关注
Jan Lansky
Jan Lansky
Vysoka skola financni a spravni
在 mail.vsfs.cz 的电子邮件经过验证
标题
引用次数
引用次数
年份
Possible state approaches to cryptocurrencies
J Lansky
Journal of Systems integration 9 (1), 19, 2018
2662018
Deep learning-based intrusion detection systems: a systematic review
J Lansky, S Ali, M Mohammadi, MK Majeed, SHT Karim, S Rashidi, ...
IEEE Access 9, 101574-101599, 2021
1372021
Kryptoměny
J Lánský
C. H. Beck, ISBN: 978-80-7400-722-4., 2018
58*2018
Text compression: syllables
J Lánský, M Žemlička
Proceedings of the Dateso 2005 Annual International Workshop on DAtabases …, 2005
582005
Analysis of cryptocurrencies price development
J Lánský
Acta Informatica Pragensia 5 (2), 118-137, 2016
422016
Reinforcement learning-based routing protocols in flying ad hoc networks (FANET): A review
J Lansky, S Ali, AM Rahmani, MS Yousefpoor, E Yousefpoor, F Khan, ...
Mathematics 10 (16), 3017, 2022
392022
Motivations, barriers and risk-taking when investing in cryptocurrencies
Z Smutny, Z Sulc, J Lansky
Mathematics 9 (14), 1655, 2021
362021
Compression of small text files using syllables
J Lansky, M Zemlicka
Proceedings. DCC 2006. Data Compression Conference, 458-458, 2006
362006
An enhanced authentication protocol for RFID systems
M Hosseinzadeh, OH Ahmed, SH Ahmed, C Trinh, N Bagheri, S Kumari, ...
IEEE Access 8, 126977-126987, 2020
332020
Reinforcement learning-based routing protocols in vehicular ad hoc networks for intelligent transport system (its): A survey
J Lansky, AM Rahmani, M Hosseinzadeh
Mathematics 10 (24), 4673, 2022
272022
An energy-aware routing method using firefly algorithm for flying ad hoc networks
J Lansky, AM Rahmani, MH Malik, E Yousefpoor, MS Yousefpoor, ...
Scientific Reports 13 (1), 1323, 2023
242023
Genetic algorithms in syllable-based text compression
T Kuthan, J Lánský
Proceedings of the Dateso annual international workshop on databases, texts …, 2007
232007
Cryptocurrency survival analysis
J Lansky
The Journal of Alternative Investments 22 (3), 55-64, 2020
212020
Compression of a Dictionary
J Lánský, M Zemlicka
Proceedings of the Dateso 2006 Annual International Workshop on DAtabases …, 2006
212006
A novel lightweight block cipher-based mutual authentication protocol for constrained environments
C Trinh, B Huynh, J Lansky, S Mildeova, M Safkhani, N Bagheri, S Kumari, ...
IEEE Access 8, 165536-165550, 2020
192020
A new strong adversary model for RFID authentication protocols
M Hosseinzadeh, J Lansky, AM Rahmani, C Trinh, M Safkhani, N Bagheri, ...
IEEE Access 8, 125029-125045, 2020
182020
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
M Hosseinzadeh, J Yoo, S Ali, J Lansky, S Mildeova, MS Yousefpoor, ...
Scientific Reports 13 (1), 13046, 2023
172023
Bitcoin System
J Lánský
Acta Informatica Pragensia 6 (1), 20-31, 2017
172017
Syllable-based burrows-wheeler transform
J Lánský, K Chernik, Z Vlcková
172007
Task scheduling mechanisms for fog computing: a systematic survey
M Hosseinzadeh, E Azhir, J Lansky, S Mildeova, OH Ahmed, MH Malik, ...
IEEE Access 11, 50994-51017, 2023
162023
系统目前无法执行此操作,请稍后再试。
文章 1–20