Citedness in Scopus

Computer Science and Information Technologies

 

  1. Abhishek, B., Krishi, K., Meghana, M., Daaniyaal, M., Anupama, H.S. Hand gesture recognition using machine learning algorithms. (2020) Computer Science and Information Technologies, 1 (3), pp. 116-120. Cited 15 times.
  2. Verma, P., Goyal, A., Gigras, Y. Email phishing: Text classification using natural language processing. (2020) Computer Science and Information Technologies, 1 (1), pp. 1-12. Cited 13 times.
  3. Hamzah, M. L., Purwati, A. A., Sutoyo, S., Marsal, A., Sarbani, S., Nazaruddin, N. Implementation of the internet of things on smart posters using near field communication technology in the tourism sector. (2022) Computer Science and Information Technologies, 3 (3), pp. 194-202. Cited 10 times.
  4. Florrence, M. Building a multilingual ontology for education domain using monto method. (2020) Computer Science and Information Technologies, 1 (2), pp. 47-53. Cited 9 times.
  5. Ghugar, U., Pradhan, J. Survey of wormhole attack in wireless sensor networks. (2020) Comput Sci Inf Technol, 2 (1), pp. 33-42. Cited 7 times.
  6. Atiqur, R. Smart car parking system model for urban areas. (2021) Comput. Sci. Inf. Technol, 2 (2), pp. 95-102. Cited 5 times.
  7. Saeed, E. M. H., Saleh, H. A., Khalel, E. A. Classification of mammograms based on features extraction techniques using support vector machine. (2021) Comput Sci Inf Technol, 2 (3), pp. 121-131. Cited 5 times.
  8. Naqvi, M.R. Low power network on chip architectures: A survey. (2022) Computer Science and Information Technologies, 2 (3), pp. 158-168. Cited 3 times.
  9. Benahmida, A., Maouhoub, N., Sahsah, H. Numerical approach for extraction of photovoltaic generator single-diode model parameters. (2021) Comput. Sci. Inf. Technol, 2 (2), pp. 58-66. Cited 3 times.
  10. Moe Htay, M. Feature extraction and classification methods of facial expression: A survey. (2021) Computer Science and Information Technologies, 2 (1), pp. 26-32. Cited 3 times.
  11. Florrence, M. MLGrafViz: Multilingual ontology visualization plug-in for protégé. (2021) Computer Science and Information Technologies, 2 (1), pp. 43-48. Cited 2 times.
  12. Teguh, R., Usup, H. Realtime monitoring for groundwater level and local climate based on universal communication system. (2021) Comput. Sci. Inf. Technol, 2, p. 67. Cited 3 times.
  13. Alam, Tanweer. Performance evaluation of blockchains in the internet of things. (2020) Computer Science and Information Technologies, 1 (3), pp. 93-97. Cited 3 times.
  14. Ben Ismail, M. M. Insult detection using a partitional CNN-LSTM model. (2020) Computer Science and Information Technologies, 1 (2), pp. 84-92. Cited 3 times.
  15. Khobragade, Shrutika, Bhosale, Rohini, Jiwane, Rahul. High Security Mechanism: Fragmentation and Replication in the Cloud with Auto Update in the System. (2020) Computer Science and Information Technologies, 1 (2), pp. 78-83. Cited 3 times.
  16. Florrence Joseph, M., Lourdusamy, R. Feature analysis of ontology visualization methods and tools. (2020) Computer Science and Information Technologies, 1 (2), pp. 61-77. Cited 3 times.
  17. Rayudu, K.V.B.V., Jahagirdar, D.R., Rao, P.S. Design and testing of systolic array multiplier using fault injecting schemes. (0000) Computer Science and Information Technologies, 3 (1), pp. 1-9. Cited 3 times.
  18. Oladipupo, E. T., Abikoye, O. C. Improved authenticated elliptic curve cryptography scheme for resource starve applications. (2022) Comput. Sci. Inf. Technol., 3 (3), pp. 169-185. Cited 2 times.
  19. Aravamudu, P., Thattipalli, A. R., Dennisan, A. Exploring and comparing various machine deep learning technique algorithms to detect domain generation algorithms of malicious variants. (2022) Computer Science and Information Technologies, 3 (1). Cited 2 times.
  20. Nahar, A.K., Hussein, M.A. A hybrid of the selected mapping and partial transmit sequence approaches for reducing the high peak average to power ratio based on multi-carrier systems—Review. (2022) Comput. Sci. Inf. Technol, 3, pp. 10-21. Cited 2 times.
  21. Hartama, D., Mawengkang, H., Zarlis, M., Sembiring, R. W. Model of emergence evacuation route planning with contra flow and zone scheduling in disaster evacuation. (2021) Computer Science and Information Technologies, 2 (1), pp. 1-10. Cited 2 times.
  22. C, R., G.N, K. An optimized encryption algorithm and F function with dynamic substitution for creating S-box and P-box entries for blowfish algorithm. (2021) Comput. Sci. Inf. Technol., 2 (1), pp. 16-25. Cited 2 times.
  23. Shah, Arpita, Patel, Narendra. Efficient and scalable multitenant placement approach for in-memory database over supple architecture. (2020) Computer Science and Information Technologies, 1 (2), p. 39. Cited 2 times.
  24. Siddiqui, T., Hina, S., Asif, R., Ahmed, S., Ahmed, M. An ensemble approach for the identification and classification of crime tweets in the English language. (2023) Comput. Sci. Inf. Technol, 4, pp. 149-159. Cited 1 time.
  25. Hariguna, T., Rahardja, U., Aini, Q. The antecedent e-government quality for public behaviour intention, and extended expectation-confirmation theory. (2023) Comput. Sci. Inf. Technol, 4 (1), pp. 33-42.
  26. Oladipupo, E. T., Abikoye, O. C. Modified Playfair cryptosystem for improved data security. (2022) Comput. Sci. Inf. Technol, 3 (1), pp. 51-64. Cited 1 time.
  27. Sarasa, A. Development of a web application to share hobbies activities. (2022) Computer Science and Information Technologies, 3 (1), pp. 39-50. Cited 1 time.
  28. Alwersh, M., Kovács, L. Fuzzy formal concept analysis: approaches, applications and issues. (2022) Comput. Sci. Inf. Technol., 3 (2), pp. 126-136. Cited 1 time.
  29. Thatipalli, A. R., Aravamudu, P., Kartheek, K., Dennisan, A. Exploring and comparing various machine and deep learning technique algorithms to detect domain generation algorithms of malicious variants. (2022) Computer Science and Information Technologies, 3 (2), pp. 94-103. Cited 1 time.
  30. Alam, T. Internet of things: review, architecture and applications. (2022) Computer Science and Information Technologies, 3 (1), pp. 31-38. Cited 1 time.
  31. Rak, F., Wiora, J. Comparison of ESP programming platforms. (2021) Computer science and information technologies, 2 (2), pp. 77-86. Cited 1 time.
  32. Raghunath, A.K., Bharadwaj, D., Prabhuram, M. Designing a secured audio based key generator for cryptographic symmetric key algorithms. (2021) Computer Science and Information Technologies, 2 (2), pp. 87-94. Cited 1 time.
  33. Pezeshki, Z. Design and simulation of High-Swing Fully Differential Telescopic Op-Amp. (2021) Comput. Sci. Inf. Technol, 2, pp. 49-57. Cited 1 time.
  34. Kaviani, V., Amiri, P. A. D., Brujeni, F. Z., Akhlaghi, N. Modification data attack inside computer systems: A critical review. (2020) Computer Science and Information Technologies, 1 (3), pp. 98-105. Cited 1 time.
  35. Gusdevi, Harya, Ade Setya, P, Zulaeha, Puji Handini. Prototype of LPG gas leakage detector using flame sensor and, MQ-2 sensor. (2020) Computer Science and Information Technologies, 1 (1), pp. 32-38. Cited 1 time.
  36. Neelima, E., Babu, M.P. Genome feature optimization and coronary artery disease prediction using cuckoo search. (2020) Comput. Sci. Inf. Technol., 1 (3), pp. 106-115. Cited 1 time.