Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 564 matches
- 2023
- Suganya. A, S. L. Aarthy:
Alzheimer's And Parkinson's Disease Classification Using Deep Learning Based On MRI: A Review. Int. J. Commun. Networks Inf. Secur. 14(1s): 9-21 (2023) - M. R. Tamjis Surendar Aravindhan:
Leaf Disease Detection by Using Convolutional Pretrained Model. Int. J. Commun. Networks Inf. Secur. 14(1s): 114-120 (2023) - Arulmozhi. B, J. I. Sheeba, S. Pradeep Devaneyan:
A Review of Blockchain Technology Based Techniques to Preserve Privacy and to Secure for Electronic Health Records. Int. J. Commun. Networks Inf. Secur. 14(1s): 177-188 (2023) - Chandra Wijaya Fibria Indriati Yana Ernawan:
Application of Internet of Things to Ensure Improved Performance within the Internal Supply Chain Unit of an Organization. Int. J. Commun. Networks Inf. Secur. 14(1s): 121-135 (2023) - Bhargavi Goparaju, Bandla Sreenivasa Rao:
A DDoS Attack Detection using PCA Dimensionality Reduction and Support Vector Machine. Int. J. Commun. Networks Inf. Secur. 14(1s): 1-8 (2023) - Deageon Kim:
Research On Text Classification Based On Deep Neural Network. Int. J. Commun. Networks Inf. Secur. 14(1s): 100-113 (2023) - V. T. Ram Pavan Ku, M. Arulselvi, K. B. S. Sastry:
An Optimized Deep Learning Based Optimization Algorithm for the Detection of Colon Cancer Using Deep Recurrent Neural Networks. Int. J. Commun. Networks Inf. Secur. 14(1s): 22-36 (2023) - T. Nagalaxmi, E. Sreenivasa Rao, P. Chandrasekhar:
Design and Performance Analysis of Low Latency Routing Algorithm based NoC for MPSoC. Int. J. Commun. Networks Inf. Secur. 14(1s): 37-53 (2023) - Ranga Narayana, G. Venkateswara Rao:
A Grey Wolf Intelligence based Recognition of Human-Action in Low Resolution Videos with Minimal Processing Time. Int. J. Commun. Networks Inf. Secur. 14(1s): 91-99 (2023) - Nelapati Ananda Rao, Lalitha Bhavani Konkyana, Vysyaraju Lokesh Raju, M. S. R. Naidu, Chukka Ramesh Babu:
A Broadband Meta surface Based MIMO Antenna with High Gain and Isolation For 5G Millimeter Wave Applications. Int. J. Commun. Networks Inf. Secur. 14(1s): 54-66 (2023) - S. K. Satyanarayana, Lavadya Nirmala Devi, A. Nageswar Rao:
MPIGA - Multipath Selection Using Improved Genetic Algorithm. Int. J. Commun. Networks Inf. Secur. 14(1s): 67-78 (2023) - S. Tejasree, B. Chandramohan:
Hybrid Multi Attribute Relation Method for Document Clustering for Information Mining. Int. J. Commun. Networks Inf. Secur. 14(1s): 79-90 (2023) - Saiyed Faiayaz Waris, S. Koteeswaran:
An Investigation on Disease Diagnosis and Prediction by Using Modified K-Mean clustering and Combined CNN and ELM Classification Techniques. Int. J. Commun. Networks Inf. Secur. 14(1s): 167-176 (2023) - 2022
- Alaa Hussein Abdulaal, A. F. M. Shahen Shah, Al-Sakib Khan Pathan:
NM-LEACH: A Novel Modified LEACH Protocol to Improve Performance in WSN. Int. J. Commun. Networks Inf. Secur. 14(1) (2022) - Himanshu Agarwal, Farooq Husain:
Protecting Ownership Rights of Videos Against Digital Piracy: An Efficient Digital Watermarking Scheme. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - Ahmad A. Al-Daraiseh, Rasel Chowdhury, Hakima Ould-Slimane, Chamseddine Talhi, Mohammad Bany Taha:
Lightweight Scheme for Smart Home Environments using Offloading Technique. Int. J. Commun. Networks Inf. Secur. 14(1) (2022) - Mohammed Al-Shabi:
Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV. Int. J. Commun. Networks Inf. Secur. 14(2): 99-110 (2022) - Haneen Khalid Alabdulrazzaq, Mohammed N. Alenezi:
Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. Int. J. Commun. Networks Inf. Secur. 14(1) (2022) - Mohammed N. Alenezi, Fawaz S. Al-Anzi:
A Study of Z-Transform Based Encryption Algorithm. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - Ahmad Y. Alhusenat, Abdallah Y. Alma'aitah, Khaled F. Hayajneh:
Matching Subcarrier Resource Allocation and Offloading Decision. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - Thamer Alhussain:
An Energy-Efficient Scheme for IoT Networks. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - Inad A. Aljarrah:
Effect of image degradation on performance of Convolutional Neural Networks. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - Inad A. Aljarrah, Eman M. Alshare:
Improved Residual Dense Network for Large Scale Super-Resolution via Generative Adversarial Network. Int. J. Commun. Networks Inf. Secur. 14(1) (2022) - N. Noor Alleema, Ramakrishnan Raman, Fidel Castro-Cayllahua, Vinod Motiram Rathod, Juan Carlos Cotrina-Aliaga, Supriya Sanjay Ajagekar, Reshma Ramakant Kanse:
Security of Big Data over IoT Environment by Integration of Deep Learning and Optimization. Int. J. Commun. Networks Inf. Secur. 14(2): 203-221 (2022) - Mohammed A Alqhatani:
Machine Learning Techniques for Malware Detection with Challenges and Future Directions. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - Raed A. Alsaqour, Ahmed Majrashi, Mohammed Alreedi, Khalid Alomar, Maha S. Abdelhaq:
Defense in Depth: Multilayer of security. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - Olarotimi Kabir Amuda, Akinyemi Bodunde Odunola, Mistura Laide Sanni, Ganiyu Adesola Aderounmu:
A predictive User behaviour analytic Model for Insider Threats in Cyberspace. Int. J. Commun. Networks Inf. Secur. 14(1) (2022) - Siham Arfaoui, Abdelhamid Belmekki, Abdellatif Mezrioui:
A Privacy by Design Methodology Application in Telecom Domain. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - Nor Azman Mat Ariff:
Ensemble Method for Mobile Malware Detection using N-Gram Sequences of System Calls. Int. J. Commun. Networks Inf. Secur. 13(2) (2022) - Gopal Arora, Munish Sabharwal, Pooja Kapila, Divya Paikaray, Vipul Vekariya, Narmadha T:
Deep Residual Adaptive Neural Network Based Feature Extraction for Cognitive Computing with Multimodal Sentiment Sensing and Emotion Recognition Process. Int. J. Commun. Networks Inf. Secur. 14(2): 189-202 (2022)
skipping 534 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-29 14:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint