Possible state approaches to cryptocurrencies J Lansky Journal of Systems integration 9 (1), 19, 2018 | 279 | 2018 |
Deep learning-based intrusion detection systems: a systematic review J Lansky, S Ali, M Mohammadi, MK Majeed, SHT Karim, S Rashidi, ... IEEE Access 9, 101574-101599, 2021 | 185 | 2021 |
Kryptoměny J Lánský C. H. Beck, ISBN: 978-80-7400-722-4., 2018 | 59* | 2018 |
Text compression: syllables J Lánský, M Žemlička Proceedings of the Dateso 2005 Annual International Workshop on DAtabases …, 2005 | 58 | 2005 |
Reinforcement learning-based routing protocols in flying ad hoc networks (FANET): A review J Lansky, S Ali, AM Rahmani, MS Yousefpoor, E Yousefpoor, F Khan, ... Mathematics 10 (16), 3017, 2022 | 52 | 2022 |
Motivations, barriers and risk-taking when investing in cryptocurrencies Z Smutny, Z Sulc, J Lansky Mathematics 9 (14), 1655, 2021 | 47 | 2021 |
Analysis of cryptocurrencies price development J Lánský Acta Informatica Pragensia 5 (2), 118-137, 2016 | 47 | 2016 |
An energy-aware routing method using firefly algorithm for flying ad hoc networks J Lansky, AM Rahmani, MH Malik, E Yousefpoor, MS Yousefpoor, ... Scientific Reports 13 (1), 1323, 2023 | 37 | 2023 |
Compression of small text files using syllables J Lansky, M Zemlicka Proceedings. DCC 2006. Data Compression Conference, 458-458, 2006 | 36 | 2006 |
An enhanced authentication protocol for RFID systems M Hosseinzadeh, OH Ahmed, SH Ahmed, C Trinh, N Bagheri, S Kumari, ... IEEE Access 8, 126977-126987, 2020 | 35 | 2020 |
Reinforcement learning-based routing protocols in vehicular ad hoc networks for intelligent transport system (its): A survey J Lansky, AM Rahmani, M Hosseinzadeh Mathematics 10 (24), 4673, 2022 | 33 | 2022 |
Task scheduling mechanisms for fog computing: a systematic survey M Hosseinzadeh, E Azhir, J Lansky, S Mildeova, OH Ahmed, MH Malik, ... IEEE Access 11, 50994-51017, 2023 | 30 | 2023 |
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs) M Hosseinzadeh, J Yoo, S Ali, J Lansky, S Mildeova, MS Yousefpoor, ... Scientific Reports 13 (1), 13046, 2023 | 28 | 2023 |
Cryptocurrency survival analysis J Lansky The Journal of Alternative Investments 22 (3), 55-64, 2020 | 25 | 2020 |
Genetic algorithms in syllable-based text compression T Kuthan, J Lánský Proceedings of the Dateso annual international workshop on databases, texts …, 2007 | 23 | 2007 |
A novel lightweight block cipher-based mutual authentication protocol for constrained environments C Trinh, B Huynh, J Lansky, S Mildeova, M Safkhani, N Bagheri, S Kumari, ... IEEE Access 8, 165536-165550, 2020 | 21 | 2020 |
A new strong adversary model for RFID authentication protocols M Hosseinzadeh, J Lansky, AM Rahmani, C Trinh, M Safkhani, N Bagheri, ... IEEE Access 8, 125029-125045, 2020 | 21 | 2020 |
Compression of a Dictionary J Lánský, M Zemlicka Proceedings of the Dateso 2006 Annual International Workshop on DAtabases …, 2006 | 21 | 2006 |
A Q-learning-based routing scheme for smart air quality monitoring system using flying ad hoc networks J Lansky, AM Rahmani, SM Zandavi, V Chung, E Yousefpoor, ... Scientific Reports 12 (1), 20184, 2022 | 20 | 2022 |
Development of a lightweight centralized authentication mechanism for the Internet of Things driven by fog J Lansky, M Sadrishojaei, AM Rahmani, MH Malik, F Kazemian, ... Mathematics 10 (22), 4166, 2022 | 18 | 2022 |