Artan Luma
Orcid: 0000-0002-1889-8651
According to our database1,
Artan Luma
authored at least 17 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Online Biomed. Eng., 2024
A Model Proposal of Cybersecurity for the IIoT: Enhancing IIoT Cybersecurity through Machine Learning and Deep Learning Techniques.
Adv. Artif. Intell. Mach. Learn., 2024
Proceedings of the 13th Mediterranean Conference on Embedded Computing, 2024
2023
Int. J. Interact. Mob. Technol., June, 2023
Determining the Optimal Number of Clusters using Silhouette Score as a Data Mining Technique.
Int. J. Online Biomed. Eng., April, 2023
Int. J. Online Biomed. Eng., 2023
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023
A Comparative Study of Automated Asset Declaration Systems in Selected European Countries.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023
Enhancing Cyber Security in Industrial Internet of Things Systems: An Experimental Assessment.
Proceedings of the 12th Mediterranean Conference on Embedded Computing, 2023
2022
Alignment of Higher Education Study Programs and Job Market Demand using Machine Learning Techniques - A Case Study on Balkan Countries' Universities.
Int. J. Emerg. Technol. Learn., October, 2022
Cosine Similarity - A Computing Approach to Match Similarity Between Higher Education Programs and Job Market Demands Based on Maximum Number of Common Words.
Int. J. Emerg. Technol. Learn., June, 2022
A Systematic Literature Review on Using Blockchain Technology in Public Administration.
Proceedings of the 45th Jubilee International Convention on Information, 2022
Implementation on a Parallel Environment of Generalized/Modified Dodgson's Method for Rectangular Determinants Calculation.
Proceedings of the 32nd International Conference on Computer Theory and Applications, 2022
2019
The importance of integration of information security management systems (ISMS) to the organization's Enterprise Information Systems (EIS).
Proceedings of the 42nd International Convention on Information and Communication Technology, 2019
2018
Different methods of distribution data in the cloud - Controlled by IT security specialist.
Proceedings of the 7th Mediterranean Conference on Embedded Computing, 2018
2009
New Data Encryption Algorithm and its Implementation for Online User Authentication.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Data Encryption and Decryption Using ANZL Algorithm.
Proceedings of the ICEIS 2008, 2008