ACCEPTED
Andrius Daranda, Lina Kankevičiene, Julija Daranda
Temporal Anomaly Detection and Threat Intelligence Analysis in Telegram Cybersecurity Channels
AWAITING REVISION
Jēkabs Vanags
The Role of Personality Traits in the Use of LLM Tools: Evidence from Self-Reported Survey and Behavioral Experiment
Valērijs Ņikuļins
Earth Surface Motions in Latvia in 2019-2023 based on Interferometric Synthetic Aperture Radar Method: Data Analysis and Interpretation
Yana Svirhunenko, Yaroslav Tereshchenko, Pavlo Tytarchuk
InstanceSketch: Robust Sketch Instance Segmentation with Cluster Refinement
IN REVIEW
Edgars Cīrulis, Kaspars Osis
The Characteristics of the Artificial Intelligence-based Frameworks for Public Administration Strategic Decision-making Support
Leo Truksans, Kaspars Zakis, Ojars Breidaks
Field Testing and Performance Evaluation of Quantum Key Distribution System
Anita Todoranova, Latinka Todoranova
Assessing AI's Performance in Bulgarian Orthography: Implications for Educational Use
Eduards Mukans
Context Augmentation with GPT
Dezdemona Gjulapi, Alketa Hyso, Astrit Denaj
Hybrid Physics-Informal Temporal Attention Model with External Physical Constraints for PV Power Forecasting
Halyna M. Hubal
Creating Macros for Keywords, Text Visibility, and Language Choice
Serhii Miroshnychenko, Oleksandr Vovna, Ivan Laktionov, Anna Maryna, Viktoriia Miroshnychenko
Ranking B2B Order Success Factors in ERP Systems: A Multi-Algorithmic Approach
Khadidja Chaoui, Farida Bouachi
A Deep Learning Model for Distributed Denial-of-Service Attack Detection
Gennady Chuiko, Yevhen Darnapuk, Olga Yaremchuk
Data-driven methods for analyzing non-Gaussian variability in human postural sway
Miroslav Nickolov Galabov
Unified Modular Architectural and Software Model for Educational XR Systems
Beatriz Pontes da Costa Reis, Mohamad Gharib
An Approach for Designing Responsible Privacy Heuristics
Juan Carlos Santana, José Juan Hernández Gálvez, José Juan Hernández Cabrera, José Évora
Context-Aware Modeling of Temporal Semantics for Deferred Reasoning
Vladislava Liubarets, Anhelina Spitsyna, Serhii Brezetskyi, Dmytro Zahorodnii, Oleksandra Tereshchenko
Cost-Effectiveness of AI Implementation in Information Security
Corey Dethier
Inductive Skepticism and Starting-Point Epistemology
Vida Navickienė, Birutė Juodagalvienė
Teaching Dimensioning in AutoCAD in Multimedia and Computer Design Studies: A Technical Communication Perspective
Artūrs Lavrenovs, Roman Graf
Analysis and Forecasting of Vulnerabilities with AI for Decision Support
Virgilijus Krinickij, Linas Bukauskas
Modelling and Assessment of Asynchronous Evidence-based Network Flows for Cyber-attack Detection
-
Papers in Production
-
Vol. 14(2026) No. 1
-
Vol. 13(2025) No. 4
-
Vol. 13(2025) No. 3
-
Vol. 13(2025) No. 2
-
Vol. 13(2025) No. 1
-
Vol. 12(2024) No. 4
-
Vol. 12(2024) No. 3
-
Vol. 12(2024) No. 2
-
Vol. 12(2024) No. 1
-
Vol. 11(2023) No. 4
-
Vol. 11(2023) No. 3
-
Vol. 11(2023) No. 2
-
Vol. 11(2023) No. 1
-
Vol. 10(2022) No. 4
-
Vol. 10(2022) No. 3
-
Vol. 10(2022) No. 2
-
Vol. 10(2022) No. 1
-
Vol. 9(2021) No. 4
-
Vol. 9(2021) No. 3
-
Vol. 9(2021) No. 2
-
Vol. 9(2021) No. 1
-
Vol. 8(2020) No. 4
-
Vol. 8(2020) No. 3
-
Vol. 8(2020) No. 2
-
Vol. 8(2020) No. 1
-
Vol. 7(2019) No. 4
-
Vol. 7(2019) No. 3
-
Vol. 7(2019) No. 2
-
Vol. 7(2019) No. 1
-
Vol. 6(2018) No. 4
-
Vol. 6(2018) No. 3
-
Vol. 6(2018) No. 2
-
Vol. 6(2018) No. 1
-
Vol. 5(2017) No. 4
-
Vol. 5(2017) No. 3
-
Vol. 5(2017) No. 2
-
Vol. 5(2017) No. 1
-
Vol. 4(2016) No. 4
-
Vol. 4(2016) No. 3
-
Vol. 4(2016) No. 2
-
Vol. 4(2016) No. 1
-
Vol. 3(2015) No. 4
-
Vol. 3(2015) No. 3
-
Vol. 3(2015) No. 2
-
Vol. 3(2015) No. 1
-
Vol. 2(2014) No. 4
-
Vol. 2(2014) No. 3
-
Vol. 2(2014) No. 2
-
Vol. 2(2014) No. 1
-
Vol. 1(2013) No. 3-4
-
Vol. 1(2013) No. 1-2
-
AUL Vol. 787(2012)
-
AUL Vol. 770(2011)
-
AUL Vol. 757(2010)
-
AUL Vol. 756(2010)
-
AUL Vol. 751(2009)
-
AUL Vol. 733 (2008)