Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2694)
Editorial
(409)
by Journal
by Funding Agency
Clear filters
Powered by
184 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2 - COMPUTER-COMMUNICATION NETWORKS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
An Intelligent Distributed Channel Selection Framework with Hybrid Mode Selection for Interference Mitigation in D2D based 5G Networks
Abdullilah A. Alotaibi
,
Salman A. AlQahtani
10.3897/jucs.116026
28-10-2024
Unique: 550 | Total: 701
| Access Period:
1595-1623
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 490 | Total: 648
| Access Period:
1224-1243
HTML
PDF
Research Article
Archive-based Covert Channel in Sensor Streaming Data
Carina Heßeling
,
Sebastian Litzinger
,
Jörg Keller
10.3897/jucs.108811
28-08-2024
Unique: 464 | Total: 603
| Access Period:
1048-1067
HTML
PDF
Research Article
A Novel LSB Steganography Technique Using Image Segmentation
Yasir Yakup Demircan
,
Serhat Ozekes
10.3897/jucs.105702
28-03-2024
Unique: 986 | Total: 1267
| Access Period:
308-332
HTML
PDF
Research Article
Mobile Handoff with 6LoWPAN Neighbour Discovery Auxiliary Communication
Shanshan Jia
,
Gaukhar A. Kamalova
,
Dmytro Mykhalevskiy
10.3897/jucs.108446
28-02-2024
Unique: 865 | Total: 1212
| Access Period:
204-220
HTML
PDF
Research Article
diffReplication - An Energy-Aware Fault Tolerance Model for Silent Error Detection and Mitigation in Heterogeneous Extreme-scale Computing Environment
Longhao Li
,
Taieb Znati
,
Rami Melhem
10.3897/jucs.94462
28-08-2023
Unique: 1007 | Total: 1379
| Access Period:
892-910
HTML
XML
PDF
Research Article
Big Data Provenance Using Blockchain for Qualitative Analytics via Machine Learning
Kashif Mehboob Khan
,
Warda Haider
,
Najeed Ahmed Khan
,
Darakhshan Saleem
10.3897/jucs.93533
28-05-2023
Unique: 1752 | Total: 2557
| Access Period:
446-469
HTML
XML
PDF
Research Article
Low-sample classification in NIDS using the EC-GAN method
Marko Zekan
,
Igor Tomičić
,
Markus Schatten
10.3897/jucs.85703
28-12-2022
Unique: 1672 | Total: 2547
| Access Period:
1330-1346
HTML
XML
PDF
Research Article
Traffic Optimization with Software-Defined Network Controller on a New User Interface
Derya Yiltas-Kaplan
10.3897/jucs.80625
28-06-2022
Unique: 1837 | Total: 2856
| Access Period:
648-669
HTML
XML
PDF
Research Article
A Spark Parallel Betweenness Centrality Computation and its Application to Community Detection Problems
Daniel Gomez González
,
Luis Llana Díaz
,
Cristóbal Pareja
10.3897/jucs.80688
28-02-2022
Unique: 1702 | Total: 2823
| Access Period:
160-180
HTML
XML
PDF
Research Article
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms
Mohamed Talha
,
Anas Abou El Kalam
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence II
10.3897/jucs.77046
28-12-2021
Unique: 1741 | Total: 2929
| Access Period:
1300-1324
HTML
XML
PDF
Research Article
An Approach for Testing False Data Injection Attack on Data Dependent Industrial Devices
Mathieu Briland
,
Fabrice Bouquet
Part of: Advances and Challenges for Model and Data Engineering
10.3897/jucs.70326
28-07-2021
Unique: 1781 | Total: 3143
| Access Period:
774-792
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK