematic review on issues, challenges and solutions
|
Rezapour, Ronita |
|
|
13-14 |
C |
p. |
artikel |
398 |
Security of Power Line Communication systems: Issues, limitations and existing solutions
|
Yaacoub, Jean Paul A. |
|
|
13-14 |
C |
p. |
artikel |
399 |
Semantic Web Services testing: A Systematic Mapping study
|
de Souza Neto, João B. |
|
2018 |
13-14 |
C |
p. 140-156 |
artikel |
400 |
Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet
|
Asghari, Ali |
|
|
13-14 |
C |
p. |
artikel |
401 |
Smart Farming in Europe
|
Moysiadis, Vasileios |
|
|
13-14 |
C |
p. |
artikel |
402 |
Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges
|
Faheem, M. |
|
2018 |
13-14 |
C |
p. 1-30 |
artikel |
403 |
Social computing for software engineering: A mapping study
|
Ardini, Amalia |
|
2014 |
13-14 |
C |
p. 75-93 19 p. |
artikel |
404 |
Software as storytelling: A systematic literature review
|
Ciancarini, Paolo |
|
|
13-14 |
C |
p. |
artikel |
405 |
Some algorithms under non-parametric framework versus an unsupervised approach
|
Ray, Bimal Kumar |
|
|
13-14 |
C |
p. |
artikel |
406 |
Some results of Maria Serna on strategic games: Complexity of equilibria and models
|
Àlvarez, Carme |
|
|
13-14 |
C |
p. |
artikel |
407 |
Some Studies on Performability Analysis of Safety Critical Systems
|
Ahamad, Shakeel |
|
|
13-14 |
C |
p. |
artikel |
408 |
Sorting on graphs by adjacent swaps using permutation groups
|
Kim, Dohan |
|
2016 |
13-14 |
C |
p. 89-105 17 p. |
artikel |
409 |
State of the art on quality control for data streams: A systematic literature review
|
Mirzaie, Mostafa |
|
|
13-14 |
C |
p. |
artikel |
410 |
Storage, partitioning, indexing and retrieval in Big RDF frameworks: A survey
|
Chawla, Tanvi |
|
|
13-14 |
C |
p. |
artikel |
411 |
Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions
|
Amutha, J. |
|
|
13-14 |
C |
p. |
artikel |
412 |
Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language
|
Ruffo, Giancarlo |
|
|
13-14 |
C |
p. |
artikel |
413 |
Successors of PEGASIS protocol: A comprehensive survey
|
Khedr, Ahmed M. |
|
|
13-14 |
C |
p. |
artikel |
414 |
Summarization of legal documents: Where are we now and the way forward
|
Jain, Deepali |
|
|
13-14 |
C |
p. |
artikel |
415 |
Survey on 3D face reconstruction from uncalibrated images
|
Morales, Araceli |
|
|
13-14 |
C |
p. |
artikel |
416 |
Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses
|
Bakiri, Mohammed |
|
2018 |
13-14 |
C |
p. 135-153 |
artikel |
417 |
Survey on Visualization and Visual Analytics pipeline-based models: Conceptual aspects, comparative studies and challenges
|
Ltifi, Hela |
|
|
13-14 |
C |
p. |
artikel |
418 |
Sustainable computing across datacenters: A review of enabling models and techniques
|
Zakarya, Muhammad |
|
|
13-14 |
C |
p. |
artikel |
419 |
Synthetic data generation: State of the art in health care domain
|
Murtaza, Hajra |
|
|
13-14 |
C |
p. |
artikel |
420 |
Systematic analysis and review of path optimization techniques in WSN with mobile sink
|
Kamble, Aparna Ashok |
|
|
13-14 |
C |
p. |
artikel |
421 |
Systematic analysis and review of stock market prediction techniques
|
Gandhmal, Dattatray P. |
|
|
13-14 |
C |
p. |
artikel |
422 |
Systematic literature review: Quantum machine learning and its applications
|
Peral-García, David |
|
|
13-14 |
C |
p. |
artikel |
423 |
Systematic review on privacy categorisation
|
Inverardi, Paola |
|
|
13-14 |
C |
p. |
artikel |
424 |
Systematic review on weapon detection in surveillance footage through deep learning
|
Santos, Tomás |
|
|
13-14 |
C |
p. |
artikel |
425 |
System security assurance: A systematic literature review
|
Shukla, Ankur |
|
|
13-14 |
C |
p. |
artikel |
426 |
Task scheduling in fog environment — Challenges, tools & methodologies: A review
|
Jalali Khalil Abadi, Zahra |
|
|
13-14 |
C |
p. |
artikel |
427 |
Taxonomy, state-of-the-art, challenges and applications of visual understanding: A review
|
Khanday, Nadeem Yousuf |
|
|
13-14 |
C |
p. |
artikel |
428 |
The Beauty and the Beast: A survey on process algebras and cybersecurity
|
Costa, Gabriele |
|
|
13-14 |
C |
p. |
artikel |
429 |
The computing continuum: Past, present, and future
|
Bittencourt, Luiz F. |
|
|
13-14 |
C |
p. |
artikel |
430 |
The Critical Node Detection Problem in networks: A survey
|
Lalou, Mohammed |
|
2018 |
13-14 |
C |
p. 92-117 |
artikel |
431 |
The evolution of sentiment analysis—A review of research topics, venues, and top cited papers
|
Mäntylä, Mika V. |
|
2018 |
13-14 |
C |
p. 16-32 |
artikel |
432 |
The future of computing paradigms for medical and emergency applications
|
Alekseeva, Daria |
|
|
13-14 |
C |
p. |
artikel |
433 |
The importance of selecting clustering parameters in VANETs: A survey
|
Kaur, Ravneet |
|
|
13-14 |
C |
p. |
artikel |
434 |
The interaction design of 3D virtual humans: A survey
|
Wang, Xueyang |
|
|
13-14 |
C |
p. |
artikel |
435 |
The journey of graph kernels through two decades
|
Ghosh, Swarnendu |
|
2018 |
13-14 |
C |
p. 88-111 |
artikel |
436 |
The Lonely Runner Conjecture turns 60
|
Perarnau, Guillem |
|
|
13-14 |
C |
p. |
artikel |
437 |
The ML-based sensor data deception targeting cyber–physical systems: A review
|
Kaloudi, Nektaria |
|
|
13-14 |
C |
p. |
artikel |
438 |
Towards accessible chart visualizations for the non-visuals: Research, applications and gaps
|
Singh, Mandhatya |
|
|
13-14 |
C |
p. |
artikel |
439 |
Towards data augmentation in graph neural network: An overview and evaluation
|
Adjeisah, Michael |
|
|
13-14 |
C |
p. |
artikel |
440 |
Towards quantum computing based community detection
|
Akbar, Sana |
|
|
13-14 |
C |
p. |
artikel |
441 |
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment
|
Shahid, Muhammad Asim |
|
|
13-14 |
C |
p. |
artikel |
442 |
Traditional and recent approaches in background modeling for foreground detection: An overview
|
Bouwmans, Thierry |
|
2014 |
13-14 |
C |
p. 31-66 36 p. |
artikel |
443 |
Traffic load balancing in data center networks: A comprehensive survey
|
Liu, Guisheng |
|
|
13-14 |
C |
p. |
artikel |
444 |
Transaction scheduling protocols for controlling priority inversion: A review
|
Pandey, Sarvesh |
|
|
13-14 |
C |
p. |
artikel |
445 |
Transformers in speech processing: Overcoming challenges and paving the future
|
Latif, Siddique |
|
|
13-14 |
C |
p. |
artikel |
446 |
Tutorial and critical analysis of phishing websites methods
|
Mohammad, Rami M. |
|
2015 |
13-14 |
C |
p. 1-24 24 p. |
artikel |
447 |
Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey
|
Hannousse, Abdelhakim |
|
|
13-14 |
C |
p. |
artikel |
448 |
Understandable Big Data: A survey
|
Kacfah Emani, Cheikh |
|
2015 |
13-14 |
C |
p. 70-81 12 p. |
artikel |
449 |
Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review
|
Gupta, Mansi |
|
|
13-14 |
C |
p. |
artikel |
450 |
Unsupervised affinity learning based on manifold analysis for image retrieval: A survey
|
Pereira-Ferrero, V.H. |
|
|
13-14 |
C |
p. |
artikel |
451 |
Usability, security and trust in password managers: A quest for user-centric properties and features
|
Chaudhary, Sunil |
|
2019 |
13-14 |
C |
p. 69-90 |
artikel |
452 |
Virtual Customer Assistants in finance: From state of the art and practices to design guidelines
|
Iovine, Andrea |
|
|
13-14 |
C |
p. |
artikel |
453 |
Visibility enhancement and dehazing: Research contribution challenges and direction
|
Singh, Mohit |
|
|
13-14 |
C |
p. |
artikel |
454 |
Vision-based approaches towards person identification using gait
|
Khan, Muhammad Hassan |
|
|
13-14 |
C |
p. |
artikel |
455 |
Visual language integration: A survey and open challenges
|
Park, Sang-Min |
|
|
13-14 |
C |
p. |
artikel |
456 |
Visual SLAM for underwater vehicles: A survey
|
Zhang, Song |
|
|
13-14 |
C |
p. |
artikel |
457 |
Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks
|
Snehi, Manish |
|
|
13-14 |
C |
p. |
artikel |
458 |
Web service adaptation: A decade’s overview
|
Mezni, Haithem |
|
|
13-14 |
C |
p. |
artikel |
459 |
When machine learning meets medical world: Current status and future challenges
|
Smiti, Abir |
|
|
13-14 |
C |
p. |
artikel |
460 |
Where is the research on connecting game worlds?—A systematic mapping study
|
Parkkila, Janne |
|
2015 |
13-14 |
C |
p. 46-58 13 p. |
artikel |
461 |
XML data manipulation in conventional and temporal XML databases: A survey
|
Brahmia, Zouhaier |
|
|
13-14 |
C |
p. |
artikel |