default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2024
- Abduljaleel Al-Hasnawi, Laith A. Abdul-Rahaim, Hassan Muwafaq Gheni, Zahraa Emad Fadel:
IoT Structure based Supervisor and Enquired the Greenhouse Parameters. J. Internet Serv. Inf. Secur. 14(1): 138-152 (2024) - Mohammad Atwah Al-Maaitah:
The Drivers of Big Data Analytics Adoption and its Impact on Corporate Entrepreneurship. J. Internet Serv. Inf. Secur. 14(2): 145-168 (2024) - Noor Raheem Abd Al-Nabi, Laith Awda Kadhim Mayyahi, Ammar Sabri Majeed, Ahmed Raheem Abdulnabi, Laith A. Abdul-Rahaim:
Design and Implementation of a Low-cost IoT Smart Weather Station Framework. J. Internet Serv. Inf. Secur. 14(2): 133-144 (2024) - Mohammad Al-Omari, Qasem Abu Al-Haija:
Towards Robust IDSs: An Integrated Approach of Hybrid Feature Selection and Machine Learning. J. Internet Serv. Inf. Secur. 14(2): 47-67 (2024) - Osamah J. Al-Qadhi, Laith A. Abdul-Rahaim:
A Nonredundant SVD-based Precoding Matrix for Blind Channel Estimation in CP-OFDM Systems Over Channels with Memory. J. Internet Serv. Inf. Secur. 14(1): 282-305 (2024) - Seiba Alhassan, Gaddafi Abdul-Salaam, Asante Micheal, Yaw Marfo Missah, Ernest Domanaanmwi Ganaa, Alimatu Sadia Shirazu:
CFS-AE: Correlation-based Feature Selection and Autoencoder for Improved Intrusion Detection System Performance. J. Internet Serv. Inf. Secur. 14(1): 104-120 (2024) - Wasin Alkishri, Setyawan Widyarto, Jabar H. Yousif:
Evaluating the Effectiveness of a Gan Fingerprint Removal Approach in Fooling Deepfake Face Detection. J. Internet Serv. Inf. Secur. 14(1): 85-103 (2024) - Wafa' Za'al Alma'aitah, Fatima N. Al-Aswadi, Rami S. Alkhawaldeh:
Improving Terminologies Synonym Expansion Model for Cultural Heritage Contents. J. Internet Serv. Inf. Secur. 14(2): 237-246 (2024) - Bshayer S. Alsafar, Dhay M. Alzaher, Raghad W. Alshwukh, Afnan M. Darwish, Thowiba E. Ahmed, Eyman A. Alyahyan, Dabiah Ahmed Alboaneen, Enas E. El-Sharawy:
Smart Parking Management System Using IoT. J. Internet Serv. Inf. Secur. 14(2): 284-297 (2024) - Samer Atawneh, Ziad Alshammari, Mousa T. Al-Akhras, Bayan Abu Shawar:
A Security Framework for Addressing Privacy Issues in the Zoom Conference System. J. Internet Serv. Inf. Secur. 14(1): 242-265 (2024) - Rosa Clavijo-López, Wayky Alfredo Luy Navarrete, Jesús Merino Velásquez, Carlos Miguel Aguilar Saldaña, Alcides Muñoz Ocas, César Augusto Flores-Tananta:
Integrating Novel Machine Learning for Big Data Analytics and IoT Technology in Intelligent Database Management Systems. J. Internet Serv. Inf. Secur. 14(1): 206-218 (2024) - Fernando Escobedo, Henry Bernardo Garay Canales, Eddy Miguel Aguirre Reyes, Carlos Alberto Lamadrid Vela, Oscar Napoleón Montoya Perez, Grover Enrique Caballero Jimenez:
Deep Attentional Implanted Graph Clustering Algorithm for the Visualization and Analysis of Social Networks. J. Internet Serv. Inf. Secur. 14(1): 153-164 (2024) - Bandr Fakiha:
Unlocking Digital Evidence: Recent Challenges and Strategies in Mobile Device Forensic Analysis. J. Internet Serv. Inf. Secur. 14(2): 68-84 (2024) - Adán F. Guzmán-Castillo, Gabriela Suntaxi, Bryan N. Flores-Sarango, Denys A. Flores:
Towards Designing a Privacy-Oriented Architecture for Managing Personal Identifiable Information. J. Internet Serv. Inf. Secur. 14(1): 64-84 (2024) - Mohamed Halim, Abdelmajid Tahiri, Yassir El Ghzizal, Nouha Adadi, Driss Chenouni:
Web Service-Oriented E-learning: Proposition of Semantic Approach to Discover Web Services Related to the E-learning System. J. Internet Serv. Inf. Secur. 14(2): 1-17 (2024) - Walaa Saber Ismail:
Threat Detection and Response Using AI and NLP in Cybersecurity. J. Internet Serv. Inf. Secur. 14(1): 195-205 (2024) - Selvaprabu Jeganathan, Arun Raj Lakshminarayanan, Saravanan Parthasarathy, A. Abdul Azeez Khan, K. Javubar Sathick:
OptCatB: Optuna Hyperparameter Optimization Model to Forecast the Educational Proficiency of Immigrant Students based on CatBoost Regression. J. Internet Serv. Inf. Secur. 14(2): 111-132 (2024) - V. Jyothi, Tammineni Sreelatha, T. M. Thiyagu, R. Sowndharya, N. Arvinth:
A Data Management System for Smart Cities Leveraging Artificial Intelligence Modeling Techniques to Enhance Privacy and Security. J. Internet Serv. Inf. Secur. 14(1): 37-51 (2024) - Myeongjoo Kang:
A Study on the Effect of Information and Communication Technology (ICT) on Trade in Services in the United States. J. Internet Serv. Inf. Secur. 14(1): 266-281 (2024) - Sivayazi Kappagantula, Giriraj Mannayee:
Dynamic Path Planning Algorithm for Mobile Robots: Leveraging Reinforcement Learning for Efficient Navigation. J. Internet Serv. Inf. Secur. 14(2): 226-236 (2024) - P. Lavanya, I. V. Subba Reddy, V. Selvakumar, Shreesh V. Deshpande:
An Intelligent Health Surveillance System: Predictive Modeling of Cardiovascular Parameters through Machine Learning Algorithms Using LoRa Communication and Internet of Medical Things (IoMT). J. Internet Serv. Inf. Secur. 14(1): 165-179 (2024) - Van Hoa Le:
An Optimal Model for Allocation Readers with Grid Cell Size and Arbitrary Workspace Shapes in RFID Network Planning. J. Internet Serv. Inf. Secur. 14(1): 180-194 (2024) - K. Malathi:
Improved Dynamic Regression Framework for Effective Data Management in Wireless Networks on Cloud-assisted Internet of Everything Platform. J. Internet Serv. Inf. Secur. 14(2): 169-188 (2024) - Matthew Marcellino, Arya Wicaksana, Moeljono Widjaja:
Zero-knowledge Identity Authentication for E-voting System. J. Internet Serv. Inf. Secur. 14(2): 18-31 (2024) - Sahar J. Mohammed Mohammed, Mohammed Sami Mohammed, Nihad Mahmoud Nasir:
IoT-Traffic Networks Effective Features Based on NSGA-II Technique. J. Internet Serv. Inf. Secur. 14(2): 247-267 (2024) - G. Parimala, R. Kayalvizhi:
Improved Elman Deep Learning Model for Intrusion Detection System in Internet of Things. J. Internet Serv. Inf. Secur. 14(1): 121-137 (2024) - Saravanan Parthasarathy, Arun Raj Lakshminarayanan, A. Abdul Azeez Khan, K. Javubar Sathick:
CSA-Forecaster: Stacked Model for Forecasting Child Sexual Abuse. J. Internet Serv. Inf. Secur. 14(1): 219-241 (2024) - Onno W. Purbo, Prasetyo Purnomo, Dimaz Arno Prasetio, Agung Budi Prasetio, Tubagus Asep Nurdin:
Identifying Large Young Hacker Concentration in Indonesia. J. Internet Serv. Inf. Secur. 14(1): 52-63 (2024) - Mehak Saini, Himanshi, Sanju Saini:
Privacy-enhancing Blockchain Solutions for the Healthcare Sector: Efficient Message Sharing and Robust Big Data Protection. J. Internet Serv. Inf. Secur. 14(2): 85-97 (2024) - Samyuktha Sasi Sekaran, M. Subaji:
Variational Autoencoder Diffusion Model (VAEDM) and Divergence Asynchronous Reinforcement Learning (DARL) for Rail Surface Defect Detection. J. Internet Serv. Inf. Secur. 14(2): 298-317 (2024)
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-24 06:28 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint