default search action
Search dblp for Publications
export results for "toc:db/journals/nct/nct7.bht:"
@article{DBLP:journals/nct/AdetunjiM22, author = {Adebisi J. Adetunji and Babatunde O. Moses}, title = {The Role of Network Technologies in the Enhancement of the Health, Education, and Energy Sectors}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {39--54}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p39}, doi = {10.5539/NCT.V7N1P39}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/AdetunjiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Iazeolla22, author = {Giuseppe Iazeolla}, title = {Power Management of Base Transceiver Stations for Mobile Networks}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {12--26}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p12}, doi = {10.5539/NCT.V7N1P12}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/Iazeolla22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/Lee22, author = {Bruce Lee}, title = {Reviewer Acknowledgements for Network and Communication Technologies Vol. 7, No. 1}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {61}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p61}, doi = {10.5539/NCT.V7N1P61}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nct/Lee22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/NicolasE22, author = {Nkondock Mi Bahanag Nicolas and Atsa Etoundi Roger}, title = {An overview of Intrusion Detection within an Information System: The Improvment by Process Mining}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {55--60}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p55}, doi = {10.5539/NCT.V7N1P55}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/NicolasE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/NikelA22, author = {Fosoh Holiness Nikel and Austin Oguejiofor Amaechi}, title = {An Assessment of Employee Knowledge, Awareness, Attitude towards Organizational Cybersecurity in Cameroon}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {1--11}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p1}, doi = {10.5539/NCT.V7N1P1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/NikelA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nct/YangW22, author = {Ching{-}Yu Yang and Wen{-}Fong Wang}, title = {Hiding Secrets in Electrocardiogram Based on Integer Wavelet Transform with Coefficient Adjustment and {LSB} Substitution}, journal = {Netw. Commun. Technol.}, volume = {7}, number = {1}, pages = {27--38}, year = {2022}, url = {https://doi.org/10.5539/nct.v7n1p27}, doi = {10.5539/NCT.V7N1P27}, timestamp = {Fri, 28 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nct/YangW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.