期刊


ISSN1526-1492
刊名Computer Modeling in Engineering & Sciences.
参考译名工程学与科学中的计算机模型
收藏年代2004~2024



全部

2004 2005 2006 2007 2008 2009
2010 2011 2012 2013 2014 2015
2016 2017 2018 2019 2020 2021
2022 2023 2024

2024, vol.138, no.1 Pt.1 2024, vol.138, no.1 Pt.2 2024, vol.138, no.2 Pt.1 2024, vol.138, no.2 Pt.2 2024, vol.138, no.3 Pt.1 2024, vol.138, no.3 Pt.2
2024, vol.139, no.1 Pt.1 2024, vol.139, no.1 Pt.2 2024, vol.139, no.2 Pt.1 2024, vol.139, no.2 Pt.2 2024, vol.139, no.3 Pt.1 2024, vol.139, no.3 Pt.2
2024, vol.140, no.1 Pt.1 2024, vol.140, no.1 Pt.2 2024, vol.140, no.2 2024, vol.140, no.3 Pt.1 2024, vol.140, no.3 Pt.2 2024, vol.141, no.1 Pt.1
2024, vol.141, no.1 Pt.2 2024, vol.141, no.2 Pt.1 2024, vol.141, no.2 Pt.2

题名作者出版年年卷期
A Dynamical Study of Modeling the Transmission of Typhoid Fever through Delayed StrategiesMuhammad Tashfeen; Fazal Dayan; Muhammad Aziz Ur Rehman; Thabet Abdeljawad; Aiman Mukheimer20242024, vol.141, no.2 Pt.2
Advancing 5G Network Applications Lifecycle Security: An ML-Driven ApproachAna Hermosilla; Jorge Gallego-Madrid; Pedro Martinez-Julia; Jordi Ortiz; Ved P. Kafle; Antonio Skarmeta20242024, vol.141, no.2 Pt.2
Multi-Binary Classifiers Using Optimal Feature Selection for Memory-Saving Intrusion Detection SystemsYe-Seul Kil; Yu-Ran Jeon; Sun-Jin Lee; Il-Gu Lee20242024, vol.141, no.2 Pt.2
The Machine Learning Ensemble for Analyzing Internet of Things Networks: Botnet Detection and Device IdentificationSeung-Ju Han; Seong-Su Yoon; Ieck-Chae Euom20242024, vol.141, no.2 Pt.2
Encrypted Cyberattack Detection System over Encrypted IoT Traffic Based on Statistical IntelligenceIl Hwan Ji; Ju Hyeon Lee; Seungho Jeon; Jung Taek Seo20242024, vol.141, no.2 Pt.2
Optimal Cyber Attack Strategy Using Reinforcement Learning Based on Common Vulnerability Scoring SystemBum-Sok Kim; Hye-Won Suk; Yong-Hoon Choi; Dae-Sung Moon; Min-Suk Kim20242024, vol.141, no.2 Pt.2
IWTW: A Framework for IoWT Cyber Threat AnalysisGyuHyun Jeon; Hojun Jin; Ju Hyeon Lee; Seungho Jeon; Jung Taek Seo20242024, vol.141, no.2 Pt.2
DeepBio: A Deep CNN and Bi-LSTM Learning for Person Identification Using Ear BiometricsAnshul Mahajan; Sunil K. Singla20242024, vol.141, no.2 Pt.2
Enhancing Arabic Cyberbullying Detection with End-to-End Transformer ModelMohamed A. Mahdi; Suliman Mohamed Fati; Mohamed A. G. Hazber; Shahanawaj Ahamad; Sawsan A. Saad20242024, vol.141, no.2 Pt.2
Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking ArchitectureKhawaja Tahir Mehmood; Shahid Atiq; Intisar Ali Sajjad; Muhammad Majid Hussain; Malik M. Abdul Basit20242024, vol.141, no.2 Pt.2
12