Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2717)
Editorial
(414)
by Journal
by Funding Agency
Clear filters
Powered by
97 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.4 - OPERATING SYSTEMS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Cross-device Portability of Machine Learning Models in Electromagnetic Side-Channel Analysis for Forensics
Lojenaa Navanesan
,
Nhien-An Le-Khac
,
Yossi Oren
,
Kasun De Zoysa
,
Asanka P. Sayakkara
10.3897/jucs.109788
28-09-2024
Unique: 914 | Total: 1232
| Access Period:
1390-1423
HTML
PDF
Research Article
A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection
Javier Muñoz-Calle
,
Rafael Estepa Alonso
,
Antonio Estepa Alonso
,
Jesús E. Díaz-Verdejo
,
Elvira Castillo Fernández
,
Germán Madinabeitia
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131686
14-09-2024
Unique: 844 | Total: 1194
| Access Period:
1184-1204
HTML
PDF
Editorial
Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
Steffen Wendzel
,
Aleksandra Mileva
,
Virginia N. L. Franqueira
,
Martin Gilje Jaatun
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131628
14-09-2024
Unique: 693 | Total: 903
| Access Period:
1137-1139
HTML
PDF
Research Article
Usa-DSL: a Process for Usability Evaluation of Domain-Specific Languages
Ildevana Poltronieri
,
Avelino Francisco Zorzo
,
Maicon Bernardino
,
Edson OliveiraJr
10.3897/jucs.103264
28-08-2024
Unique: 691 | Total: 977
| Access Period:
1023-1047
HTML
PDF
Research Article
UP-Home: A Self-Adaptive Solution for Smart Home Security
Josival Silva
,
Nelson Rosa
,
Fernando Aires
10.3897/jucs.107050
28-04-2024
Unique: 1105 | Total: 1471
| Access Period:
502-530
HTML
PDF
Research Article
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
Tien Quang Dam
,
Nghia Thinh Nguyen
,
Trung Viet Le
,
Tran Duc Le
,
Sylvestre Uwizeyemungu
,
Thang Le-Dinh
10.3897/jucs.104901
28-02-2024
Unique: 1824 | Total: 2573
| Access Period:
262-286
HTML
PDF
Research Article
diffReplication - An Energy-Aware Fault Tolerance Model for Silent Error Detection and Mitigation in Heterogeneous Extreme-scale Computing Environment
Longhao Li
,
Taieb Znati
,
Rami Melhem
10.3897/jucs.94462
28-08-2023
Unique: 1130 | Total: 1591
| Access Period:
892-910
HTML
XML
PDF
Research Article
Cost-Effective Scheduling in Fog Computing: An Environment Based on Modified PROMETHEE Technique
Shefali Varshney
,
Rajinder Sandhu
,
P. K. Gupta
10.3897/jucs.90429
28-04-2023
Unique: 1462 | Total: 2163
| Access Period:
397-416
HTML
XML
PDF
Research Article
Cybersecurity Verification and Validation Testing in Automotive
Damjan Ekert
,
Jürgen Dobaj
,
Alen Salamun
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71833
28-08-2021
Unique: 2563 | Total: 4345
| Access Period:
850-867
HTML
XML
PDF
Research Article
Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study
Jürgen Dobaj
,
Damjan Ekert
,
Jakub Stolfa
,
Svatopluk Stolfa
,
Georg Macher
,
Richard Messnarz
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72367
28-08-2021
Unique: 2812 | Total: 4949
| Access Period:
830-849
HTML
XML
PDF
Editorial
Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
Richard Messnarz
,
Ricardo Colomo-Palacios
,
Georg Macher
,
Andreas Riel
,
Miklos Biro
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72072
28-08-2021
Unique: 2049 | Total: 3499
| Access Period:
793-795
HTML
XML
PDF
Editorial
Mobile, Open and Social Language Learning Designs and Architectures
Agnes Kukulska-Hulme
,
Jorge Arus-Hota
,
Jesus Garcia Laborda
Part of: Mobile, Open and Social Language Learning Designs and Architectures
10.3897/jucs.68852
28-05-2021
Unique: 2117 | Total: 3848
| Access Period:
413-424
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK