Artan Luma

Orcid: 0000-0002-1889-8651

According to our database1, Artan Luma authored at least 18 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Trustworthy Verification of Academic Credentials through Blockchain Technology.
Int. J. Online Biomed. Eng., 2024

A Textual Content Analysis Model for Aligning Job Market Demands and University Curricula through Data Mining Techniques.
Int. J. Interact. Mob. Technol., 2024

A Model Proposal of Cybersecurity for the IIoT: Enhancing IIoT Cybersecurity through Machine Learning and Deep Learning Techniques.
Adv. Artif. Intell. Mach. Learn., 2024

An overview of parallel processing of rectangular determinant calculation.
Proceedings of the 13th Mediterranean Conference on Embedded Computing, 2024

2023
A Secure Recommender System Model for Service Placement in Wireless Networks.
Int. J. Interact. Mob. Technol., June, 2023

Determining the Optimal Number of Clusters using Silhouette Score as a Data Mining Technique.
Int. J. Online Biomed. Eng., April, 2023

A Weighting Model of Cybersecurity Parameters Used for Service Placement.
Int. J. Online Biomed. Eng., 2023

The possibility of blockchain application in Higher Education.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

A Comparative Study of Automated Asset Declaration Systems in Selected European Countries.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

Enhancing Cyber Security in Industrial Internet of Things Systems: An Experimental Assessment.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023

2022
Alignment of Higher Education Study Programs and Job Market Demand using Machine Learning Techniques - A Case Study on Balkan Countries' Universities.
Int. J. Emerg. Technol. Learn., October, 2022

Cosine Similarity - A Computing Approach to Match Similarity Between Higher Education Programs and Job Market Demands Based on Maximum Number of Common Words.
Int. J. Emerg. Technol. Learn., June, 2022

A Systematic Literature Review on Using Blockchain Technology in Public Administration.
Proceedings of the 45th Jubilee International Convention on Information, 2022

Implementation on a Parallel Environment of Generalized/Modified Dodgson's Method for Rectangular Determinants Calculation.
Proceedings of the 32nd International Conference on Computer Theory and Applications, 2022

2019
The importance of integration of information security management systems (ISMS) to the organization's Enterprise Information Systems (EIS).
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019

2018
Different methods of distribution data in the cloud - Controlled by IT security specialist.
Proceedings of the 7th Mediterranean Conference on Embedded Computing, 2018

2009
New Data Encryption Algorithm and its Implementation for Online User Authentication.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Data Encryption and Decryption Using ANZL Algorithm.
Proceedings of the ICEIS 2008, 2008


  Loading...