Login / Signup
Int. J. Soc. Comput. Cyber Phys. Syst.
2011
2015
2017
2021
2011
2021
Keyphrases
Publications
volume 2, number 3, 2021
Manik Lal Das
Secure resource sharing in grid system without public key settings.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (3) (2021)
H. L. Gururaj
,
U. Tanuja
,
Janhavi V
,
B. Ramesh
Detecting malicious users in the social networks using machine learning approach.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (3) (2021)
K. Vijayaprabakaran
,
K. Sathiyamurthy
,
S. Sowmya
Deep learning-based medical expert system for diabetes diagnosis on IoT healthcare data.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (3) (2021)
Nidhi Desai
,
Manik Lal Das
Rule based anonymisation against inference attack in social networks.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (3) (2021)
Riddhi Solani
,
Manik Lal Das
iCOPS: insider attack detection in distributed file systems.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (3) (2021)
Shajulin Benedict
Distributed blockchains for collaborative product designs in smart cities.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (3) (2021)
volume 2, number 2, 2019
Manish Sharma
,
Shikha N. Khera
,
Pritam Babu Sharma
The troika of artificial intelligence, emotional intelligence and customer intelligence.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (2) (2019)
Mohit
,
A. Charan Kumari
,
Meghna Sharma
A novel approach to text clustering using shift k-medoid.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (2) (2019)
Ramesh Chandra
,
Vaibhav Bhatnagar
Cyber-squatting: a cyber crime more than an unethical act.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (2) (2019)
Ainish Dave
,
Hardik Gajera
,
Manik Lal Das
Privacy-preserving targeted online advertising.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (2) (2019)
Swapnil S. Ninawe
,
Pallapa Venkataram
Authentication schemes for social network users: a review.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (2) (2019)
M. Asha Jerlin
,
Anindya Kumar Das
,
Joshua Agbonjaru
Implementation of an efficient and intelligent Indian maritime borderline alert system using IoT.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (2) (2019)
volume 2, number 1, 2017
Christoph Fuchs
,
Georg Groh
Data sharing sensitivity, relevance, and social traits in social information retrieval.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (1) (2017)
Indu Saini
,
Phool Singh
,
Anil Kumar Yadav
Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (1) (2017)
Madhu Kumari
,
Singh Vijendra
Big data analytics in healthcare: opportunities, challenges and techniques.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (1) (2017)
Asif Ali Shah
,
Shabir A. Parah
Chaos based novel cryptographic technique based on a new logistic map.
Int. J. Soc. Comput. Cyber Phys. Syst.
2 (1) (2017)
volume 1, number 4, 2016
Prabukumar Manoharan
,
Loganathan Agilandeeswari
,
M. Sai Praneeth
Opinion mining for digital India scheme using fuzzy sets.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (4) (2016)
Sangeeta Rani
,
Kanwalvir Singh Dhindsa
Malware detection techniques and tools for Android.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (4) (2016)
Singh Vijendra
Big data characteristics, challenges, architectures, analytics and applications: a review.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (4) (2016)
Gerard Deepak
,
Sheeba Priyadarshini
A hybrid framework for social tag recommendation using context driven social information.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (4) (2016)
Swapnil S. Ninawe
,
Pallapa Venkataram
A method of designing an access mechanism for social networks.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (4) (2016)
volume 1, number 3, 2012
Miao Jiang
,
William L. McGill
,
Yan Cao
Participatory risk management: concept and illustration.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (3) (2012)
Aaron Beach
,
Mike Gartrell
,
Richard Han
q-Anon: practical anonymity for social networks.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (3) (2012)
Farzana Rahman
,
Md. Endadul Hoque
,
Ferdaus Ahmed Kawsar
,
Sheikh Iqbal Ahamed
User privacy protection in pervasive social networking applications using PCO.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (3) (2012)
Walter Bamberger
,
Josef Schlittenlacher
,
Klaus Diepold
Ability-aware trust for vehicular networks.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (3) (2012)
volume 1, number 1, 2011
Owen Macindoe
,
Whitman Richards
Comparing networks using their fine structure.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (1) (2011)
Denis Helic
,
Christoph Trattner
,
Markus Strohmaier
,
Keith Andrews
Are tag clouds useful for navigation? A network-theoretic analysis.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (1) (2011)
Juuso Karikoski
,
Matti Nelimarkka
Measuring social relations with multiple datasets.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (1) (2011)
Eunyoung Moon
,
Sangki Han
A qualitative method to find influencers using similarity-based approach in the blogosphere.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (1) (2011)
Justin Zhan
,
Xing Fang
Social computing: the state of the art.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (1) (2011)
Baojun Qiu
,
Kristinka Ivanova
,
John Yen
,
Peng Liu
,
Frank E. Ritter
Event-driven modelling of evolving social networks.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (1) (2011)
volume 1, number 2, 2011
Georg Groh
,
Alexander Lehmann
Deducing evidence for social situations from dynamic geometric interaction data.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (2) (2011)
Telmo Menezes
,
Camille Roth
,
Jean-Philippe Cointet
Finding the semantic-level precursors on a blog network.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (2) (2011)
Stephen Kelley
,
Mark K. Goldberg
,
Konstantin Mertsalov
,
Malik Magdon-Ismail
,
William A. Wallace
Overlapping communities in social networks.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (2) (2011)
Shaozhi Ye
,
Shyhtsun Felix Wu
Estimating the size of online social networks.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (2) (2011)
Louis Lei Yu
,
Valerie King
The evolution of friendships in Chinese online social networks.
Int. J. Soc. Comput. Cyber Phys. Syst.
1 (2) (2011)