nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive review of cybersecurity vulnerabilities, threats, and solutions for the Internet of Things at the network-cum-application layer
|
Razaque, Abdul |
|
|
58 |
C |
p. |
artikel |
2 |
A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges
|
Guerra-Manzanares, Alejandro |
|
|
58 |
C |
p. |
artikel |
3 |
A comprehensive survey on sentiment analysis: Framework, techniques, and applications
|
Chandan, Manish Kumar |
|
|
58 |
C |
p. |
artikel |
4 |
A conceptual framework to mitigate ransomware attacks on IoMT devices using threat intelligence: a systematic literature review
|
Selvaraj, Kalaivani |
|
|
58 |
C |
p. |
artikel |
5 |
A decade systematic review of fusion techniques in financial market prediction
|
Mehrmolaei, Soheila |
|
|
58 |
C |
p. |
artikel |
6 |
Advancing IoT-driven WSNs with context-aware routing: A comprehensive review
|
Khedr, Ahmed M. |
|
|
58 |
C |
p. |
artikel |
7 |
AI-generated text detection: A comprehensive review of methods, datasets, and applications
|
Kehkashan, Tanzila |
|
|
58 |
C |
p. |
artikel |
8 |
A review of background, methods, limitations and opportunities of knowledge graph completion
|
Li, Daiyi |
|
|
58 |
C |
p. |
artikel |
9 |
A survey of Community Detection algorithms and its comparative performance analysis
|
Singh, Dipika |
|
|
58 |
C |
p. |
artikel |
10 |
A survey on decentralized identity management systems
|
Xian, Jia |
|
|
58 |
C |
p. |
artikel |
11 |
A survey on graph problems parameterized above and below guaranteed values
|
Gutin, Gregory |
|
|
58 |
C |
p. |
artikel |
12 |
A survey on Hedetniemi’s conjecture
|
Zhu, Xuding |
|
|
58 |
C |
p. |
artikel |
13 |
A survey on image cryptography mechanisms: hitherto, and future directions
|
Gupta, Tanisha |
|
|
58 |
C |
p. |
artikel |
14 |
A systematic literature review on cross-language source code clone detection
|
Alshabib, Asra Sulaiman |
|
|
58 |
C |
p. |
artikel |
15 |
Attention-based transformer models for image captioning across languages: An in-depth survey and evaluation
|
Albadarneh, Israa A. |
|
|
58 |
C |
p. |
artikel |
16 |
Autoscaling techniques in cloud-native computing: A comprehensive survey
|
Jeong, Byeonghui |
|
|
58 |
C |
p. |
artikel |
17 |
Chaos-based video encryption techniques: A review
|
Gao, Suo |
|
|
58 |
C |
p. |
artikel |
18 |
Dealing with high dimensional multi-view data: A comprehensive review of non-negative matrix factorization approaches in data mining and machine learning
|
Soleymani, Nafiseh |
|
|
58 |
C |
p. |
artikel |
19 |
Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems
|
Manimaran, Praveensankar |
|
|
58 |
C |
p. |
artikel |
20 |
Deep anomaly detection for time series: A survey
|
Jia, Xudong |
|
|
58 |
C |
p. |
artikel |
21 |
Denoising and completion filters for human motion software: A survey with code
|
Martini, Enrico |
|
|
58 |
C |
p. |
artikel |
22 |
Edge-AI empowered Cyber-Physical Systems: A comprehensive review on performance analysis
|
Singh, Raj Kumar Baliyar |
|
|
58 |
C |
p. |
artikel |
23 |
Editorial Board
|
|
|
|
58 |
C |
p. |
artikel |
24 |
Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions
|
Wang, Miaomiao |
|
|
58 |
C |
p. |
artikel |
25 |
From past to present: A survey of malicious URL detection techniques, datasets and code repositories
|
Tian, Ye |
|
|
58 |
C |
p. |
artikel |
26 |
Hyperbolic geometric graph representation learning: A survey
|
Wang, Siman |
|
|
58 |
C |
p. |
artikel |
27 |
Insight into code clone management through refactoring: a systematic literature review
|
Kaur, Manpreet |
|
|
58 |
C |
p. |
artikel |
28 |
Integration of SDN into UAV, edge computing, & Blockchain: A review, challenges, & future directions
|
Modi, Tejas M. |
|
|
58 |
C |
p. |
artikel |
29 |
Low-light multimodal object detection: A survey
|
Li, Gang |
|
|
58 |
C |
p. |
artikel |
30 |
Maximal cliques summarization: Principles, problem classification, and algorithmic approaches
|
D’Elia, Marco |
|
|
58 |
C |
p. |
artikel |
31 |
NLP-based techniques for Cyber Threat Intelligence
|
Arazzi, Marco |
|
|
58 |
C |
p. |
artikel |
32 |
Parameterized algorithms on geometric intersection graphs
|
Xue, Jie |
|
|
58 |
C |
p. |
artikel |
33 |
Polynomial property testing
|
Gishboliner, Lior |
|
|
58 |
C |
p. |
artikel |
34 |
Revolutionizing textual data insights: A comprehensive review of the dual relationship between transformers and clustering in textual data analysis
|
Aghayengejeh, Nazila Pourhaji |
|
|
58 |
C |
p. |
artikel |
35 |
Robust defense mechanisms for protecting Wireless Sensor Networks from Denial-of-Service Threats, A comprehensive in-depth analysis
|
Osamy, Walid |
|
|
58 |
C |
p. |
artikel |
36 |
Routing optimization strategies in data center networks: A survey
|
Xu, Bin |
|
|
58 |
C |
p. |
artikel |
37 |
Sand cat swarm optimization: A comprehensive review of algorithmic advances, structural enhancements, and engineering applications
|
Hosseinzadeh, Mehdi |
|
|
58 |
C |
p. |
artikel |
38 |
The computing continuum: Past, present, and future
|
Bittencourt, Luiz F. |
|
|
58 |
C |
p. |
artikel |
39 |
The Lonely Runner Conjecture turns 60
|
Perarnau, Guillem |
|
|
58 |
C |
p. |
artikel |
40 |
Transformers in speech processing: Overcoming challenges and paving the future
|
Latif, Siddique |
|
|
58 |
C |
p. |
artikel |