![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computer Science Review, Volume 25
Volume 25, August 2017
- Nazia Majadi, Jarrod Trevathan
, Heather Gray, Vladimir Estivill-Castro
, Neil Bergmann
:
Real-time detection of shill bidding in online auctions: A literature review. 1-18 - Christian Spreafico, Davide Russo
, Caterina Rizzi:
A state-of-the-art review of FMEA/FMECA including patents. 19-28 - Ahmed S. Ghiduk
, Moheb R. Girgis
, Marwa H. Shehata:
Higher order mutation testing: A Systematic Literature Review. 29-48 - Stephen G. Kobourov
, Giuseppe Liotta
, Fabrizio Montecchiani
:
An annotated bibliography on 1-planarity. 49-67 - Salman Niksefat, Parisa Kaghazgaran
, Babak Sadeghiyan:
Privacy issues in intrusion detection systems: A taxonomy, survey and future directions. 69-78 - Eugenia A. Politou
, Efthimios Alepis, Constantinos Patsakis:
A survey on mobile affective computing. 79-100 - Sunny Behal
, Krishan Kumar
, Monika Sachdeva
:
Characterizing DDoS attacks and flash events: Review, research gaps and future directions. 101-114
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.