Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
634 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic D - Software
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
11
12
13
14
15
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Improving Performance of the Differential Evolution Algorithm Using Cyclic Decloning and Changeable Population Size
Piotr Jędrzejowicz
,
Aleksander Skakovski
Part of: Computational Intelligence Tools for Processing Collective Data
10.3217/jucs-022-06-0874
01-06-2016
Unique: 509 | Total: 697
| Access Period:
874-893
HTML
XML
PDF
Research Article
On the Analysis and Detection of Mobile Botnet Applications
Ahmad Karim
,
Muhammad Khan
,
Aisha Siddiqa
,
Kim-Kwang Choo
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0567
01-04-2016
Unique: 489 | Total: 609
| Access Period:
567-588
HTML
XML
PDF
Research Article
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves
Omar Alzubi
,
Thomas Chen
,
Jafar Alzubi
,
Hasan Rashaideh
,
Nijad Al-Najdawi
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0552
01-04-2016
Unique: 486 | Total: 653
| Access Period:
552-566
HTML
XML
PDF
Research Article
An Empirical Investigation of Security Vulnerabilities within Web Applications
Ibrahim Abunadi
,
Mamdouh Alenezi
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0537
01-04-2016
Unique: 521 | Total: 665
| Access Period:
537-551
HTML
XML
PDF
Research Article
Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud
Asif Imran
,
Shadi Aljawarneh
,
Kazi Sakib
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0494
01-04-2016
Unique: 518 | Total: 677
| Access Period:
494-520
HTML
XML
PDF
Research Article
A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection
Vangipuram Radhakrishna
,
Puligadda Kumar
,
Vinjamuri Janaki
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0475
01-04-2016
Unique: 454 | Total: 580
| Access Period:
475-493
HTML
XML
PDF
Research Article
Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives
Ajay Jha
,
Woo Lee
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0459
01-04-2016
Unique: 403 | Total: 520
| Access Period:
459-474
HTML
XML
PDF
Research Article
A Bot Spooler Architecture to Integrate Virtual Worlds with E-learning Management Systems for Corporate Training
Leonel Morgado
,
Hugo Paredes
,
Benjamim Fonseca
,
Paulo Martins
,
Alvaro Almeida
,
Andreas Vilela
,
Filipe Peixinho
,
Arnaldo Santos
10.3217/jucs-022-02-0271
01-01-2016
Unique: 606 | Total: 797
| Access Period:
271-297
HTML
XML
PDF
Research Article
Analyzing Communication Dimensions in a Ubiquitous Learning Environment
Dilek Karahoca
,
Adem Karahoca
,
Ayça Kurnaz
Part of: Future Trends in Computing Technology in Education
10.3217/jucs-022-01-0124
01-01-2016
Unique: 504 | Total: 685
| Access Period:
124-145
HTML
XML
PDF
Research Article
An Interactive Design Pattern Selection Method
Nadia Bouassida
,
Salma Jamoussi
,
Ahmed Msaed
,
Hanêne Ben-Abdallah
Part of: Information Retrieval and Recommender Systems
10.3217/jucs-021-13-1746
28-12-2015
Unique: 580 | Total: 781
| Access Period:
1746-1766
HTML
XML
PDF
Research Article
Cross-Language Source Code Re-Use Detection Using Latent Semantic Analysis
Enrique Flores
,
Alberto Barrón-Cedeño
,
Lidia Moreno
,
Paolo Rosso
Part of: Information Retrieval and Recommender Systems
10.3217/jucs-021-13-1708
28-12-2015
Unique: 616 | Total: 829
| Access Period:
1708-1725
HTML
XML
PDF
Research Article
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
Steffen Wendzel
,
Carolin Palmer
10.3217/jucs-021-12-1684
01-12-2015
Unique: 549 | Total: 675
| Access Period:
1684-1705
HTML
XML
PDF
11
12
13
14
15
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK