logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 26(7): 827-853
https://doi.org/10.3897/jucs.2020.045 (28 Jul 2020)
Other versions:
XML
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CiteCite
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 26(7): 827-853
doi: 10.3897/jucs.2020.045
Received: 11 Jan 2020 | Approved: 13 Feb 2020 | Published: 28 Jul 2020
This article is part of:
JUCS - Journal of Universal Computer Science 26(7): Information Security Methodology, Replication Studies and Information Security Education
Authors
   
Simon Vrhovec - Corresponding author
University of Maribor, Maribor, Slovenia
Articles by this author in:  CrossRef  |  Google Scholar
   
   
   
Damjan Fujs
University of Ljubljana, Ljubljana, Slovenia
https://www.fri.uni-lj.si/en/about-faculty/employees/damjan-fujs
Articles by this author in:  CrossRef  |  Google Scholar
Luka Jelovčan
University of Maribor, Maribor, Slovenia
Articles by this author in:  CrossRef  |  Google Scholar
Anže Mihelič
University of Maribor, Ljubljana, Slovenia
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY-ND 4.0). This license allows reusers to copy and distribute the material in any medium or format in unadapted form only, and only so long as attribution is given to the creator. The license allows for commercial use.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK