Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
21 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2.3 - Network Operations
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Low-sample classification in NIDS using the EC-GAN method
Marko Zekan
,
Igor Tomičić
,
Markus Schatten
10.3897/jucs.85703
28-12-2022
Unique: 1185 | Total: 1811
| Access Period:
1330-1346
HTML
XML
PDF
Research Article
Traffic Optimization with Software-Defined Network Controller on a New User Interface
Derya Yiltas-Kaplan
10.3897/jucs.80625
28-06-2022
Unique: 1412 | Total: 2213
| Access Period:
648-669
HTML
XML
PDF
Research Article
On the Automated and Reactive Optimization of Highly-Dynamic Communication Network Infrastructures
Robin Mueller-Bady
,
Martin Kappes
,
Inmaculada Medina-Bulo
,
Francisco Palomo-Lozano
10.3217/jucs-025-07-0788
28-07-2019
Unique: 633 | Total: 1149
| Access Period:
788-815
HTML
XML
PDF
Research Article
Machine Learning Methods for Anomaly Detection in BACnet Networks
Jernej Tonejc
,
Sabrina Güttes
,
Alexandra Kobekova
,
Jaspreet Kaur
Part of: Security, Privacy and Reliability of Smart Buildings
10.3217/jucs-022-09-1203
01-09-2016
Unique: 524 | Total: 705
| Access Period:
1203-1224
HTML
XML
PDF
Research Article
Feature Selection for Black Hole Attacks
Muneer Yassein
,
Yaser Khamayseh
,
Mai Abujazoh
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0521
01-04-2016
Unique: 478 | Total: 658
| Access Period:
521-536
HTML
XML
PDF
Research Article
Clock-Skew-Based Computer Identification: Traps and Pitfalls
Libor Polčák
,
Barbora Franková
10.3217/jucs-021-09-1210
01-09-2015
Unique: 438 | Total: 592
| Access Period:
1210-1233
HTML
XML
PDF
Research Article
Understanding Collaboration in Volunteer Computing Systems
Davide Vega
,
Roc Meseguer
,
Felix Freitag
,
Sergio Ochoa
Part of: Collaborative Computing and Applications
10.3217/jucs-020-13-1738
28-11-2014
Unique: 549 | Total: 729
| Access Period:
1738-1765
HTML
XML
PDF
Research Article
Countermeasures to Prevent Misbehaviour in VANETs
Jezabel Molina-Gil
,
Pino Caballero-Gil
,
Cándido Caballero-Gil
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0857
28-03-2012
Unique: 544 | Total: 706
| Access Period:
857-873
HTML
XML
PDF
Research Article
Decision Strategies for a P2P Computing System
Grzegorz Chmaj
,
Krzysztof Walkowiak
10.3217/jucs-018-05-0599
01-03-2012
Unique: 477 | Total: 646
| Access Period:
599-622
HTML
XML
PDF
Research Article
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
Khaled Salah
,
Mojeeb-Al-Rhman Al-Khiaty
,
Rashad Ahmed
,
Adnan Mahdi
10.3217/jucs-017-11-1605
01-07-2011
Unique: 395 | Total: 509
| Access Period:
1605-1622
HTML
XML
PDF
Research Article
RAHIM: Robust Adaptive Approach Based on Hierarchical Monitoring Providing Trust Aggregation for Wireless Sensor Networks
Nabila Labraoui
,
Mourad Gueroui
,
Makhlouf Aliouat
,
Jonathan Petit
10.3217/jucs-017-11-1550
01-07-2011
Unique: 362 | Total: 436
| Access Period:
1550-1571
HTML
XML
PDF
Research Article
Improving Security Levels of IEEE802.16e Authentication by Involving Diffie-Hellman PKDS
Yi-Li Huang
,
Fang-Yie Leu
,
Chao-Hong Chiu
,
I-Long Lin
10.3217/jucs-017-06-0891
28-03-2011
Unique: 375 | Total: 450
| Access Period:
891-911
HTML
XML
PDF
1
2
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK