Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Topical collections
Author Guidelines
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(907)
Editorial
(147)
by Journal
by Funding Agency
Clear filters
Powered by
37 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.4.6 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Cybersecurity Verification and Validation Testing in Automotive
Damjan Ekert
,
Jürgen Dobaj
,
Alen Salamun
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71833
28-08-2021
Unique: 1025 | Total: 1582
| Access Period:
850-867
HTML
XML
PDF
Research Article
Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study
Jürgen Dobaj
,
Damjan Ekert
,
Jakub Stolfa
,
Svatopluk Stolfa
,
Georg Macher
,
Richard Messnarz
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72367
28-08-2021
Unique: 913 | Total: 1415
| Access Period:
830-849
HTML
XML
PDF
Editorial
Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
Richard Messnarz
,
Ricardo Colomo-Palacios
,
Georg Macher
,
Andreas Riel
,
Miklos Biro
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72072
28-08-2021
Unique: 739 | Total: 1110
| Access Period:
793-795
HTML
XML
PDF
Research Article
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection
Łukasz Apiecionek
,
Matusz Biedziak
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.076
28-11-2020
Unique: 191 | Total: 284
| Access Period:
1435-1454
HTML
PDF
Research Article
Utilizing Debugging Information of Applications in Memory Forensics
Mohammed Al-Saleh
,
Ethar Qawasmeh
,
Ziad Al-Sharif
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.044
28-07-2020
Unique: 175 | Total: 284
| Access Period:
805-826
HTML
PDF
Research Article
Analysis of the Infection and the Injection Phases of the Telnet Botnets
Tomáš Bajtoš
,
Pavol Sokol
,
Andrej Gajdoš
,
Katarína Lučivjanská
,
Terézia Mézešová
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1417
28-11-2019
Unique: 262 | Total: 502
| Access Period:
1417-1436
HTML
PDF
Research Article
Detection of Size Modulation Covert Channels Using Countermeasure Variation
Steffen Wendzel
,
Florian Link
,
Daniela Eller
,
Wojciech Mazurczyk
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1396
28-11-2019
Unique: 331 | Total: 574
| Access Period:
1396-1416
HTML
PDF
Research Article
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
K. Shankar
,
Mohamed Elhoseny
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1221
28-10-2019
Unique: 343 | Total: 590
| Access Period:
1221-1239
HTML
PDF
Research Article
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images
Mingying Huang
,
Ming Xu
,
Tong Qiao
,
Ting Wu
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1151
28-09-2019
Unique: 247 | Total: 513
| Access Period:
1151-1173
HTML
PDF
Research Article
Precise Performance Characterization of Antivirus on the File System Operations
Mohammed Al-Saleh
,
Hanan Hamdan
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1089
28-09-2019
Unique: 264 | Total: 570
| Access Period:
1089-1108
HTML
PDF
Research Article
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study
Łukasz Apiecionek
,
Marcel Großmann
,
Udo Krieger
Part of: Recent Advances, Emerging Methods and Applications of Pattern Recognition
10.3217/jucs-025-06-0571
28-06-2019
Unique: 310 | Total: 599
| Access Period:
571-590
HTML
PDF
Research Article
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
Bagus Santoso
,
Chunhua Su
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0294
28-03-2019
Unique: 288 | Total: 546
| Access Period:
294-308
HTML
PDF
1
2
3
4
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK