Search dblp for Publications

export results for "toc:db/journals/ijcnis/ijcnis15.bht:"

 download as .bib file

@article{DBLP:journals/ijcnis/Aalsalem23,
  author       = {Mohammed Y. Aalsalem},
  title        = {Mathematically Engineered Adams Optimizer for Energy Efficient and
                  Optimal Routing Approach for the Wireless Sensor Network},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {180--194},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6244},
  doi          = {10.17762/IJCNIS.V15I3.6244},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Aalsalem23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbdulazeezIA23,
  author       = {Falah Amer Abdulazeez and
                  Abdul Sttar Ismail and
                  Rafid S. Abdulaziz},
  title        = {Using Gradient Descent to An Optimization Algorithm that uses the
                  Optimal Value of Parameters (Coefficients) for a Differentiable Function},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {24--36},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5718},
  doi          = {10.17762/IJCNIS.V15I1.5718},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbdulazeezIA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/AbousaberA23,
  author       = {Inam Abousaber and
                  Haitham Abdalla},
  title        = {Review of Using Technologies of Artificial Intelligence in Companies},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {217--228},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5743},
  doi          = {10.17762/IJCNIS.V15I1.5743},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/AbousaberA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Ashabrawy23,
  author       = {Mohamed Ashabrawy},
  title        = {role of Information System to measure the Cost and Performance Aware
                  Scheduling Technique for Cloud Computing Environment},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {83--93},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5732},
  doi          = {10.17762/IJCNIS.V15I1.5732},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Ashabrawy23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BarwaryJA23,
  author       = {Mohammed Jameel Barwary and
                  Karwan Jacksi and
                  Adel Al{-}Zebari},
  title        = {Constructing a Multilingual E-Learning Ontology through Web Crawling
                  and Scraping},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {137--153},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6241},
  doi          = {10.17762/IJCNIS.V15I3.6241},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BarwaryJA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/BawanehOAAS23,
  author       = {Mohammad Jazi Bawaneh and
                  Atef A. Obeidat and
                  Obaida M. Al{-}hazaimeh and
                  Malek Al{-}Nawashi and
                  Amaal Rateb Shorman},
  title        = {An Adaptive Fractal Image Steganography Using Mandelbrot and Linear
                  Congruent Generator},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {99--112},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6240},
  doi          = {10.17762/IJCNIS.V15I3.6240},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/BawanehOAAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChenLYX23,
  author       = {Yajing Chen and
                  Yee Choy Leong and
                  Lee Shin Yiing and
                  Yunxia Xiao},
  title        = {Research on the Development and Innovative Strategy of Knowledge Payment
                  Platform in the Internet Era},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {226--242},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6261},
  doi          = {10.17762/IJCNIS.V15I3.6261},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChenLYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChenYYX23,
  author       = {Yajing Chen and
                  Choy Leong Yee and
                  Lee Shin Yiing and
                  Yunxia Xiao},
  title        = {Study on the Influence of Knowledge-driven Technology on predicting
                  consumer Repurchase Behaviour},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {162--175},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5750},
  doi          = {10.17762/IJCNIS.V15I1.5750},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChenYYX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChengM23,
  author       = {Ting Cheng and
                  Azizan Marzuki},
  title        = {Research on the development of computer digital technology combined
                  with commercial space landscape design in the theory of "design combined
                  with nature"},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {176--193},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5720},
  doi          = {10.17762/IJCNIS.V15I1.5720},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChengM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ChuH23,
  author       = {Zichen Chu and
                  Bo Han},
  title        = {Digital Engraving Digital Art Design Analysis Based on Spatial Expression
                  Techniques},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {143--158},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i2.6087},
  doi          = {10.17762/IJCNIS.V15I2.6087},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ChuH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/FaydheIK23,
  author       = {Fatima Faydhe and
                  Majida Saud Ibrahim and
                  Kamal Y. Kamal},
  title        = {HaLow Wi-Fi performance in multiusers and channels environment with
                  {MATLAB} Simulink},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {1--11},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5487},
  doi          = {10.17762/IJCNIS.V15I1.5487},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/FaydheIK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GKK23,
  author       = {Sathisha G and
                  Subbaraya C. K and
                  Ravikumar G. K},
  title        = {Vehicle Detection and Speed Estimation Using Semantic Segmentation
                  with Low Latency},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {70--85},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6234},
  doi          = {10.17762/IJCNIS.V15I3.6234},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GNM23,
  author       = {Prakasha G and
                  Sunil Kumar K. N and
                  A. S. R. Murthy},
  title        = {Clustering Based Energy Efficient Routing for Wireless Sensor Network
                  Using Particle Swarm Optimization},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {243--260},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6268},
  doi          = {10.17762/IJCNIS.V15I3.6268},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GNM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GSK23,
  author       = {Sathisha G. and
                  C. K. Subbaraya and
                  Ravikumar G. K},
  title        = {Automated Speed and Lane Change decision-making Model using Support
                  Vector Machine},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {42--56},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6222},
  doi          = {10.17762/IJCNIS.V15I3.6222},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/GeJ23,
  author       = {Shuqian Ge and
                  Zhuo Jin},
  title        = {Research on the Application of Digital Design of Jinzuo Furniture
                  Cultural Tourism Display Platform Based on Intangible Cultural Heritage},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {1--12},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i2.5978},
  doi          = {10.17762/IJCNIS.V15I2.5978},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/GeJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KS23,
  author       = {Priyanga K. K and
                  Sabeen S},
  title        = {Optimization of Deep Convolutional Neural Network with the Integrated
                  Batch Normalization and Global pooling},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {59--69},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5617},
  doi          = {10.17762/IJCNIS.V15I1.5617},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KaramtiA23,
  author       = {Walid Karamti and
                  Imad Al{-}Sgir},
  title        = {Intelligent agents Model with {JADE} for scheduling analysis and correction
                  of Real-Time Systems},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {107--119},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5762},
  doi          = {10.17762/IJCNIS.V15I1.5762},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KaramtiA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KrishnanRSSV23,
  author       = {V. Gokula Krishnan and
                  Pinagadi Venkateswara Rao and
                  M. V. Vijaya Saradhi and
                  K. Sathyamoorthy and
                  V. Vijayaraja},
  title        = {Prediction of Alzheimer Disease using LeNet-CNN model with Optimal
                  Adaptive Bilateral Filtering},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {12--23},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5706},
  doi          = {10.17762/IJCNIS.V15I1.5706},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KrishnanRSSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/KrishnanSSHV23,
  author       = {V. Gokula Krishnan and
                  K. Sankar and
                  M. V. Vijaya Saradhi and
                  K. Hemapriya and
                  V. Vijayaraja},
  title        = {Tom and Jerry Based Multipath Routing with Optimal K-medoids for choosing
                  Best Clusterhead in {MANET}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {70--82},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5707},
  doi          = {10.17762/IJCNIS.V15I1.5707},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/KrishnanSSHV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LiaoC23,
  author       = {Linsen Liao and
                  Xinghua Cao},
  title        = {Data Transmission Security and Legal Regulation in Clinical Application
                  of Human Gene Editing from Perspective of Big Data},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i4.6345},
  doi          = {10.17762/IJCNIS.V15I4.6345},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LiaoC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Liu23,
  author       = {Dan Liu},
  title        = {Design of Digital Museum System Based on Optimized Virtual Reality
                  Technology},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {194--203},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5885},
  doi          = {10.17762/IJCNIS.V15I1.5885},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Liu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Liu23a,
  author       = {Shan Liu},
  title        = {Preserving the Integrity of Li Yu's Craft Aesthetics using the Digital
                  Information Technology},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i4.6314},
  doi          = {10.17762/IJCNIS.V15I4.6314},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Liu23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LiuCYR23,
  author       = {Huinan Liu and
                  Feroz De Costa and
                  Megat Al{-}lmran Bin Yasin and
                  Qijie Ruan},
  title        = {An Improved and Optimized Gated Recurrent Unit and Long Short-Term
                  Memory Model for Fake News Detection},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {1--16},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i4.6283},
  doi          = {10.17762/IJCNIS.V15I4.6283},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LiuCYR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LiuL23,
  author       = {Eryong Liu and
                  Yifei Li},
  title        = {Research on the implantation and dissemination strategy of short creative
                  advertising videos in the new media era},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {146--161},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5713},
  doi          = {10.17762/IJCNIS.V15I1.5713},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LiuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/LuS23,
  author       = {Wenjie Lu and
                  Ximing Sun},
  title        = {Research on Internet Technology Innovation and Information Security
                  Challenges in New Vehicle Energy Sector},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {86--98},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6228},
  doi          = {10.17762/IJCNIS.V15I3.6228},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/LuS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MouY23,
  author       = {Bo Mou and
                  Xiaopei Yang},
  title        = {Analysis of the Role of Compliance Plan in {AI} Criminal Risk Prevention-Take
                  {AI} Criminal Risk in Network Communication as Example},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {154--167},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6242},
  doi          = {10.17762/IJCNIS.V15I3.6242},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MouY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/MusmuharamS23,
  author       = {Musmuharam Musmuharam and
                  Suharjito Suharjito},
  title        = {Detection of Distributed Denial of Service Attacks in Software Defined
                  Networks by Using Machine Learning},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {13--25},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6214},
  doi          = {10.17762/IJCNIS.V15I3.6214},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/MusmuharamS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/OmaraFKG23,
  author       = {Mahmoud Omara and
                  Mahmoud Fayez and
                  Heba Khalid and
                  Said Ghoniemy},
  title        = {Restrictive Voting Technique for Faces Spoofing Attack},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {204--216},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5738},
  doi          = {10.17762/IJCNIS.V15I1.5738},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/OmaraFKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/QinZ23,
  author       = {Rongrong Qin and
                  Min Zhao},
  title        = {Risk identification of {PPP} mode in stadiums and gymnasiums by ant
                  colony algorithm},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {120--131},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5805},
  doi          = {10.17762/IJCNIS.V15I1.5805},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/QinZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/SembatiNJ23,
  author       = {Yassine Sembati and
                  Najib Naja and
                  Abdellah Jamali},
  title        = {Named Multipath Depth-First Search: An SDN-based Routing Strategy
                  for Efficient Failure Handling and Content Delivery in {NDN}},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {17--29},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i4.6293},
  doi          = {10.17762/IJCNIS.V15I4.6293},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/SembatiNJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ShuZY23,
  author       = {Pan Shu and
                  Nurul Izzatul Lydia Binti Za'ba and
                  Mohd Rashid Bin Ya'acob},
  title        = {Framework Design of Smart Contracts-Based Building Information Modeling
                  Contracts Management in Material Supply Chain},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {49--58},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5737},
  doi          = {10.17762/IJCNIS.V15I1.5737},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ShuZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/Taleb23,
  author       = {Anas Abu Taleb},
  title        = {Using Minimum Connected Dominating Set for Mobile sink path planning
                  in Wireless Sensor Networks},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {94--106},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5810},
  doi          = {10.17762/IJCNIS.V15I1.5810},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/Taleb23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/VK23,
  author       = {Channappa Gowda D. V and
                  R. Kanagavalli},
  title        = {Video Semantic Segmentation Network with Low Latency Based on Deep
                  Learning},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {209--225},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6266},
  doi          = {10.17762/IJCNIS.V15I3.6266},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/VK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/WuL23,
  author       = {Ersilin Wu and
                  Boi{-}Yee Liao},
  title        = {Realization of Vitality Optimization in Traditional Village Human
                  Settlement Environment Supported by Intelligent Sensor Technology},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i4.6288},
  doi          = {10.17762/IJCNIS.V15I4.6288},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/WuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/XuS23,
  author       = {Wei Xu and
                  Veerawat Sirivesmas},
  title        = {Study on Network Virtual Printing Sculpture Design using Artificial
                  Intelligence},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {132--145},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5694},
  doi          = {10.17762/IJCNIS.V15I1.5694},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/XuS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/XuYP23,
  author       = {Junping Xu and
                  Chaemoon Yoo and
                  Younghwan Pan},
  title        = {Prediction of user behavioral intentions based on structural equation
                  modelling in {AI} painting cognitive conditions},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {37--48},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i1.5788},
  doi          = {10.17762/IJCNIS.V15I1.5788},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/XuYP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YangGY23,
  author       = {Aiyi Yang and
                  Chu Hiang Goh and
                  Lim Jing Yi},
  title        = {The Research into Dark Mode: {A} Systematic Review Using Two-Stage
                  Approach and {S-O-R} Framework},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i4.6301},
  doi          = {10.17762/IJCNIS.V15I4.6301},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YangGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YangRZYHW23,
  author       = {Yun Yang and
                  Nur Aulia Rosni and
                  Rosilawati Binti Zainol and
                  Xiaohan Yang and
                  Hang Hu and
                  Ting Wang},
  title        = {Daily Activities of Elder Adults Using Optimized Deep Learning Model
                  in China},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {273--292},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6270},
  doi          = {10.17762/IJCNIS.V15I3.6270},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YangRZYHW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/YangWZ23,
  author       = {Hongjuan Yang and
                  Ningning Wang and
                  Yadi Zheng},
  title        = {Revolutionizing the Industrialization of Buildings with {BIM} and
                  {AI:} Factors Influencing Adoption and Development and Building Planning},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {126--142},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i2.6068},
  doi          = {10.17762/IJCNIS.V15I2.6068},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/YangWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZhangAXH23,
  author       = {Shanshan Zhang and
                  Albattat Ahmad and
                  Heng Xu and
                  Bing Han},
  title        = {Research on the Performance Strategy Choice of Low-carbon Operation
                  of Tourism hotels from the Perspective of Network Management},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {91--109},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i2.6035},
  doi          = {10.17762/IJCNIS.V15I2.6035},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZhangAXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZhangL23,
  author       = {Yiming Zhang and
                  Che Ghing Lai},
  title        = {Impact of Social Network Sites on Developing Brand Communication in
                  Xian City},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {261--272},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6269},
  doi          = {10.17762/IJCNIS.V15I3.6269},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZhangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZhangL23a,
  author       = {Yiming Zhang and
                  Che Ching Lai},
  title        = {Optimize Urban Infrastructure Planning Based on Big Data and Enhance
                  Xi'an's Urban Image},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i4.6337},
  doi          = {10.17762/IJCNIS.V15I4.6337},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZhangL23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcnis/ZhangW23,
  author       = {Shiyi Zhang and
                  Song Wang},
  title        = {A Blockchain Framework for Preserving Music Intellectual Property
                  Rights},
  journal      = {Int. J. Commun. Networks Inf. Secur.},
  volume       = {15},
  number       = {3},
  pages        = {26--41},
  year         = {2023},
  url          = {https://doi.org/10.17762/ijcnis.v15i3.6213},
  doi          = {10.17762/IJCNIS.V15I3.6213},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcnis/ZhangW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics