| Issue | Title | |
| Vol 19, No 2 (2018) | Coverless Steganography Based on English Texts Using Binary Tags Protocol | Abstract PDF |
| Yulei Wu, Xianyi Chen, Xingming Sun | ||
| Vol 18, No 2 (2017) | Coverless Text Information Hiding Method Based on the Rank Map | Abstract |
| Jianjun Zhang, Lucai Wang, Haijun Lin | ||
| Vol 15, No 2 (2014) | CPA: A Cluster-Based Packet Acknowledgement Approach in WSNs | Abstract |
| Yun-Lei Sun, Xiu-Quan Qiao, Bo Cheng, Si-Da Xue, Jun-Liang Chen | ||
| Vol 19, No 3 (2018) | CP-ABE based Access Control with Policy Updating and Fast Decryption for Intelligent Manufacturing | Abstract PDF |
| Long Li, Tianlong Gu, Liang Chang, Jingjing Li, Junyan Qian | ||
| Vol 17, No 2 (2016) | Creation Method and Evolution Evaluation of Concept Knowledge Maps | Abstract |
| Meng Li, Sheng Cao, Zhi-Quang Qin | ||
| Vol 24, No 1 (2023) | CRF-MEM: Conditional Random Field Model Based Modified Expectation Maximization Algorithm for Sarcasm Detection in Social Media | Abstract PDF |
| Anbarasu Sivalingam, Karthik Sundararajan, Anandhakumar Palanisamy | ||
| Vol 16, No 3 (2015) | Critical Comparison of Access Control Models for Cloud Computing | Abstract |
| Mutaz Beraka, Jalal Al-Muhtadi | ||
| Vol 8, No 3 (2007) | Cross-layer Mobility with SIP and MIPv6 | Abstract |
| Rui Prior, Susana Sargento | ||
| Vol 23, No 4 (2022) | Cross-Project Defect Prediction Method based on Feature Distribution Alignment and Neighborhood Instance Selection | Abstract PDF |
| Yi Zhu, Yu Zhao, Qiao Yu, Xiaoying Chen | ||
| Vol 19, No 3 (2018) | Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps | Abstract PDF |
| Chien-Ming Chen, Linlin Xu, King-Hang Wang, Shuai Liu, Tsu-Yang Wu | ||
| Vol 11, No 6 (2010) | Cryptanalysis by Using Differential-Linear Hull: An Extension to Differential-Linear Cryptanalysis | Abstract |
| Zhi-Qiang Liu, Da-Wu Gu, Shi-Jing Ge, Wei Li | ||
| Vol 14, No 2 (2013) | Cryptanalysis of a Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves | Abstract |
| Zeyad Mohammad, Chien-Lung Hsu, Yaw-Chung Chen, Chi-Chun Lo | ||
| Vol 13, No 1 (2012) | Cryptanalysis of the Knapsack Cipher 0/255 | Abstract |
| Junfang Xiao, Guihua Zeng, Baocang Wang | ||
| Vol 24, No 2 (2023) | CSCP: Energy Charging Mechanism for Surveillance Quality, Network Connectivity and Perpetual Lifetime in WRSNs | Abstract PDF |
| Yuanping Kan, Chih-Yung Chang, Shih-Jung Wu, Chin-Hwa Kuo, Diptendu Sinha Roy | ||
| Vol 13, No 3 (2012) | CSP Based Web Service Composition Model with Buffer at the Business Logic Process Level | Abstract |
| Hwa-Young Jeong, Yang-Sun Lee | ||
| Vol 25, No 3 (2024) | Current Status and Emerging Trends of Generative Artificial Intelligence Technology: A Bibliometric Analysis | Abstract |
| Nan Wang, Suqi Li, Chenhui Wang, Li Zhao | ||
| Vol 13, No 6 (2012) | Customer Behavior Analysis by Using Multiple Databases: A Case of University Students' Use of Online Bookstore Services | Abstract |
| Ko-Tsung Chu, Sheng-Ming Wang, Jia-Li Hou, Jih-Hsin Tang, Jyh-Jian Sheu | ||
| Vol 9, No 4 (2008) | Customized Advertising in E-Commerce Services Provision | Abstract |
| Vincenzo Loia, Sabrina Senatore, Maria I. Sessa, Mario Veniero | ||
| Vol 20, No 5 (2019) | Customized Panorama System for Wayfinding and Walkthrough | Abstract PDF |
| Yu-Yi Chen, Yih-Jiun Lee, Kai-Wen Lien, Tzu-Yi Chen | ||
| Vol 26, No 6 (2025) | Cyber Situational Awareness for Oil & Gas Pipeline Networks: A Systematized Review of Methods, Models, and Engineering Practice | Abstract |
| Fei Song, Tieliang Sun, Shuai Jiang, Yuqin Wang, Shiyin Zhu | ||
| Vol 21, No 5 (2020) | Cyber-Bullying and Cyber-Harassment Detection Using Supervised Machine Learning Techniques in Arabic Social Media Contents | Abstract PDF |
| Tarek Kanan, Amal Aldaaja, Bilal Hawashin | ||
| Vol 20, No 7 (2019) | Cycle-based Energy-saving Scheme for NG-EPON Networks with High Traffic Loading | Abstract PDF |
| Chien-Ping Liu, Ho-Ting Wu, Chao-Lin Tsai, Kai-Wei Ke | ||
| Vol 2, No 1 (2001) | 無線網際網路服務使用者之創新性研究 | Abstract |
| 杜文富(Wen-Fu Tu), 王小惠 | ||
| Vol 10, No 4 (2009) | 無線網路環境下利用ROHC壓縮網路語音效能之研究 | Abstract |
| 蔡明興(Ming-Hsing Tsai), 鄭仕遠(Shih-Yuan Cheng), 陳懷恩(Whai-En Chen) | ||
| Vol 4, No 2 (2003) | 無線區域網路跨校漫遊實驗環境之建置 | Abstract |
| 顧靜恆(Ching-Heng Ku), 楊詠淇(Yung-Chi Yang), 蔡志宏(Zsehong Tsai) | ||
| 976 - 1000 of 2731 Items | << < 35 36 37 38 39 40 41 42 43 44 > >> | |
