关注
Besnik Selimi
标题
引用次数
引用次数
年份
Systematic literature review of blockchain applications: Smart contracts
E Leka, B Selimi, L Lamani
2019 International Conference on Information Technologies (InfoTech), 1-3, 2019
672019
DBMS as a Cloud service: Advantages and Disadvantages
Y Januzaj, J Ajdari, B Selimi
Procedia-Social and Behavioral Sciences 195, 1851-1859, 2015
382015
Using clp to automatically generate test sequences for synchronous programs with numeric inputs and outputs
B Seljimi, I Parissis
2006 17th International Symposium on Software Reliability Engineering, 105-116, 2006
332006
Application of trust in recommender systems—utilizing naive Bayes classifier
K Rrmoku, B Selimi, L Ahmedi
Computation 10 (1), 6, 2022
302022
Bcert–a decentralized academic certificate system distribution using blockchain technology
E Leka, B Selimi
International Journal on Information Technologies & Security 12 (4), 103-118, 2020
242020
Automatic generation of test data generators for synchronous programs: Lutess v2
B Seljimi, I Parissis
Workshop on Domain specific approaches to software test automation: in …, 2007
222007
Development and evaluation of blockchain based secure application for verification and validation of academic certificates
E Leka, B Selimi
Annals of Emerging Technologies in Computing (AETiC) 5 (2), 22-36, 2021
212021
The proposed model to increase security of sensitive data in cloud computing
D Hyseni, A Luma, B Selimi, B Cico
Int. J. Adv. Comput. Sci. Appl 9 (2), 203-210, 2018
202018
Design and Implementation of Smart Contract: A use case for geo-spatial data sharing
E Leka, L Lamani, B Selimi, E Deçolli
2019 42nd International Convention on Information and Communication …, 2019
152019
A framework for flexible REST services: Decoupling authorization for reduced service dependency
A Memeti, B Selimi, A Besimi, B Cico
2015 4th Mediterranean Conference on Embedded Computing (MECO), 51-55, 2015
122015
Review of prediction of disease trends using big data analytics
D Nagavci, M Hamiti, B Selimi
Optimization 9 (8), 46-50, 2018
92018
Conception, design and implementation of an interface for security in cloud controlled by the end user
D Hyseni, B Çiço, B Selimi
International Journal on Information Technologies & Security 8 (2), 35-44, 2016
92016
Using elliptic curve encryption and decryption for securing audio messages
A Luma, B Selimi, L Ameti
Transactions on Engineering Technologies: World Congress on Engineering 2014 …, 2015
92015
Revisiting the Steam-Boiler Case Study with LUTESS: Modeling for Automatic Test Generation
V Papailiopoulou, B Seljimi, I Parissis
12th European Workshop on Dependable Computing, EWDC 2009, 8 pages, 2009
92009
A Systematic Mapping Study of Language Features Identification from Large Text Collection
DN Mati, J Ajdari, B Raufi, M Hamiti, B Selimi
2019 8th Mediterranean Conference on embedded computing (MECO), 1-5, 2019
82019
Building dictionaries for low resource languages: Challenges of unsupervised learning
DN Mati, M Hamiti, A Susuri, B Selimi, J Ajdari
Annals of Emerging Technologies in Computing (AETiC) 5 (3), 52-58, 2021
72021
Cosine similarity through control flow graphs for secure software engineering
A Desku, B Raufi, A Luma, B Selimi
2021 International Conference on Engineering and Emerging Technologies …, 2021
62021
Comparision of maturity model frameworks in information security and their implementtation
A Luma, B Abazi, B Selimi, M Hamiti
Proceedings International Conf on Engineering Technologies (ICENTE'18), 102-104, 2018
52018
Explainable artificial intelligence in education: A comprehensive review
BA Chaushi, B Selimi, A Chaushi, M Apostolova
World Conference on Explainable Artificial Intelligence, 48-71, 2023
42023
The strategy of cryptography for the proposed model of security in cloud computing
D Hyseni, B Selimi, A Luma, B Cico
2017 IEEE International Conference on Power, Control, Signals and …, 2017
42017
系统目前无法执行此操作,请稍后再试。
文章 1–20