Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2759)
Editorial
(422)
by Journal
by Funding Agency
Clear filters
Powered by
52 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2.0 - General
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Advancing the Threat Intelligence with AI: An Overview, Taxonomy and Roadmap
Igor Tomičić
,
Petra Grd
,
Andrija Bernik
10.3897/jucs.137544
28-08-2025
Unique: 1212 | Total: 1667
Access Period: 0
0
1102-1129
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 1280 | Total: 1682
Access Period: 0
0
1224-1243
HTML
PDF
Research Article
An Approach for Testing False Data Injection Attack on Data Dependent Industrial Devices
Mathieu Briland
,
Fabrice Bouquet
Part of: Advances and Challenges for Model and Data Engineering
10.3897/jucs.70326
28-07-2021
Unique: 2271 | Total: 3879
Access Period: 0
0
774-792
HTML
XML
PDF
Research Article
The Analysis of the Possibility to Construct Optimal Third-degree Reference Graphs
Sławomir Bujnowski
,
Tomasz Marciniak
,
Beata Marciniak
,
Zbigniew Lutowski
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.028
28-04-2020
Unique: 1462 | Total: 2328
Access Period: 0
0
528-546
HTML
XML
PDF
Research Article
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis
Tomasz Andrysiak
,
Łukasz Saganowski
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.027
28-04-2020
Unique: 1477 | Total: 2465
Access Period: 0
0
508-527
HTML
XML
PDF
Research Article
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
Hui Tian
,
Meilun Huang
,
Chin-Chen Chang
,
Yongfeng Huang
,
Jing Lu
,
Yongqian Du
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1131
28-09-2019
Unique: 1435 | Total: 2237
Access Period: 0
0
1131-1150
HTML
XML
PDF
Research Article
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
Jędrzej Bieniasz
,
Monika Stępkowska
,
Artur Janicki
,
Krzysztof Szczypiorski
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1109
28-09-2019
Unique: 1388 | Total: 2239
Access Period: 0
0
1109-1130
HTML
XML
PDF
Research Article
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios
Yosra Lakhdhar
,
Slim Rekhis
,
Noureddine Boudriga
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1066
28-09-2019
Unique: 1440 | Total: 2343
Access Period: 0
0
1066-1088
HTML
XML
PDF
Research Article
Impact of Resource Control in Irregular Networks on their Transmission Properties
Sławomir Bujnowski
,
Tomasz Marciniak
,
Beata Marciniak
,
Zbigniew Lutowski
Part of: Recent Advances, Emerging Methods and Applications of Pattern Recognition
10.3217/jucs-025-06-0591
28-06-2019
Unique: 1400 | Total: 2237
Access Period: 0
0
591-610
HTML
XML
PDF
Research Article
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
Bagus Santoso
,
Chunhua Su
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0294
28-03-2019
Unique: 1332 | Total: 2218
Access Period: 0
0
294-308
HTML
XML
PDF
Research Article
CCA-Secure Deterministic Identity-Based Encryption Scheme
Meijuan Huang
,
Bo Yang
,
Yi Zhao
,
Kaitai Liang
,
Liang Xue
,
Xiaoyi Yang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0245
28-03-2019
Unique: 1399 | Total: 2342
Access Period: 0
0
245-269
HTML
XML
PDF
Research Article
Methods for Information Hiding in Open Social Networks
Jędrzej Bieniasz
,
Krzysztof Szczypiorski
10.3217/jucs-025-02-0074
28-02-2019
Unique: 1344 | Total: 2190
Access Period: 0
0
74-97
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK