A
-
Accuracy
Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
-
Algorithm
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
Anonymous Social Network Graph
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
-
Attack Graph
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
B
-
Bayesian Network
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Bioinformatics
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
Boolean operation
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
-
Bug Report
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
C
-
Centrality measures
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
-
Cloud Computing
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
Concept drift
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
Copula theory
Analysis of the Impact of Wireless Three-User Multiple Access Channel Coefficients Correlation on Outage Probability: A Copula-Based Approach [Volume 6, Issue 2, 2023, Pages 25-30]
-
Correlation
Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
-
Cost-Benefit Analysis
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Countermeasure Analysis
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
D
-
Data Replication
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
Duplicate Detection
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
E
-
Efficiency
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
-
Energy Optimization
Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
F
-
Farlie-Gumbel-Morgenstern
Analysis of the Impact of Wireless Three-User Multiple Access Channel Coefficients Correlation on Outage Probability: A Copula-Based Approach [Volume 6, Issue 2, 2023, Pages 25-30]
-
Feature selection
Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
-
FlexiTP
Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
-
Fuzzy Systems
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
I
-
Influential users
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
-
Internet of Things
A Lightweighted Secure Scheme for Data Aggregation in Large-Scale IoT-Based Smart Grids [Volume 6, Issue 2, 2023, Pages 57-66]
M
-
Machine learning
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
-
Meta-heuristic algorithms
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
Motif Discovery
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
N
-
Network Longevity
Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
O
-
Optimization
Novel Correlation-based Feature Selection Approach using Manta Ray Foraging Optimization [Volume 6, Issue 1, 2023, Pages 81-100]
P
-
Personalized Privacy
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
-
Power consumption
A Data Replication Algorithm for Improving Server Efficiency in Cloud Computing Using PSO and Fuzzy Systems [Volume 6, Issue 2, 2023, Pages 1-14]
-
Privacy Preserving
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
-
Process changes
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
Process mining
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
R
-
Ramp secret sharing scheme
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
-
RNA Motif
A Taxonomy for RNA Motif Discovery [Volume 6, Issue 1, 2023, Pages 15-26]
-
Runtime Performance
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
S
-
Search Space Reduction
A Novel Two-Step Classification Approach for Runtime Performance Improvement of Duplicate Bug Report Detection [Volume 6, Issue 1, 2023, Pages 1-14]
-
Security Risk Management
Dynamic Security Risk Management Considering Systems Structural and Probabilistic Attributes [Volume 6, Issue 2, 2023, Pages 41-56]
-
Smart grids
A Lightweighted Secure Scheme for Data Aggregation in Large-Scale IoT-Based Smart Grids [Volume 6, Issue 2, 2023, Pages 57-66]
-
Social network
Personalized Privacy Preserving Method for Social Networks Graph k-Anonymization [Volume 6, Issue 1, 2023, Pages 37-46]
-
Susceptible-Infected-Recovered model
P-centrality: An Improvement for Information Diffusion Maximization in Weighted Social Networks [Volume 6, Issue 1, 2023, Pages 59-70]
W
-
Word embedding
Trace2Vec-CDD: A Framework for Concept Drift Detection in Business Process Logs using Trace Embedding [Volume 6, Issue 1, 2023, Pages 71-79]
-
WSNs
Optimization of FlexiTP Energy-Aware Algorithm in Wireless Sensor Networks [Volume 6, Issue 2, 2023, Pages 31-40]
Z
-
Zigzag decodable codes
An Efficient Ramp Secret Sharing Scheme Based on Zigzag-Decodable Codes [Volume 6, Issue 2, 2023, Pages 15-24]
Your query does not match with any item