
11 Artikel
A Scrutiny of Honeyword Generation Methods: Remarks on Strengths and Weaknesses Points
, und
Development of a Scheme for Correcting Arbitrary Errors and Averaging Noise in Quantum Computing
, und
Enhancing the Speed of the Learning Vector Quantization (LVQ) Algorithm by Adding Partial Distance Computation
, , und
Enhancing Weak Nodes in Decision Tree Algorithm Using Data Augmentation
, , und
An Insight on Clustering Protocols in Wireless Sensor Networks
und
Modelling Activity of a Malicious User in Computer Networks
und
Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
, und
An Augmented UCAL Model for Predicting Trajectory and Location
, , und
Optimization of Cross Diagonal Pixel Value Differencing and Modulus Function Steganography Using Edge Area Block Patterns
, , , und
A Rule-Generation Model for Class Imbalances to Detect Student Entrepreneurship Based on the Theory of Planned Behavior
, , und
Suche
Alle Bände und Hefte dieser Zeitschrift
Band 25 (2025)
Band 16 (2016)
- Heft 6 (Dezember 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016 - Heft 4 (Dezember 2016)
- Heft 5 (Oktober 2016)
Issue Title: Special Issue on Application of Advanced Computing and Simulation in Information Systems - Heft 3 (September 2016)
- Heft 2 (Juni 2016)
- Heft 1 (März 2016)
Band 15 (2015)
Band 13 (2013)
- Heft Special-Heft (Dezember 2013)
- Heft 4 (Dezember 2013)
The publishing of the present issue (Volume 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1. - Heft 3 (September 2013)
- Heft 2 (Juni 2013)
- Heft 1 (März 2013)