
12 Artykułów
A Survey on Proxy Re-Signature Schemes for Translating One Type of Signature to Another
, oraz
A Review on Privacy Requirements and Application Layer Security in Internet of Things (IoT)
oraz
Hybrid Role and Attribute Based Access Control Applied in Information Systems
A Hybrid Method for Payload Enhancement in Image Steganography Based on Edge Area Detection
oraz
Simulation-Based Optimisation for Autonomous Transportation Systems Using a Parallel Real-Coded Genetic Algorithm with Scalable Nonuniform Mutation
, oraz
Identification of the Thermoelectric Cooler Using Hybrid Multi-Verse Optimizer and Sine Cosine Algorithm Based Continuous-Time Hammerstein Model
, , , oraz
Anomaly Detection Using XGBoost Ensemble of Deep Neural Network Models
, , , , , oraz
Wyszukiwanie
Wszystkie tomy i zeszyty w tym czasopiśmie
Tom 25 (2025)
Tom 16 (2016)
- Zeszyt 6 (Grudzień 2016)
Special issue with selection of extended papers from 6th International Conference on Logistic, Informatics and Service Science LISS’2016 - Zeszyt 4 (Grudzień 2016)
- Zeszyt 5 (Październik 2016)
Issue Title: Special Issue on Application of Advanced Computing and Simulation in Information Systems - Zeszyt 3 (Wrzesień 2016)
- Zeszyt 2 (Czerwiec 2016)
- Zeszyt 1 (Marzec 2016)
Tom 15 (2015)
- Zeszyt 7 (Grudzień 2015)
Special Issue on Information Fusion - Zeszyt 6 (Grudzień 2015)
Special Issue on Logistics, Informatics and Service Science - Zeszyt 4 (Listopad 2015)
- Zeszyt 3 (Wrzesień 2015)
- Zeszyt 2 (Czerwiec 2015)
- Zeszyt 5 (Kwiecień 2015)
Special Issue on Control in Transportation Systems - Zeszyt 1 (Marzec 2015)
Tom 13 (2013)
- Zeszyt Special-Zeszyt (Grudzień 2013)
- Zeszyt 4 (Grudzień 2013)
The publishing of the present issue (Volume 13, No 4, 2013) of the journal “Cybernetics and Information Technologies” is financially supported by FP7 project “Advanced Computing for Innovation” (ACOMIN), grant agreement 316087 of Call FP7 REGPOT-2012-2013-1. - Zeszyt 3 (Wrzesień 2013)
- Zeszyt 2 (Czerwiec 2013)
- Zeszyt 1 (Marzec 2013)