Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
634 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic D - Software
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
6
7
8
9
10
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Utilizing Debugging Information of Applications in Memory Forensics
Mohammed Al-Saleh
,
Ethar Qawasmeh
,
Ziad Al-Sharif
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.044
28-07-2020
Unique: 734 | Total: 1364
| Access Period:
805-826
HTML
XML
PDF
Research Article
Guidelines for Structuring Object-Oriented Product Configuration Models in Standard Configuration Software
Jeppe Rasmussen
,
Lars Hvam
,
Katrin Kristjansdottir
,
Niels Mortensen
Part of: Knowledge-based Configuration
10.3897/jucs.2020.020
28-03-2020
Unique: 799 | Total: 1517
| Access Period:
374-401
HTML
XML
PDF
Research Article
Experimental Evaluation of Three Value Recommendation Methods in Interactive Configuration
Hélène Fargier
,
Pierre-François Gimenez
,
Jérôme Mengin
Part of: Knowledge-based Configuration
10.3897/jucs.2020.018
28-03-2020
Unique: 631 | Total: 1292
| Access Period:
318-342
HTML
XML
PDF
Research Article
Improving WalkSAT for Random 3-SAT Problems
Huimin Fu
,
Yang Xu
,
Shuwei Chen
,
Jun Liu
10.3897/jucs.2020.013
28-02-2020
Unique: 685 | Total: 1365
| Access Period:
220-243
HTML
XML
PDF
Research Article
Scalable Distributed Metadata Server Based on Nonblocking Transactions
Kohei Hiraga
,
Osamu Tatebe
,
Hideyuki Kawashima
Part of: Recent Advances in Social Network Analysis, Management and Security
10.3897/jucs.2020.006
28-01-2020
Unique: 941 | Total: 2402
| Access Period:
89-106
HTML
XML
PDF
Research Article
An Intelligent Recommender System Based on Association Rule Analysis for Requirement Engineering
Mohammad Muhairat
,
Shadi Bi
,
Bilal Hawashin
,
Mohammad Elbes
,
Mahmoud Al-Ayyoub
Part of: Recent Advances in Social Network Analysis, Management and Security
10.3897/jucs.2020.003
28-01-2020
Unique: 873 | Total: 1735
| Access Period:
33-49
HTML
XML
PDF
Research Article
Adopting Trust in Learning Analytics Infrastructure: A Structured Literature Review
George-Petru Ciordas-Hertel
,
Jan Schneider
,
Stefaan Ternier
,
Hendrik Drachsler
10.3217/jucs-025-13-1668
28-12-2019
Unique: 1056 | Total: 1666
| Access Period:
1668-1686
HTML
XML
PDF
Research Article
Analysis of the Infection and the Injection Phases of the Telnet Botnets
Tomáš Bajtoš
,
Pavol Sokol
,
Andrej Gajdoš
,
Katarína Lučivjanská
,
Terézia Mézešová
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1417
28-11-2019
Unique: 814 | Total: 1392
| Access Period:
1417-1436
HTML
XML
PDF
Research Article
Detection of Size Modulation Covert Channels Using Countermeasure Variation
Steffen Wendzel
,
Florian Link
,
Daniela Eller
,
Wojciech Mazurczyk
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1396
28-11-2019
Unique: 887 | Total: 1473
| Access Period:
1396-1416
HTML
XML
PDF
Research Article
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
K. Shankar
,
Mohamed Elhoseny
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1221
28-10-2019
Unique: 875 | Total: 1461
| Access Period:
1221-1239
HTML
XML
PDF
Research Article
Digital Investigation of IoT Devices in the Criminal Scene
François Bouchaud
,
Gilles Grimaud
,
Thomas Vantroys
,
Pierrick Buret
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1199
28-09-2019
Unique: 1267 | Total: 2100
| Access Period:
1199-1218
HTML
XML
PDF
Research Article
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images
Mingying Huang
,
Ming Xu
,
Tong Qiao
,
Ting Wu
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1151
28-09-2019
Unique: 727 | Total: 1309
| Access Period:
1151-1173
HTML
XML
PDF
6
7
8
9
10
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK