default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2021
- Shakeel Ahmed, Abdulaziz Alhumam:
Unified Computational Modelling for Healthcare Device Security Assessment. Comput. Syst. Sci. Eng. 37(1): 1-18 (2021) - Fahd N. Al-Wesabi, Saleh Alzahrani, Fuad Ali Mohammed Al-Yarimi, Mohammed Abdul, Nadhem Nemri, Mohammed M. Almazah:
A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship. Comput. Syst. Sci. Eng. 37(3): 297-311 (2021) - Ahmed Naif M. Alahmadi, Hegazy Rezk:
A Robust Single-Sensor MPPT Strategy for Shaded Photovoltaic-Battery System. Comput. Syst. Sci. Eng. 37(1): 63-71 (2021) - Mamdouh Alenezi:
Safeguarding Cloud Computing Infrastructure: A Security Analysis. Comput. Syst. Sci. Eng. 37(2): 159-167 (2021) - Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, Masood Ahmad, Abhishek Kumar Pandey, Rajeev Kumar, Raees Ahmad Khan:
Impact of Tools and Techniques for Securing Consultancy Services. Comput. Syst. Sci. Eng. 37(3): 347-360 (2021) - Abdulaziz Attaallah, Sabita Khatri, Mohd Nadeem, Syed Anas Ansar, Abhishek Kumar Pandey, Alka Agrawal:
Prediction of COVID-19 Pandemic Spread in Kingdom of Saudi Arabia. Comput. Syst. Sci. Eng. 37(3): 313-329 (2021) - Prasantha Bharathi Dhandapani, Dumitru Baleanu, Jayakumar Thippan, Vinoth Sivakumar:
New Fuzzy Fractional Epidemic Model Involving Death Population. Comput. Syst. Sci. Eng. 37(3): 331-346 (2021) - Xiaoyu Duan, Shi Ying, Wanli Yuan, Hailong Cheng, Xiang Yin:
A Generative Adversarial Networks for Log Anomaly Detection. Comput. Syst. Sci. Eng. 37(1): 135-148 (2021) - Malik Khlaif Gharaibeh, Natheer Khlaif Gharaibeh, Mohammad Ayoub Khan, Waleed Abdel Karim Abu-Ain, Musab Kasim AlQudah:
Intention to Use Mobile Augmented Reality in the Tourism Sector. Comput. Syst. Sci. Eng. 37(2): 187-202 (2021) - D. Gurukumaresan, C. Duraisamy, R. Srinivasan:
Optimal Solution of Fuzzy Transportation Problem Using Octagonal Fuzzy Numbers. Comput. Syst. Sci. Eng. 37(3): 415-421 (2021) - Kaisarul Islam, Tabia Hossain, Mohammad Monirujjaman Khan, Mehedi Masud, Roobaea Alroobaea:
Comparative Design and Study of A 60 GHz Antenna for Body-Centric Wireless Communications. Comput. Syst. Sci. Eng. 37(1): 19-32 (2021) - Shahrul Nizam Ismail, Suraya Hamid, Muneer Ahmad, Abdulellah Alaboudi, N. Z. Jhanjhi:
Exploring Students Engagement Towards the Learning Management System (LMS) Using Learning Analytics. Comput. Syst. Sci. Eng. 37(1): 73-87 (2021) - N. Z. Jhanjhi, Mamoona Humayun, Saleh Naif Almuayqil:
Cyber Security and Privacy Issues in Industrial Internet of Things. Comput. Syst. Sci. Eng. 37(3): 361-380 (2021) - Mohammed Hayder Kadhim, Farhad Mardukhi:
A Novel IoT Application Recommendation System Using Metaheuristic Multi-Criteria Analysis. Comput. Syst. Sci. Eng. 37(2): 149-158 (2021) - V. Vidya Lakshmi, J. S. Leena Jasmine:
A Hybrid Artificial Intelligence Model for Skin Cancer Diagnosis. Comput. Syst. Sci. Eng. 37(2): 233-245 (2021) - Zhuorong Li, Huawei Tian, Yanhui Xiao, Yunqi Tang, Anhong Wang:
An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files. Comput. Syst. Sci. Eng. 37(2): 247-263 (2021) - Qiyuan Liu, Shuhua Lu, Lingqiang Lan:
YOLOv3 Attention Face Detector with High Accuracy and Efficiency. Comput. Syst. Sci. Eng. 37(2): 283-295 (2021) - Sinil Mubarak, Mohamed Hadi Habaebi, Md. Rafiqul Islam, Abdul Rahman Farah Diyana, Mohammad Tahir:
Anomaly Detection in ICS Datasets with Machine Learning Algorithms. Comput. Syst. Sci. Eng. 37(1): 33-46 (2021) - Muhammad Asim Mubarik, Zhijian Wang, Yunyoung Nam, Seifedine Kadry, Muhammad Azam Waqar:
Instagram Mobile Application Digital Forensics. Comput. Syst. Sci. Eng. 37(2): 169-186 (2021) - Ali Mustafa, Muhammad Najam-ul-Islam, Salman Ahmed:
Average Convergence for Directed & Undirected Graphs in Distributed Systems. Comput. Syst. Sci. Eng. 37(3): 399-413 (2021) - Xizi Peng, Jinquan Zhang, Shibin Zhang, Wunan Wan, Hao Chen, Jinyue Xia:
A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain. Comput. Syst. Sci. Eng. 37(2): 265-281 (2021) - Mustafa M. M. Al Qudah, Ahmad Sufril Azlan Mohamed, Syaheerah L. Lutfi:
Affective State Recognition Using Thermal-Based Imaging: A Survey. Comput. Syst. Sci. Eng. 37(1): 47-62 (2021) - Hegazy Rezk, Mohamed A. Mohamed, Ahmed A. Zaki Diab, N. Kanagaraj:
Load Frequency Control of Multi-interconnected Renewable Energy Plants Using Multi-Verse Optimizer. Comput. Syst. Sci. Eng. 37(2): 219-231 (2021) - Zihao Shen, Hui Wang, Kun Liu, Peiqian Liu, Menglong Ba, Mengyao Zhao:
RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning. Comput. Syst. Sci. Eng. 37(1): 121-133 (2021) - Luis Eduardo Bautista Villalpando, Alain Abran:
A Data Security Framework for Cloud Computing Services. Comput. Syst. Sci. Eng. 37(2): 203-218 (2021) - Jiayi Wang, Xinhui Liu, Jinshi Chen, Tongjian Wang, Xin Wang:
Mechanical-Hydraulic Co-Simulation of Full Hydraulic Articulated Steering System. Comput. Syst. Sci. Eng. 37(3): 381-398 (2021) - Zhengqiu Weng, Timing Chen, Tiantian Zhu, Hang Dong, Dan Zhou, Osama Alfarraj:
TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators. Comput. Syst. Sci. Eng. 37(1): 105-119 (2021) - Hua-Rui Wu, Huaji Zhu, Xiao Han, Wei Xu:
Layout Optimization for Greenhouse WSN Based on Path Loss Analysis. Comput. Syst. Sci. Eng. 37(1): 89-104 (2021) - Qi Yue, Xiang Li, Dan Li:
Chinese Relation Extraction on Forestry Knowledge Graph Construction. Comput. Syst. Sci. Eng. 37(3): 423-442 (2021) - Qiang Zhi, Shuji Morisaki:
An Evaluation of Value-Oriented Review for Software Requirements Specification. Comput. Syst. Sci. Eng. 37(3): 443-461 (2021)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-08 15:01 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint