


default search action
Computer Science Review, Volume 58
Volume 58, 2025
- Marco Arazzi

, Dincy R. Arikkat
, Serena Nicolazzo
, Antonino Nocera
, Rafidha Rehiman K. A.
, Vinod P.
, Mauro Conti
:
NLP-based techniques for Cyber Threat Intelligence. 100765 - Israa A. Albadarneh, Bassam H. Hammo, Omar S. Al-Kadi

:
Attention-based transformer models for image captioning across languages: An in-depth survey and evaluation. 100766 - Siddique Latif, Syed Aun Muhammad Zaidi, Heriberto Cuayáhuitl, Fahad Shamshad, Moazzam Shoukat, Muhammad Usama

, Junaid Qadir:
Transformers in speech processing: Overcoming challenges and paving the future. 100768 - Manish Kumar Chandan

, Shrabanti Mandal
:
A comprehensive survey on sentiment analysis: Framework, techniques, and applications. 100777 - Manpreet Kaur

, Dhavleesh Rattan
, Madan Lal:
Insight into code clone management through refactoring: a systematic literature review. 100767 - Raj Kumar Baliyar Singh

, K. Hemant Kumar Reddy
:
Edge-AI empowered Cyber-Physical Systems: A comprehensive review on performance analysis. 100769 - Praveensankar Manimaran

, Thiago Garrett
, Leander Jehl
, Roman Vitenberg:
Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems. 100776 - Enrico Martini

, Andrea Calanca, Nicola Bombieri:
Denoising and completion filters for human motion software: A survey with code. 100780 - Luiz F. Bittencourt, Roberto Rodrigues Filho, Josef Spillner, Filip De Turck, José Santos

, Nelson L. S. da Fonseca, Omer F. Rana
, Manish Parashar, Ian T. Foster:
The computing continuum: Past, present, and future. 100782 - Tanisha Gupta

, Arvind Selwal, Ajay Kumar Sharma:
A survey on image cryptography mechanisms: hitherto, and future directions. 100783 - Miaomiao Wang, Sheng Li, Xinpeng Zhang, Guorui Feng:

Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions. 100785 - Asra Sulaiman Alshabib, Sajjad Mahmood, Mohammad R. Alshayeb:

A systematic literature review on cross-language source code clone detection. 100786 - Xudong Jia

, Peng Xun, Wei Peng
, Baokang Zhao, Haojie Li, Chiran Shen:
Deep anomaly detection for time series: A survey. 100787 - Nafiseh Soleymani, Mohammad Hossein Moattar, Reza Sheibani:

Dealing with high dimensional multi-view data: A comprehensive review of non-negative matrix factorization approaches in data mining and machine learning. 100788 - Abdul Razaque, Salim Hariri, Abrar Mohammed Alajlan, Joon Yoo:

A comprehensive review of cybersecurity vulnerabilities, threats, and solutions for the Internet of Things at the network-cum-application layer. 100789 - Byeonghui Jeong, Young-Sik Jeong

:
Autoscaling techniques in cloud-native computing: A comprehensive survey. 100791 - Alejandro Guerra-Manzanares

, Maurantonio Caprolu
, Roberto Di Pietro
:
A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges. 100781 - Marco D'Elia

, Irene Finocchi, Maurizio Patrignani:
Maximal cliques summarization: Principles, problem classification, and algorithmic approaches. 100784 - Tejas M. Modi

, Kuna Venkateswararao, Pravati Swain:
Integration of SDN into UAV, edge computing, & Blockchain: A review, challenges, & future directions. 100790 - Nazila Pourhaji Aghayengejeh, M. A. Balafar, Narjes Nikzad-Khasmakhi:

Revolutionizing textual data insights: A comprehensive review of the dual relationship between transformers and clustering in textual data analysis. 100792 - Tanzila Kehkashan

, Raja Adil Riaz, Ahmad Sami Al-Shamayleh, Adnan Akhunzada, Noman Ali, Muhammad Hamza, Faheem Akbar:
AI-generated text detection: A comprehensive review of methods, datasets, and applications. 100793 - Xuding Zhu

:
A survey on Hedetniemi's conjecture. 100794 - Gregory Z. Gutin, Matthias Mnich:

A survey on graph problems parameterized above and below guaranteed values. 100795 - Jie Xue, Meirav Zehavi:

Parameterized algorithms on geometric intersection graphs. 100796 - Walid Osamy

, Ahmed M. Khedr, Pravija Raj P. V., Bader Alwasel, Ahmed Salim:
Robust defense mechanisms for protecting Wireless Sensor Networks from Denial-of-Service Threats, A comprehensive in-depth analysis. 100797 - Guillem Perarnau, Oriol Serra

:
The Lonely Runner Conjecture turns 60. 100798 - Dipika Singh, Rakhi Garg:

A survey of Community Detection algorithms and its comparative performance analysis. 100799 - Siman Wang, Xu Chen, Yongjun Jing, Shuyang Wang:

Hyperbolic geometric graph representation learning: A survey. 100800 - Kalaivani Selvaraj, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba:

A conceptual framework to mitigate ransomware attacks on IoMT devices using threat intelligence: a systematic literature review. 100801 - Mehdi Hosseinzadeh, Jawad Tanveer, Amir Masoud Rahmani, Farhad Soleimanian Gharehchopogh, Ramin Abbaszadi

, Sang-Woong Lee, Jan Lansky:
Sand cat swarm optimization: A comprehensive review of algorithmic advances, structural enhancements, and engineering applications. 100805 - Daiyi Li

, Yaoyao Liang, Shenyi Qian, Huaiguang Wu, Wei Jia, Yilong Fu, Yifan Sun:
A review of background, methods, limitations and opportunities of knowledge graph completion. 100809 - Ahmed M. Khedr, Oruba Alfawaz, Pravija Raj P. V., Walid Osamy

:
Advancing IoT-driven WSNs with context-aware routing: A comprehensive review. 100803 - Gang Li, Yonggui Wang

, Bin He, Tao Pang, Mingke Gao:
Low-light multimodal object detection: A survey. 100804 - Lior Gishboliner

, Asaf Shapira:
Polynomial property testing. 100806 - Bin Xu, Yong Liu, Qian Meng, Ben Wang:

Routing optimization strategies in data center networks: A survey. 100808 - Ye Tian, Yanqiu Yu, Jianguo Sun, Yanbin Wang

:
From past to present: A survey of malicious URL detection techniques, datasets and code repositories. 100810 - Jia Xian, Lin You

, Qifei Yi, Jixiang Wang, Gengran Hu:
A survey on decentralized identity management systems. 100811 - Soheila Mehrmolaei, Mohammad Saniee Abadeh:

A decade systematic review of fusion techniques in financial market prediction. 100813 - Suo Gao, Rui Wu, Herbert Ho-Ching Iu, Ugur Erkan, Yinghong Cao, Qi Li, Abdurrahim Toktas

, Jun Mou:
Chaos-based video encryption techniques: A review. 100816

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














