Possible state approaches to cryptocurrencies J Lansky Journal of Systems integration 9 (1), 19, 2018 | 255 | 2018 |
Deep learning-based intrusion detection systems: a systematic review J Lansky, S Ali, M Mohammadi, MK Majeed, SHT Karim, S Rashidi, ... IEEE Access 9, 101574-101599, 2021 | 127 | 2021 |
Text compression: syllables J Lánský, M Žemlička Proceedings of the Dateso 2005 Annual International Workshop on DAtabases …, 2005 | 57 | 2005 |
Kryptoměny J Lánský C. H. Beck, ISBN: 978-80-7400-722-4., 2018 | 44 | 2018 |
Analysis of cryptocurrencies price development J Lánský Acta Informatica Pragensia 5 (2), 118-137, 2016 | 41 | 2016 |
Reinforcement learning-based routing protocols in flying ad hoc networks (FANET): A review J Lansky, S Ali, AM Rahmani, MS Yousefpoor, E Yousefpoor, F Khan, ... Mathematics 10 (16), 3017, 2022 | 38 | 2022 |
Compression of small text files using syllables J Lansky, M Zemlicka Proceedings. DCC 2006. Data Compression Conference, 458-458, 2006 | 36 | 2006 |
Motivations, barriers and risk-taking when investing in cryptocurrencies Z Smutny, Z Sulc, J Lansky Mathematics 9 (14), 1655, 2021 | 34 | 2021 |
An enhanced authentication protocol for RFID systems M Hosseinzadeh, OH Ahmed, SH Ahmed, C Trinh, N Bagheri, S Kumari, ... IEEE Access 8, 126977-126987, 2020 | 33 | 2020 |
Reinforcement learning-based routing protocols in vehicular ad hoc networks for intelligent transport system (its): A survey J Lansky, AM Rahmani, M Hosseinzadeh Mathematics 10 (24), 4673, 2022 | 25 | 2022 |
Genetic algorithms in syllable-based text compression T Kuthan, J Lánský Proceedings of the Dateso annual international workshop on databases, texts …, 2007 | 23 | 2007 |
An energy-aware routing method using firefly algorithm for flying ad hoc networks J Lansky, AM Rahmani, MH Malik, E Yousefpoor, MS Yousefpoor, ... Scientific Reports 13 (1), 1323, 2023 | 21 | 2023 |
Compression of a Dictionary J Lánský, M Zemlicka Proceedings of the Dateso 2006 Annual International Workshop on DAtabases …, 2006 | 21 | 2006 |
Cryptocurrency survival analysis J Lansky The Journal of Alternative Investments 22 (3), 55-64, 2020 | 20 | 2020 |
A novel lightweight block cipher-based mutual authentication protocol for constrained environments C Trinh, B Huynh, J Lansky, S Mildeova, M Safkhani, N Bagheri, S Kumari, ... IEEE Access 8, 165536-165550, 2020 | 19 | 2020 |
A new strong adversary model for RFID authentication protocols M Hosseinzadeh, J Lansky, AM Rahmani, C Trinh, M Safkhani, N Bagheri, ... IEEE Access 8, 125029-125045, 2020 | 17 | 2020 |
Syllable-based burrows-wheeler transform J Lánský, K Chernik, Z Vlcková | 17 | 2007 |
A Q-learning-based routing scheme for smart air quality monitoring system using flying ad hoc networks J Lansky, AM Rahmani, SM Zandavi, V Chung, E Yousefpoor, ... Scientific Reports 12 (1), 20184, 2022 | 15 | 2022 |
Bitcoin System J Lánský Acta Informatica Pragensia 6 (1), 20-31, 2017 | 15 | 2017 |
Task scheduling mechanisms for fog computing: a systematic survey M Hosseinzadeh, E Azhir, J Lansky, S Mildeova, OH Ahmed, MH Malik, ... IEEE Access 11, 50994-51017, 2023 | 14 | 2023 |