Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
426 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.2 - SOFTWARE ENGINEERING
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study
Jürgen Dobaj
,
Damjan Ekert
,
Jakub Stolfa
,
Svatopluk Stolfa
,
Georg Macher
,
Richard Messnarz
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72367
28-08-2021
Unique: 2171 | Total: 3885
| Access Period:
830-849
HTML
XML
PDF
Research Article
ODD description methods for automated driving vehicle and verifiability for safety
Masao Ito
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72333
28-08-2021
Unique: 2431 | Total: 4291
| Access Period:
796-810
HTML
XML
PDF
Editorial
Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
Richard Messnarz
,
Ricardo Colomo-Palacios
,
Georg Macher
,
Andreas Riel
,
Miklos Biro
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72072
28-08-2021
Unique: 1584 | Total: 2747
| Access Period:
793-795
HTML
XML
PDF
Research Article
An Approach for Testing False Data Injection Attack on Data Dependent Industrial Devices
Mathieu Briland
,
Fabrice Bouquet
Part of: Advances and Challenges for Model and Data Engineering
10.3897/jucs.70326
28-07-2021
Unique: 1449 | Total: 2627
| Access Period:
774-792
HTML
XML
PDF
Research Article
Assembling the Web of Things and Microservices for the Management of Cyber-Physical Systems
Manel Mena
,
Javier Criado
,
Luis Iribarne
,
Antonio Corral
Part of: Advances and Challenges for Model and Data Engineering
10.3897/jucs.70325
28-07-2021
Unique: 1580 | Total: 2881
| Access Period:
734-754
HTML
XML
PDF
Research Article
A Formal Model for Configurable Business Process with Optimal Cloud Resource Allocation
Abderrahim Ait Wakrime
,
Souha Boubaker
,
Slim Kallel
,
Emna Guermazi
,
Walid Gaaloul
Part of: Advances and Challenges for Model and Data Engineering
10.3897/jucs.70978
28-07-2021
Unique: 1410 | Total: 2571
| Access Period:
693-713
HTML
XML
PDF
Research Article
Enhancing GDPR compliance through data sensitivity and data hiding tools
Xabier Larrucea
,
Micha Moffie
,
Dan Mor
Part of: Advances and Challenges for Model and Data Engineering
10.3897/jucs.70369
28-07-2021
Unique: 1341 | Total: 2376
| Access Period:
650-666
HTML
XML
PDF
Editorial
Advances and Challenges for Model and Data Engineering
Christian Attiogbé
,
Flavio Ferrarotti
,
Sofian Maabout
Part of: Advances and Challenges for Model and Data Engineering
10.3897/jucs.70972
28-07-2021
Unique: 1481 | Total: 2700
| Access Period:
646-649
HTML
XML
PDF
Research Article
Security Reference Architecture for Cyber-Physical Systems (CPS)
Julio Moreno
,
David G. Rosado
,
Luis E. Sánchez
,
Manuel A. Serrano
,
Eduardo Fernández-Medina
10.3897/jucs.68539
28-06-2021
Unique: 2290 | Total: 4233
| Access Period:
609-634
HTML
XML
PDF
Editorial
Mobile, Open and Social Language Learning Designs and Architectures
Agnes Kukulska-Hulme
,
Jorge Arus-Hota
,
Jesus Garcia Laborda
Part of: Mobile, Open and Social Language Learning Designs and Architectures
10.3897/jucs.68852
28-05-2021
Unique: 1693 | Total: 3115
| Access Period:
413-424
HTML
XML
PDF
Research Article
K-Step Crossover Method based on Genetic Algorithm for Test Suite Prioritization in Regression Testing
P. K. Gupta
Part of: Knowledge Intensive Software Engineering Applications
10.3897/jucs.65241
28-02-2021
Unique: 1556 | Total: 3312
| Access Period:
170-189
HTML
XML
PDF
Research Article
Business Patterns Catalogue and Selection Proposal for the Conceptual Model of a Software Product
Oscar Carlos Medina
,
Manuel Pérez Cota
,
Brenda Elizabeth Meloni
,
Marcelo Martín Marciszack
Part of: Knowledge Intensive Software Engineering Applications
10.3897/jucs.65083
28-02-2021
Unique: 1705 | Total: 3371
| Access Period:
135-151
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK