160 | -- | 0 | Guma Ali, Mussa Ally Dida, Anael Elikana Sam. Two-Factor Authentication Scheme for Mobile Money: A Review of Threat Models and Countermeasures |
161 | -- | 0 | Zahra Jahedi, Thomas Kunz. The Value of Simple Heuristics for Virtualized Network Function Placement |
162 | -- | 0 | William Villegas-CH, Xavier Palacios-Pacheco, Milton Román Cañizares. An Internet of Things Model for Improving Process Management on University Campus |
163 | -- | 0 | A. R. Al-Ali, Ragini Gupta, Tasneem Zaman Batool, Taha Landolsi, Fadi Aloul, Ahmad Al Nabulsi. Digital Twin Conceptual Model within the Context of Internet of Things |
164 | -- | 0 | Wei Sun 0026, Hui Su, Huacheng Xie. Policy-Engineering Optimization with Visual Representation and Separation-of-Duty Constraints in Attribute-Based Access Control |
165 | -- | 0 | Sergei Mikhailov, Alexey M. Kashevnik. Tourist Behaviour Analysis Based on Digital Pattern of Life - An Approach and Case Study |
166 | -- | 0 | Louis Edward Papa, Thaier Hayajneh. A Survey of Defensive Measures for Digital Persecution in the Global South |
167 | -- | 0 | Niraj Thapa, ZhiPeng Liu, Dukka B. Kc, Balakrishna Gokaraju, Kaushik Roy 0003. Comparison of Machine Learning and Deep Learning Models for Network Intrusion Detection Systems |
168 | -- | 0 | Rana Alabdan. Phishing Attacks Survey: Types, Vectors, and Technical Approaches |
169 | -- | 0 | Mikhail Petrov. An Approach to Changing Competence Assessment for Human Resources in Expert Networks |
170 | -- | 0 | Hailong Huang, Andrey V. Savkin. Autonomous Navigation of a Solar-Powered UAV for Secure Communication in Urban Environments with Eavesdropping Avoidance |
171 | -- | 0 | Christian Tipantuña, Xavier Hesselbach. NFV-Enabled Efficient Renewable and Non-Renewable Energy Management: Requirements and Algorithms |
172 | -- | 0 | Yanjun Shi, Yijia Guo, Lingling Lv, Keshuai Zhang. An Efficient Resource Scheduling Strategy for V2X Microservice Deployment in Edge Servers |
173 | -- | 0 | Salvatore Vilella, Mirko Lai, Daniela Paolotti, Giancarlo Ruffo. Immigration as a Divisive Topic: Clusters and Content Diffusion in the Italian Twitter Debate |
174 | -- | 0 | Flourensia Sapty Rahayu, Lukito Edi Nugroho, Ridi Ferdiana, Djoko Budiyanto Setyohadi. Research Trend on the Use of IT in Digital Addiction: An Investigation Using a Systematic Literature Review |
175 | -- | 0 | Xin Song, Lin Xia, Siyang Xu, Yue Wang. Secure Communication for Uplink Cellular Networks Assisted with Full-Duplex Device-to-Device User |
176 | -- | 0 | Christian Scheel, Francesca Fallucchi, Ernesto William De Luca. Visualization, Interaction and Analysis of Heterogeneous Textbook Resources |