


default search action
Computer Science Review, Volume 58
Volume 58, 2025
- Marco Arazzi
, Dincy R. Arikkat
, Serena Nicolazzo
, Antonino Nocera
, Rafidha Rehiman K. A.
, Vinod P.
, Mauro Conti
:
NLP-based techniques for Cyber Threat Intelligence. 100765 - Israa A. Albadarneh, Bassam H. Hammo, Omar S. Al-Kadi
:
Attention-based transformer models for image captioning across languages: An in-depth survey and evaluation. 100766 - Siddique Latif, Syed Aun Muhammad Zaidi, Heriberto Cuayáhuitl, Fahad Shamshad, Moazzam Shoukat, Muhammad Usama
, Junaid Qadir:
Transformers in speech processing: Overcoming challenges and paving the future. 100768 - Manish Kumar Chandan
, Shrabanti Mandal
:
A comprehensive survey on sentiment analysis: Framework, techniques, and applications. 100777 - Manpreet Kaur, Dhavleesh Rattan
, Madan Lal:
Insight into code clone management through refactoring: a systematic literature review. 100767 - Raj Kumar Baliyar Singh
, K. Hemant Kumar Reddy:
Edge-AI empowered Cyber-Physical Systems: A comprehensive review on performance analysis. 100769 - Praveensankar Manimaran
, Thiago Garrett
, Leander Jehl
, Roman Vitenberg:
Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems. 100776 - Enrico Martini
, Andrea Calanca, Nicola Bombieri:
Denoising and completion filters for human motion software: A survey with code. 100780 - Luiz F. Bittencourt, Roberto Rodrigues Filho, Josef Spillner, Filip De Turck, José Santos, Nelson L. S. da Fonseca, Omer F. Rana
, Manish Parashar, Ian T. Foster:
The computing continuum: Past, present, and future. 100782 - Tanisha Gupta
, Arvind Selwal, Ajay Kumar Sharma:
A survey on image cryptography mechanisms: hitherto, and future directions. 100783 - Miaomiao Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:
Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions. 100785 - Asra Sulaiman Alshabib, Sajjad Mahmood, Mohammad R. Alshayeb:
A systematic literature review on cross-language source code clone detection. 100786 - Xudong Jia
, Peng Xun, Wei Peng
, Baokang Zhao, Haojie Li, Chiran Shen:
Deep anomaly detection for time series: A survey. 100787 - Nafiseh Soleymani, Mohammad Hossein Moattar, Reza Sheibani:
Dealing with high dimensional multi-view data: A comprehensive review of non-negative matrix factorization approaches in data mining and machine learning. 100788 - Abdul Razaque, Salim Hariri, Abrar Mohammed Alajlan, Joon Yoo:
A comprehensive review of cybersecurity vulnerabilities, threats, and solutions for the Internet of Things at the network-cum-application layer. 100789 - Byeonghui Jeong, Young-Sik Jeong
:
Autoscaling techniques in cloud-native computing: A comprehensive survey. 100791

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.