-
81
-
82
-
83
New Enhanced Authentication Protocol for Internet of Things
Published 2021-03-01Get full text
Article -
84
-
85
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Get full text
Article -
86
Blockchain Applications in the Military Domain: A Systematic Review
Published 2025-01-01Get full text
Article -
87
An environmental evaluation of food waste downstream management options: a hybrid LCA approach
Published 2018-04-01Get full text
Article -
88
-
89
-
90
-
91
Selected Topics on Information Management in Complex Systems: Editorial Introduction to Issue 24 of CSIMQ
Published 2020-10-01Get full text
Article -
92
Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
Published 2024-06-01Get full text
Article -
93
IMPLICITINĖ PREDIKATO KVANTIFIKACIJA IR PORT ROYALIO LOGIKA
Published 2004-01-01Get full text
Article -
94
IMPLICITINĖ PREDIKATO KVANTIFIKACIJA IR PORT ROYALIO LOGIKA
Published 2004-01-01Get full text
Article -
95
Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
Published 2023-09-01Get full text
Article -
96
-
97
-
98
From fitness trackers to medical devices: wearable technologies
Published 2023-06-01Get full text
Article -
99
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01Get full text
Article -
100