A Survey on Event Prediction Methods from a Systems Perspective: Bringing Together Disparate Research Areas.
vol.57 iss.12 (2025) pp.37 Unveiling the Covert Vulnerabilities in Multi-Factor Authentication Protocols: A Systematic Review and Security Analysis.
vol.57 iss.11 (2025) pp.37 Trojan Attacks and Countermeasures on Deep Neural Networks from Life-Cycle Perspective: A Review
vol.57 iss.10 (2025) pp.37 Aortic Vessel Tree Segmentation for Cardiovascular Diseases Treatment: Status Quo
vol.57 iss.9 (2025) pp.35 A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
vol.57 iss.8 (2025) pp.41 A Review on Trustworthiness of Digital Assistants for Personal Healthcare.
vol.57 iss.7 (2025) pp.34 Deep Learning on Network Traffic Prediction: Recent Advances, Analysis, and Future Directions.
vol.57 iss.6 (2025) pp.37 Privacy-preserved and Responsible Recommenders: From Conventional Defense to Federated Learning and Blockchain.
vol.57 iss.5 (2025) pp.35 Private and Secure Distributed Deep Learning: A Survey.
vol.57 iss.4 (2025) pp.43 Multi-modal Misinformation Detection: Approaches, Challenges and Opportunities.
vol.57 iss.3 (2025) pp.29 Approaches to Conflict-free Replicated Data Types.
vol.57 iss.2 (2025) pp.36 MITRE ATT&CK: State of the Art and Way Forward.
vol.57 iss.1 (2025) pp.37 Evaluation Methodologies in Software Protection Research
vol.57 iss.4 (2024) pp.41 An Overview of FPGA-inspired Obfuscation Techniques.
vol.56 iss.12 (2024) pp.35 A Survey on Malware Detection with Graph Representation Learning.
vol.56 iss.11 (2024) pp.36 UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions.
vol.56 iss.10 (2024) pp.35 Contactless Diseases Diagnoses Using Wireless Communication Sensing: Methods and Challenges Survey.
vol.56 iss.9 (2024) pp.29 A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions.
vol.56 iss.8 (2024) pp.48 Efficient High-Resolution Deep Learning: A Survey.
vol.56 iss.7 (2024) pp.35 ANALÝZA SOULADU OBSAHU ICT STUDIJNÍCH OBORU S POZADAVKY PRAXE V CESKÉ REPUBLICE
vol.16 iss.3 (2013) pp.148
vol.57 iss.12 (2025) pp.37 Unveiling the Covert Vulnerabilities in Multi-Factor Authentication Protocols: A Systematic Review and Security Analysis.
vol.57 iss.11 (2025) pp.37 Trojan Attacks and Countermeasures on Deep Neural Networks from Life-Cycle Perspective: A Review
vol.57 iss.10 (2025) pp.37 Aortic Vessel Tree Segmentation for Cardiovascular Diseases Treatment: Status Quo
vol.57 iss.9 (2025) pp.35 A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks
vol.57 iss.8 (2025) pp.41 A Review on Trustworthiness of Digital Assistants for Personal Healthcare.
vol.57 iss.7 (2025) pp.34 Deep Learning on Network Traffic Prediction: Recent Advances, Analysis, and Future Directions.
vol.57 iss.6 (2025) pp.37 Privacy-preserved and Responsible Recommenders: From Conventional Defense to Federated Learning and Blockchain.
vol.57 iss.5 (2025) pp.35 Private and Secure Distributed Deep Learning: A Survey.
vol.57 iss.4 (2025) pp.43 Multi-modal Misinformation Detection: Approaches, Challenges and Opportunities.
vol.57 iss.3 (2025) pp.29 Approaches to Conflict-free Replicated Data Types.
vol.57 iss.2 (2025) pp.36 MITRE ATT&CK: State of the Art and Way Forward.
vol.57 iss.1 (2025) pp.37 Evaluation Methodologies in Software Protection Research
vol.57 iss.4 (2024) pp.41 An Overview of FPGA-inspired Obfuscation Techniques.
vol.56 iss.12 (2024) pp.35 A Survey on Malware Detection with Graph Representation Learning.
vol.56 iss.11 (2024) pp.36 UAV-Assisted IoT Applications, QoS Requirements and Challenges with Future Research Directions.
vol.56 iss.10 (2024) pp.35 Contactless Diseases Diagnoses Using Wireless Communication Sensing: Methods and Challenges Survey.
vol.56 iss.9 (2024) pp.29 A Survey on Cyber Resilience: Key Strategies, Research Challenges, and Future Directions.
vol.56 iss.8 (2024) pp.48 Efficient High-Resolution Deep Learning: A Survey.
vol.56 iss.7 (2024) pp.35 ANALÝZA SOULADU OBSAHU ICT STUDIJNÍCH OBORU S POZADAVKY PRAXE V CESKÉ REPUBLICE
vol.16 iss.3 (2013) pp.148