Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
129 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6 - MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Challenges and Experiences in Designing Interpretable KPI-diagnostics for Cloud Applications
Ashot Harutyunyan
,
Arnak Poghosyan
,
Lilit Harutyunyan
,
Nelli Aghajanyan
,
Tigran Bunarjyan
,
A.J. Han Vinck
Part of: Traceable use of emerging technologies in smart systems
10.3897/jucs.112570
28-11-2023
Unique: 567 | Total: 830
| Access Period:
1298-1318
HTML
XML
PDF
Research Article
Low-sample classification in NIDS using the EC-GAN method
Marko Zekan
,
Igor Tomičić
,
Markus Schatten
10.3897/jucs.85703
28-12-2022
Unique: 1185 | Total: 1811
| Access Period:
1330-1346
HTML
XML
PDF
Research Article
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms
Mohamed Talha
,
Anas Abou El Kalam
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence II
10.3897/jucs.77046
28-12-2021
Unique: 1294 | Total: 2264
| Access Period:
1300-1324
HTML
XML
PDF
Research Article
Understanding the Impact of Development Efforts in Code Quality
Ricardo Perez-Castillo
,
Mario Piattini
10.3897/jucs.72475
28-10-2021
Unique: 1176 | Total: 2468
| Access Period:
1096-1127
HTML
XML
PDF
Research Article
Security Reference Architecture for Cyber-Physical Systems (CPS)
Julio Moreno
,
David G. Rosado
,
Luis E. Sánchez
,
Manuel A. Serrano
,
Eduardo Fernández-Medina
10.3897/jucs.68539
28-06-2021
Unique: 2140 | Total: 3912
| Access Period:
609-634
HTML
XML
PDF
Research Article
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection
Łukasz Apiecionek
,
Matusz Biedziak
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.076
28-11-2020
Unique: 694 | Total: 1182
| Access Period:
1435-1454
HTML
XML
PDF
Research Article
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking
Caroline Moeckel
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.043
28-07-2020
Unique: 671 | Total: 1219
| Access Period:
783-804
HTML
XML
PDF
Research Article
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems
Damjan Fujs
,
Simon Vrhovec
,
Damjan Vavpotič
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.042
28-07-2020
Unique: 755 | Total: 1343
| Access Period:
764-782
HTML
XML
PDF
Research Article
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis
Tomasz Andrysiak
,
Łukasz Saganowski
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.027
28-04-2020
Unique: 739 | Total: 1339
| Access Period:
508-527
HTML
XML
PDF
Research Article
Authorship Studies and the Dark Side of Social Media Analytics
Patrick Juola
Part of: Recent Advances in Social Network Analysis, Management and Security
10.3897/jucs.2020.009
28-01-2020
Unique: 821 | Total: 1604
| Access Period:
156-170
HTML
XML
PDF
Research Article
A Revised Framework for the Governance and Management of Green IT
J. Patón-Romero
,
Maria Baldassarre
,
Moisés Rodríguez
,
Mario Piattini
10.3217/jucs-025-13-1736
28-12-2019
Unique: 928 | Total: 1503
| Access Period:
1736-1760
HTML
XML
PDF
Research Article
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure
Halima Kure
,
Shareeful Islam
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1478
28-11-2019
Unique: 1929 | Total: 3259
| Access Period:
1478-1502
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK