Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             40 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive review of cybersecurity vulnerabilities, threats, and solutions for the Internet of Things at the network-cum-application layer Razaque, Abdul

58 C p.
artikel
2 A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges Guerra-Manzanares, Alejandro

58 C p.
artikel
3 A comprehensive survey on sentiment analysis: Framework, techniques, and applications Chandan, Manish Kumar

58 C p.
artikel
4 A conceptual framework to mitigate ransomware attacks on IoMT devices using threat intelligence: a systematic literature review Selvaraj, Kalaivani

58 C p.
artikel
5 A decade systematic review of fusion techniques in financial market prediction Mehrmolaei, Soheila

58 C p.
artikel
6 Advancing IoT-driven WSNs with context-aware routing: A comprehensive review Khedr, Ahmed M.

58 C p.
artikel
7 AI-generated text detection: A comprehensive review of methods, datasets, and applications Kehkashan, Tanzila

58 C p.
artikel
8 A review of background, methods, limitations and opportunities of knowledge graph completion Li, Daiyi

58 C p.
artikel
9 A survey of Community Detection algorithms and its comparative performance analysis Singh, Dipika

58 C p.
artikel
10 A survey on decentralized identity management systems Xian, Jia

58 C p.
artikel
11 A survey on graph problems parameterized above and below guaranteed values Gutin, Gregory

58 C p.
artikel
12 A survey on Hedetniemi’s conjecture Zhu, Xuding

58 C p.
artikel
13 A survey on image cryptography mechanisms: hitherto, and future directions Gupta, Tanisha

58 C p.
artikel
14 A systematic literature review on cross-language source code clone detection Alshabib, Asra Sulaiman

58 C p.
artikel
15 Attention-based transformer models for image captioning across languages: An in-depth survey and evaluation Albadarneh, Israa A.

58 C p.
artikel
16 Autoscaling techniques in cloud-native computing: A comprehensive survey Jeong, Byeonghui

58 C p.
artikel
17 Chaos-based video encryption techniques: A review Gao, Suo

58 C p.
artikel
18 Dealing with high dimensional multi-view data: A comprehensive review of non-negative matrix factorization approaches in data mining and machine learning Soleymani, Nafiseh

58 C p.
artikel
19 Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems Manimaran, Praveensankar

58 C p.
artikel
20 Deep anomaly detection for time series: A survey Jia, Xudong

58 C p.
artikel
21 Denoising and completion filters for human motion software: A survey with code Martini, Enrico

58 C p.
artikel
22 Edge-AI empowered Cyber-Physical Systems: A comprehensive review on performance analysis Singh, Raj Kumar Baliyar

58 C p.
artikel
23 Editorial Board
58 C p.
artikel
24 Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions Wang, Miaomiao

58 C p.
artikel
25 From past to present: A survey of malicious URL detection techniques, datasets and code repositories Tian, Ye

58 C p.
artikel
26 Hyperbolic geometric graph representation learning: A survey Wang, Siman

58 C p.
artikel
27 Insight into code clone management through refactoring: a systematic literature review Kaur, Manpreet

58 C p.
artikel
28 Integration of SDN into UAV, edge computing, & Blockchain: A review, challenges, & future directions Modi, Tejas M.

58 C p.
artikel
29 Low-light multimodal object detection: A survey Li, Gang

58 C p.
artikel
30 Maximal cliques summarization: Principles, problem classification, and algorithmic approaches D’Elia, Marco

58 C p.
artikel
31 NLP-based techniques for Cyber Threat Intelligence Arazzi, Marco

58 C p.
artikel
32 Parameterized algorithms on geometric intersection graphs Xue, Jie

58 C p.
artikel
33 Polynomial property testing Gishboliner, Lior

58 C p.
artikel
34 Revolutionizing textual data insights: A comprehensive review of the dual relationship between transformers and clustering in textual data analysis Aghayengejeh, Nazila Pourhaji

58 C p.
artikel
35 Robust defense mechanisms for protecting Wireless Sensor Networks from Denial-of-Service Threats, A comprehensive in-depth analysis Osamy, Walid

58 C p.
artikel
36 Routing optimization strategies in data center networks: A survey Xu, Bin

58 C p.
artikel
37 Sand cat swarm optimization: A comprehensive review of algorithmic advances, structural enhancements, and engineering applications Hosseinzadeh, Mehdi

58 C p.
artikel
38 The computing continuum: Past, present, and future Bittencourt, Luiz F.

58 C p.
artikel
39 The Lonely Runner Conjecture turns 60 Perarnau, Guillem

58 C p.
artikel
40 Transformers in speech processing: Overcoming challenges and paving the future Latif, Siddique

58 C p.
artikel
                             40 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland