{"title":"Defending Aviation Cyber-Physical Systems from DDOS Attack Using NARX Model","authors":"Abdulaziz A. Alsulami, S. Zein-Sabatto","doi":"10.1007/978-3-030-70296-0_88","DOIUrl":"https://doi.org/10.1007/978-3-030-70296-0_88","url":null,"abstract":"","PeriodicalId":272924,"journal":{"name":"Transactions on Computational Science and Computational Intelligence","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114973608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Merve Vildan Baysal, Özden Özcan-Top, Aysu Betin Can
{"title":"Implications of Blockchain Technology in the Health Domain","authors":"Merve Vildan Baysal, Özden Özcan-Top, Aysu Betin Can","doi":"10.1007/978-3-030-70873-3_45","DOIUrl":"https://doi.org/10.1007/978-3-030-70873-3_45","url":null,"abstract":"","PeriodicalId":272924,"journal":{"name":"Transactions on Computational Science and Computational Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122634408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Bug Types of Textbook Code with Open-Source Software","authors":"Young Lee, Jeong Yang","doi":"10.1007/978-3-030-70873-3_44","DOIUrl":"https://doi.org/10.1007/978-3-030-70873-3_44","url":null,"abstract":"","PeriodicalId":272924,"journal":{"name":"Transactions on Computational Science and Computational Intelligence","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123904666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Benchmarking the Software Engineering Undergraduate Program Curriculum at Jordan University of Science and Technology with the IEEE Software Engineering Body of Knowledge (SWE Knowledge Areas #6–10)","authors":"M. Radaideh","doi":"10.1007/978-3-030-70873-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-70873-3_7","url":null,"abstract":"","PeriodicalId":272924,"journal":{"name":"Transactions on Computational Science and Computational Intelligence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125078718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Puente, S. Alonso, F. Gascón, B. Ponte, D. Fuente
{"title":"A Model for the Strategic Management of Innovation and R&D Based on Real Options Valuation: Assessing the Options to Abandon and Expand Clinical Trials in Pharmaceutical Firms","authors":"J. Puente, S. Alonso, F. Gascón, B. Ponte, D. Fuente","doi":"10.1007/978-3-030-70296-0_75","DOIUrl":"https://doi.org/10.1007/978-3-030-70296-0_75","url":null,"abstract":"","PeriodicalId":272924,"journal":{"name":"Transactions on Computational Science and Computational Intelligence","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125453671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Principles of Data Science","authors":"John P. Dickerson","doi":"10.1007/978-3-030-43981-1","DOIUrl":"https://doi.org/10.1007/978-3-030-43981-1","url":null,"abstract":"","PeriodicalId":272924,"journal":{"name":"Transactions on Computational Science and Computational Intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Keviczky, T. Vámos, A. Benedek, R. Bars, J. Hetthéssy, C. Bányász, D. Sik
{"title":"Innovative Methods of Teaching the Basic Control Course","authors":"L. Keviczky, T. Vámos, A. Benedek, R. Bars, J. Hetthéssy, C. Bányász, D. Sik","doi":"10.1007/978-3-030-70873-3_17","DOIUrl":"https://doi.org/10.1007/978-3-030-70873-3_17","url":null,"abstract":"","PeriodicalId":272924,"journal":{"name":"Transactions on Computational Science and Computational Intelligence","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127368127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Extend Single-Processor Approach to Explicitly Many-Processor Approach","authors":"J. Végh","doi":"10.1007/978-3-030-70873-3_31","DOIUrl":"https://doi.org/10.1007/978-3-030-70873-3_31","url":null,"abstract":"","PeriodicalId":272924,"journal":{"name":"Transactions on Computational Science and Computational Intelligence","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132613041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}