


default search action
International Journal of Critical Computer-Based Systems, Volume 11
Volume 11, Numbers 1/2, 2024
- Edson Tavares de Camargo, Elias P. Duarte Jr.:

Algorithm-based fault-tolerant parallel sorting. 2-29 - Prasenjit Das

, Debabrata Datta, S. Suman Rajest, L. Maria Michael Visuwasam
, Anuradha Thakare, J. Cypto:
Application of multi-criteria decision-making approach using TOPSIS to identify the vulnerable time zone of earthquake time series signal. 30-47 - Walid El Mouhtadi

, Mohamed El Bakkali, Yassine Maleh
, Soufyane Mounir, Karim Ouazzane:
Refining malware detection with enhanced machine learning algorithms using hyperparameter tuning. 48-67 - Sibi Chakkaravarthy Sethuraman, Aditya Mitra, Anisha Ghosh, Rishita Shaw, Aswani Kumar Cherukuri

, Firuz Kamalov:
Conceptual design and implementation of FIDO2 compatible smart medical card for healthcare information system. 68-90 - Jeferson L. R. Souza

, Frank Siqueira:
Using the theorem of inaccessibility to assess dependable real-time networks. 91-114 - Giovanni Venâncio, Elias Procópio Duarte Jr.:

Highly available virtual network functions and services based on checkpointing/restore. 115-142
Volume 11, Number 3, 2024
- Fateh Latreche, Hichem Talbi

:
Controlling dynamic crowdsourcing processes using multi-layered algebraic Petri nets. 143-170 - H. L. Gururaj, Mohith C. Shekar, S. Priya, Shreyas J., George Sebastian, M. N. Manu:

Circumvent the proliferation of counterfeited circulars using blockchain. 171-193 - D. I. George Amalarethinam, J. Vinnarasi:

Enhancing the data security of cloud computing critical systems using layered encryption technique. 194-215 - Fadhil Mukhlif, Norafida Ithnin:

Blockchain technology: applications, security and privacy, big data, challenges and future directions. 216-233
Volume 11, Number 4, 2024
- M. S. S. Sasikumar, A. E. Narayanan:

A deterministic approach with Markov chain algorithm to impose higher order security in dynamic wireless sensor networks. 235-254 - R. Venketesh, K. Sasikala:

Intrusion detection and optimal path-based energy efficient data transmission using MLVQ and BM-MSOA in MANET. 255-279 - Joseph Bamidele Awotunde, Esau Taiwo Oladipupo, Emmanuel Abidemi Adeniyi, Abdulrauph Olanrewaju Babatunde, Dayo Reuben Aremu:

An enhanced internet of medical things using blockchain-enabled elliptic curve cryptography for security and privacy. 280-306 - Elaf Almushiti, Tarek Moulahi:

Collaborative AI-based malware detection through reliable clustered federated learning. 307-326

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














