Works matching IS 2073431X AND DT 2022 AND VI 11 AND IP 12
Results: 19
A Survey on Security Attacks and Intrusion Detection Mechanisms in Named Data Networking.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 186, doi. 10.3390/computers11120186
- By:
- Publication type:
- Article
Portuguese Teachers' Conceptions of the Use of Microsoft 365 during the COVID-19 Pandemic.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 185, doi. 10.3390/computers11120185
- By:
- Publication type:
- Article
Estimation of 5G Core and RAN End-to-End Delay through Gaussian Mixture Models.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 184, doi. 10.3390/computers11120184
- By:
- Publication type:
- Article
A Framework for a Seamless Transformation to Online Education.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 183, doi. 10.3390/computers11120183
- By:
- Publication type:
- Article
Learning Explainable Disentangled Representations of E-Commerce Data by Aligning Their Visual and Textual Attributes.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 182, doi. 10.3390/computers11120182
- By:
- Publication type:
- Article
A Systematic Review on Social Robots in Public Spaces: Threat Landscape and Attack Surface.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 181, doi. 10.3390/computers11120181
- By:
- Publication type:
- Article
Macroscopic Spatial Analysis of the Impact of Socioeconomic, Land Use and Mobility Factors on the Frequency of Traffic Accidents in Bogotá.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 180, doi. 10.3390/computers11120180
- By:
- Publication type:
- Article
Agile Development Methodologies and Natural Language Processing: A Mapping Review.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 179, doi. 10.3390/computers11120179
- By:
- Publication type:
- Article
Challenges of IoT Identification and Multi-Level Protection in Integrated Data Transmission Networks Based on 5G/6G Technologies.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 178, doi. 10.3390/computers11120178
- By:
- Publication type:
- Article
On the Feasibility of Real-Time HRV Estimation Using Overly Noisy PPG Signals.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 177, doi. 10.3390/computers11120177
- By:
- Publication type:
- Article
Identification of Heart Arrhythmias by Utilizing a Deep Learning Approach of the ECG Signals on Edge Devices.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 176, doi. 10.3390/computers11120176
- By:
- Publication type:
- Article
Heuristic Evaluation of Microsoft Teams as an Online Teaching Platform: An Educators' Perspective.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 175, doi. 10.3390/computers11120175
- By:
- Publication type:
- Article
Exploration of the Impact of Cybersecurity Awareness on Small and Medium Enterprises (SMEs) in Wales Using Intelligent Software to Combat Cybercrime.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 174, doi. 10.3390/computers11120174
- By:
- Publication type:
- Article
An Improved Binary Owl Feature Selection in the Context of Android Malware Detection.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 173, doi. 10.3390/computers11120173
- By:
- Publication type:
- Article
An Augmented Reality CBIR System Based on Multimedia Knowledge Graph and Deep Learning Techniques in Cultural Heritage.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 172, doi. 10.3390/computers11120172
- By:
- Publication type:
- Article
Improving ERPs Integration in Organization: An EOS-Based GreneOS Implementation.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 171, doi. 10.3390/computers11120171
- By:
- Publication type:
- Article
Meta-Heuristic Optimization Algorithm-Based Hierarchical Intrusion Detection System.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 170, doi. 10.3390/computers11120170
- By:
- Publication type:
- Article
Solving the Schrödinger Equation with Genetic Algorithms: A Practical Approach.
- Published in:
- Computers (2073-431X), 2022, v. 11, n. 12, p. 169, doi. 10.3390/computers11120169
- By:
- Publication type:
- Article
Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11 , 147.
- Published in:
- 2022
- By:
- Publication type:
- Correction Notice