| Double Roman domination in trees |
17 |
| Low rate cloud DDoS attack defense method based on power... |
10 |
| Degree conditions for fractional (a, b, k)-critical cove... |
9 |
| Minimizing total load on a proportionate flowshop with p... |
8 |
| Leakage-resilient CCA2-secure certificateless public-key... |
7 |
| The imprecisions of precision measures in process mining |
6 |
| Feature weighting as a tool for unsupervised feature sel... |
6 |
| STREAM VBYTE: Faster byte-oriented integer compression |
5 |
| Translation and scale invariants of Krawtchouk moments |
5 |
| Revisiting AES related-key differential attacks with con... |
5 |