BRISK 发表于 2025-3-21 19:20:15
书目名称Applied Computing for Software and Smart Systems影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0159713<br><br> <br><br>书目名称Applied Computing for Software and Smart Systems影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0159713<br><br> <br><br>书目名称Applied Computing for Software and Smart Systems网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0159713<br><br> <br><br>书目名称Applied Computing for Software and Smart Systems网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0159713<br><br> <br><br>书目名称Applied Computing for Software and Smart Systems被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0159713<br><br> <br><br>书目名称Applied Computing for Software and Smart Systems被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0159713<br><br> <br><br>书目名称Applied Computing for Software and Smart Systems年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0159713<br><br> <br><br>书目名称Applied Computing for Software and Smart Systems年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0159713<br><br> <br><br>书目名称Applied Computing for Software and Smart Systems读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0159713<br><br> <br><br>书目名称Applied Computing for Software and Smart Systems读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0159713<br><br> <br><br>草率女 发表于 2025-3-21 22:18:38
http://reply.papertrans.cn/16/1598/159713/159713_2.png相容 发表于 2025-3-22 02:11:42
Protocol-Based Engineering of Microserviceser key using Sudoku-hash which provides a secured and authenticated encryption process. Our proposed method can resist brute force attacks, phishing attacks, man-in-the-middle attacks, dictionary attacks, and credential stuffing attacks in an efficient and effective way.Type-1-Diabetes 发表于 2025-3-22 06:55:24
http://reply.papertrans.cn/16/1598/159713/159713_4.png驳船 发表于 2025-3-22 12:05:53
CapsFraud: A Deep Method to Identify Fraudulent Transaction in Blockchain Using Capsule Network features, which causes abnormal behavior in financial transaction. Therefore, in this proposed work, a deep model has been incorporated with blockchain to identify the fraudulent transaction. The results reveal that the proposed method can recognize illicit transactions with gratifying performance.Fermentation 发表于 2025-3-22 14:54:16
http://reply.papertrans.cn/16/1598/159713/159713_6.pngMONY 发表于 2025-3-22 17:15:58
http://reply.papertrans.cn/16/1598/159713/159713_7.png罗盘 发表于 2025-3-22 22:44:26
http://reply.papertrans.cn/16/1598/159713/159713_8.pngOphthalmoscope 发表于 2025-3-23 03:24:57
http://reply.papertrans.cn/16/1598/159713/159713_9.png扩音器 发表于 2025-3-23 08:27:19
2367-3370 as a reference resource for researchers and practitioners in.This book features a collection of high-quality research papers presented at the 10th International Symposium on Applied Computing for Software and Smart systems (ACSS 2023), to be held during September 15–16, 2023, in Kolkata, India. The