Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2771)
Editorial
(424)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
JobMatcher: Multi-Layer Personalized and Inclusive Job Recommendations
Mashael M. Alsulami
,
Kholoud Althobaiti
,
Haneen Algethami
10.3897/jucs.157024
28-02-2026
Unique: 237 | Total: 307
Access Period: 0
0
286-302
HTML
PDF
Research Article
Comparative Analysis of Interpolation Techniques for FFT-Based Frequency Estimation
Gamze Cabadag
,
Ali Degirmenci
,
Omer Karal
10.3897/jucs.156911
28-02-2026
Unique: 371 | Total: 431
Access Period: 0
0
267-285
HTML
PDF
Research Article
A Blockchain-Enabled Framework for Controlled Access to Cluster Resources
Kausthav Pratim Kalita
,
Debojit Boro
,
Dhruba Kumar Bhattacharyya
10.3897/jucs.141277
28-02-2026
Unique: 152 | Total: 172
Access Period: 0
0
241-266
HTML
PDF
Research Article
Distributed Denial of Service Attacks Detection and Classification using Machine Learning in Cloud Environment
Hanan Hafiz
,
Maher Alharby
10.3897/jucs.140733
28-02-2026
Unique: 208 | Total: 241
Access Period: 0
0
209-240
HTML
PDF
Research Article
Steganography in the QUIC Communication Protocol
Aleksandar Velinov
,
Aleksandra Mileva
,
Simon Volpert
,
Sebastian Zillien
,
Steffen Wendzel
10.3897/jucs.154672
28-02-2026
Unique: 317 | Total: 384
Access Period: 0
0
181-208
HTML
PDF
Research Article
OntoKratos: An Ontology for Problematic Smartphone Use Identification and Intervention Suggestion
Gustavo Lazarotto Schroeder
,
Wesllei Felipe Heckler
,
Rosemary Francisco
,
Jorge Luis Victória Barbosa
10.3897/jucs.147898
28-02-2026
Unique: 222 | Total: 289
Access Period: 0
0
155-180
HTML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.189356
28-02-2026
Unique: 120 | Total: 127
Access Period: 0
0
153-154
HTML
PDF
Research Article
RatKit: A Novel Methodology for Verifying, Validating, and Testing Agent-Based Simulations: the Boids Case
İbrahim Çakırlar
,
Sevcan Emek
,
Şebnem Bora
,
Oğuz Dikenelli
10.3897/jucs.148927
28-01-2026
Unique: 576 | Total: 760
Access Period: 0
0
133-152
HTML
PDF
Research Article
CBM-IDS: An Advanced Hybrid Deep Learning Model for DDoS Attack Detection in IoT Networks
Hamdullah Karamollaoğlu
,
İbrahim Yücedağ
,
İbrahim Alper Doğru
,
Sinan Toklu
,
İsmail Atacak
10.3897/jucs.146099
28-01-2026
Unique: 509 | Total: 671
Access Period: 0
0
108-132
HTML
PDF
Research Article
A Robust Lossless Data Compression Technique for Air Quality Time-Series Data using Genetic Algorithm
Banani Ghose
,
Zeenat Rehena
10.3897/jucs.142860
28-01-2026
Unique: 378 | Total: 458
Access Period: 0
0
84-107
HTML
PDF
Research Article
Optimization of Predicting Harvested Power of Toroidal Electromagnetic Energy Harvesters Using ABC Algorithm
Kadir Ileri
,
M. Şamil Balcı
,
Adem Dalcalı
10.3897/jucs.140979
28-01-2026
Unique: 351 | Total: 465
Access Period: 0
0
58-83
HTML
PDF
Research Article
ESA: An Enhanced Sequential Algorithm-Based Model for Smart Contract Vulnerability Detection
Jinghan Liu
,
Hui Zhao
,
Chenyang Lin
,
Dan Wang
,
Shufan Li
10.3897/jucs.137000
28-01-2026
Unique: 311 | Total: 380
Access Period: 0
0
33-57
HTML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK