Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2021
- Shajulin Benedict:
Distributed blockchains for collaborative product designs in smart cities. Int. J. Soc. Comput. Cyber Phys. Syst. 2(3): 256-274 (2021) - Manik Lal Das:
Secure resource sharing in grid system without public key settings. Int. J. Soc. Comput. Cyber Phys. Syst. 2(3): 194-211 (2021) - Nidhi Desai, Manik Lal Das:
Rule based anonymisation against inference attack in social networks. Int. J. Soc. Comput. Cyber Phys. Syst. 2(3): 212-228 (2021) - Harinahalli Lokesh Gururaj, U. Tanuja, Janhavi V, B. Ramesh:
Detecting malicious users in the social networks using machine learning approach. Int. J. Soc. Comput. Cyber Phys. Syst. 2(3): 229-243 (2021) - Riddhi Solani, Manik Lal Das:
iCOPS: insider attack detection in distributed file systems. Int. J. Soc. Comput. Cyber Phys. Syst. 2(3): 244-255 (2021) - K. Vijayaprabakaran, K. Sathiyamurthy, S. Sowmya:
Deep learning-based medical expert system for diabetes diagnosis on IoT healthcare data. Int. J. Soc. Comput. Cyber Phys. Syst. 2(3): 177-193 (2021) - 2019
- Ramesh Chandra, Vaibhav Bhatnagar:
Cyber-squatting: a cyber crime more than an unethical act. Int. J. Soc. Comput. Cyber Phys. Syst. 2(2): 146-150 (2019) - Ainish Dave, Hardik Gajera, Manik Lal Das:
Privacy-preserving targeted online advertising. Int. J. Soc. Comput. Cyber Phys. Syst. 2(2): 132-145 (2019) - M. Asha Jerlin, Anindya Kumar Das, Joshua Agbonjaru:
Implementation of an efficient and intelligent Indian maritime borderline alert system using IoT. Int. J. Soc. Comput. Cyber Phys. Syst. 2(2): 95-105 (2019) - Mohit, A. Charan Kumari, Meghna Sharma:
A novel approach to text clustering using shift k-medoid. Int. J. Soc. Comput. Cyber Phys. Syst. 2(2): 106-118 (2019) - Swapnil S. Ninawe, Pallapa Venkataram:
Authentication schemes for social network users: a review. Int. J. Soc. Comput. Cyber Phys. Syst. 2(2): 151-176 (2019) - Manish Sharma, Shikha N. Khera, Pritam Babu Sharma:
The troika of artificial intelligence, emotional intelligence and customer intelligence. Int. J. Soc. Comput. Cyber Phys. Syst. 2(2): 119-131 (2019) - 2017
- Christoph Fuchs, Georg Groh:
Data sharing sensitivity, relevance, and social traits in social information retrieval. Int. J. Soc. Comput. Cyber Phys. Syst. 2(1): 1-34 (2017) - Madhu Kumari, Singh Vijendra:
Big data analytics in healthcare: opportunities, challenges and techniques. Int. J. Soc. Comput. Cyber Phys. Syst. 2(1): 35-58 (2017) - Indu Saini, Phool Singh, Anil Kumar Yadav:
Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme. Int. J. Soc. Comput. Cyber Phys. Syst. 2(1): 59-72 (2017) - Asif Ali Shah, Shabir A. Parah:
Chaos based novel cryptographic technique based on a new logistic map. Int. J. Soc. Comput. Cyber Phys. Syst. 2(1): 73-94 (2017) - 2016
- Gerard Deepak, Sheeba Priyadarshini:
A hybrid framework for social tag recommendation using context driven social information. Int. J. Soc. Comput. Cyber Phys. Syst. 1(4): 312-325 (2016) - Swapnil S. Ninawe, Pallapa Venkataram:
A method of designing an access mechanism for social networks. Int. J. Soc. Comput. Cyber Phys. Syst. 1(4): 387-408 (2016) - Prabukumar Manoharan, Loganathan Agilandeeswari, M. Sai Praneeth:
Opinion mining for digital India scheme using fuzzy sets. Int. J. Soc. Comput. Cyber Phys. Syst. 1(4): 344-355 (2016) - Sangeeta Rani, Kanwalvir Singh Dhindsa:
Malware detection techniques and tools for Android. Int. J. Soc. Comput. Cyber Phys. Syst. 1(4): 326-343 (2016) - Singh Vijendra:
Big data characteristics, challenges, architectures, analytics and applications: a review. Int. J. Soc. Comput. Cyber Phys. Syst. 1(4): 356-386 (2016) - 2012
- Walter Bamberger, Josef Schlittenlacher, Klaus Diepold:
Ability-aware trust for vehicular networks. Int. J. Soc. Comput. Cyber Phys. Syst. 1(3): 286-307 (2012) - Aaron Beach, Mike Gartrell, Richard Han:
q-Anon: practical anonymity for social networks. Int. J. Soc. Comput. Cyber Phys. Syst. 1(3): 223-241 (2012) - Miao Jiang, William L. McGill, Yan Cao:
Participatory risk management: concept and illustration. Int. J. Soc. Comput. Cyber Phys. Syst. 1(3): 268-285 (2012) - Farzana Rahman, Md. Endadul Hoque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed:
User privacy protection in pervasive social networking applications using PCO. Int. J. Soc. Comput. Cyber Phys. Syst. 1(3): 242-267 (2012) - 2011
- Georg Groh, Alexander Lehmann:
Deducing evidence for social situations from dynamic geometric interaction data. Int. J. Soc. Comput. Cyber Phys. Syst. 1(2): 206-222 (2011) - Denis Helic, Christoph Trattner, Markus Strohmaier, Keith Andrews:
Are tag clouds useful for navigation? A network-theoretic analysis. Int. J. Soc. Comput. Cyber Phys. Syst. 1(1): 33-55 (2011) - Juuso Karikoski, Matti Nelimarkka:
Measuring social relations with multiple datasets. Int. J. Soc. Comput. Cyber Phys. Syst. 1(1): 98-113 (2011) - Stephen Kelley, Mark K. Goldberg, Konstantin Mertsalov, Malik Magdon-Ismail, William A. Wallace:
Overlapping communities in social networks. Int. J. Soc. Comput. Cyber Phys. Syst. 1(2): 135-159 (2011) - Owen Macindoe, Whitman Richards:
Comparing networks using their fine structure. Int. J. Soc. Comput. Cyber Phys. Syst. 1(1): 79-97 (2011)
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-07 15:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint