![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 1,207 matches
- 2024
- Khalifa AL-Dosari, Noora Fetais, Murat Kucukvar:
Artificial Intelligence and Cyber Defense System for Banking Industry: A Qualitative Study of AI Applications and Challenges. Cybern. Syst. 55(2): 302-330 (2024) - Nishtha Ahuja, Shailender Kumar:
Fusion of Semantic, Visual and Network Information for Detection of Misinformation on Social Media. Cybern. Syst. 55(5): 1063-1085 (2024) - Lassaad Ben Ammar
, Karim Gasmi
, Ibtihel Ben Ltaifa:
ViT-TB: Ensemble Learning Based ViT Model for Tuberculosis Recognition. Cybern. Syst. 55(3): 634-653 (2024) - A. Arthi, V. Vennila, U. Arun Kumar:
Leukemia Detection Using Invariant Structural Cascade Segmentation Based on Deep Vectorized Scaling Neural Network. Cybern. Syst. 55(4): 804-822 (2024) - Gorla Babu, Pinjari Abdul Khayum:
A New Design of Iris Recognition Using Hough Transform with K-Means Clustering and Enhanced Faster R-CNN. Cybern. Syst. 55(2): 551-584 (2024) - Antonio Caselles, Joan Carles Micó, Salvador Amigó, Pantaleón D. Romero:
Co-Evolution of the General Factor of Personality and the Big Five Factors: A Mathematical Model and Its Application to Methylphenidate. Cybern. Syst. 55(1): 88-106 (2024) - Arvind Singh Choudhary, Manoj Kumar
:
Competitive Swarm Improved Invasive Weed Optimization-Based Secret Sharing Scheme for Visual Cryptography. Cybern. Syst. 55(1): 42-60 (2024) - Michael Donevski
, Tanveer A. Zia
:
Cyber Diversity Index for Sustainable Self-Control of Machines. Cybern. Syst. 55(1): 61-87 (2024) - Germán Bula Escobar:
Some Notes and Reflections about the Institutional Context to Study the Westphalian Dilemma. Cybern. Syst. 55(5): 1086-1103 (2024) - Raúl Espejo
:
Institutions, Nations, Enterprises and Distributed Organisation (the Westphalian Dilemma). Cybern. Syst. 55(1): 137-156 (2024) - Archana Goyal, Vishal Gupta, Manish Kumar:
Deep Learning-Based Named Entity Recognition System Using Hybrid Embedding. Cybern. Syst. 55(2): 279-301 (2024) - Bao Huynh
, Lam B. Q. Nguyen, Duc H. M. Nguyen, Ngoc Thanh Nguyen, Hung Son Nguyen, Tuyn Pham, Tri Pham, Loan T. T. Nguyen
, Trinh D. D. Nguyen, Bay Vo:
Mining Association Rules from a Single Large Graph. Cybern. Syst. 55(3): 693-707 (2024) - Pengyue Jia, Ling Chen, Dandan Lyu:
Fine-Grained Population Mobility Data-Based Community-Level COVID-19 Prediction Model. Cybern. Syst. 55(1): 184-202 (2024) - Mehrdad Jozmaleki
, Mustafa Jahangoshai Rezaee
, Morteza Saberi
:
A Hybrid Semi-Supervised Approach for Estimating the Efficient and Optimal Level of Hospitals Outputs. Cybern. Syst. 55(2): 585-613 (2024) - N. Kanagavalli, S. Baghavathi Priya:
An Approach for Fake News Detection in Social Media Using Hybrid Classifier. Cybern. Syst. 55(4): 894-917 (2024) - Atul B. Kathole, Kapil Netaji Vhatkar, Sonali D. Patil
:
IoT-Enabled Pest Identification and Classification with New Meta-Heuristic-Based Deep Learning Framework. Cybern. Syst. 55(2): 380-408 (2024) - P. M. Kavitha, B. Muruganantham:
Mal_CNN: An Enhancement for Malicious Image Classification Based on Neural Network. Cybern. Syst. 55(4): 739-752 (2024) - Uppula Kiran
, Krishan Kumar:
Throughput and Outage Probability-Aware Intelligent Swarm-Based Multi-Hop Selection in Vehicular Network. Cybern. Syst. 55(1): 157-183 (2024) - Ernesto León-Castro
, Fabio Blanco-Mesa
, Walayat Hussain
, Martha Flores-Sosa, Luis Alessandri Pérez-Arellano:
Tax Revenue Measurement Using OWA Operators. Cybern. Syst. 55(1): 230-244 (2024) - Chandni Magoo, Manjeet Singh:
Design and Development of New Interactive Chatbot System for Mobile Service Providers through Heuristic-Based Ensemble Learning. Cybern. Syst. 55(4): 753-785 (2024) - Zygmunt Mazur, Janusz Pec:
A Method for Information Security Analysis Using Information Graphs. Cybern. Syst. 55(3): 678-692 (2024) - Tatiana A. Medvedeva
, Stuart A. Umpleby
:
Advancing Social System Development through Organizational Change. Cybern. Syst. 55(1): 124-136 (2024) - K. Mekala, S. Sumathi, S. Shobana:
A Multi-Aggregator Based Charge Scheduling in Internet of Electric Vehicles Using Fractional African Vulture Sail Fish Optimization. Cybern. Syst. 55(5): 1129-1155 (2024) - Van Du Nguyen, Hai Bang Truong:
Intelligent Collectives: Impact of Independence on Collective Performance. Cybern. Syst. 55(3): 618-633 (2024) - Abinaya P
, Senthil Kumar Jagatheesaperumal
:
Assured and Provable Data Expuncturing in cloud using Ciphertext Policy-Attribute Based Encryption (CP-ABE). Cybern. Syst. 55(4): 786-803 (2024) - Rafal Palak
, Krystian Wojtkiewicz
:
A Centralization Measure for Social Networks Assessment. Cybern. Syst. 55(3): 654-667 (2024) - Supriya Palekar, Y. Radhika:
APRO: Secret Key Based Data Encryption and Mutual Authentication with Privacy Preservation Model in IoT Using Autoregressive Poor and Rich Optimization. Cybern. Syst. 55(4): 823-847 (2024) - Kartik Patra
:
A New Approach of Ranking of Generalized Trapezoidal Fuzzy Numbers and Application in Fuzzy Risk Analysis. Cybern. Syst. 55(5): 1104-1128 (2024) - Vijayakumar Polepally, Jagannadha Rao D. B., Parsi Kalpana, S. Nagendra Prabhu:
Exponential Squirrel Search Algorithm-Based Deep Classifier for Intrusion Detection in Cloud Computing with Big Data Assisted Spark Framework. Cybern. Syst. 55(2): 331-350 (2024) - P. Purusothaman, B. Gopalakrishnan:
Enhanced Localization Model in Wireless Sensor Network Using Self Adaptive-Barnacles Mating Optimization. Cybern. Syst. 55(5): 1156-1183 (2024)
skipping 1,177 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-25 05:52 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint