Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2721)
Editorial
(415)
by Journal
by Funding Agency
Clear filters
Powered by
137 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6 - MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Refining Ethical Reflections in Cybersecurity Policy and Privacy: Insights for Policy Makers
Ryma Abassi
10.3897/jucs.125999
28-05-2025
Unique: 430 | Total: 528
| Access Period:
572-602
HTML
PDF
Research Article
Recognition of genuine and phishing emails may not be associated with response to phishing attacks
Alex Crgol
,
Simon Vrhovec
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.132113
14-09-2024
Unique: 877 | Total: 1249
| Access Period:
1265-1283
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 667 | Total: 883
| Access Period:
1224-1243
HTML
PDF
Research Article
A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection
Javier Muñoz-Calle
,
Rafael Estepa Alonso
,
Antonio Estepa Alonso
,
Jesús E. Díaz-Verdejo
,
Elvira Castillo Fernández
,
Germán Madinabeitia
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131686
14-09-2024
Unique: 896 | Total: 1275
| Access Period:
1184-1204
HTML
PDF
Research Article
An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection
Orçun Çetin
,
Emre Ekmekcioglu
,
Budi Arief
,
Julio Hernandez-Castro
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134739
14-09-2024
Unique: 1148 | Total: 2062
| Access Period:
1163-1183
HTML
PDF
Research Article
Exploiting TTPs to Design an Extensible and Explainable Malware Detection System
Yashovardhan Sharma
,
Simon Birnbach
,
Ivan Martinovic
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131753
14-09-2024
Unique: 604 | Total: 786
| Access Period:
1140-1162
HTML
PDF
Research Article
Towards a single device for multiple security domains
Florian Skopik
,
Arndt Bonitz
,
Daniel Slamanig
,
Markus Kirschner
,
Wolfgang Hacker
10.3897/jucs.112790
28-05-2024
Unique: 962 | Total: 1281
| Access Period:
563-589
HTML
PDF
Research Article
UP-Home: A Self-Adaptive Solution for Smart Home Security
Josival Silva
,
Nelson Rosa
,
Fernando Aires
10.3897/jucs.107050
28-04-2024
Unique: 1139 | Total: 1517
| Access Period:
502-530
HTML
PDF
Research Article
Challenges and Experiences in Designing Interpretable KPI-diagnostics for Cloud Applications
Ashot Harutyunyan
,
Arnak Poghosyan
,
Lilit Harutyunyan
,
Nelli Aghajanyan
,
Tigran Bunarjyan
,
A.J. Han Vinck
Part of: Traceable use of emerging technologies in smart systems
10.3897/jucs.112570
28-11-2023
Unique: 1497 | Total: 2296
| Access Period:
1298-1318
HTML
XML
PDF
Research Article
Low-sample classification in NIDS using the EC-GAN method
Marko Zekan
,
Igor Tomičić
,
Markus Schatten
10.3897/jucs.85703
28-12-2022
Unique: 1839 | Total: 2825
| Access Period:
1330-1346
HTML
XML
PDF
Research Article
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms
Mohamed Talha
,
Anas Abou El Kalam
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence II
10.3897/jucs.77046
28-12-2021
Unique: 1894 | Total: 3196
| Access Period:
1300-1324
HTML
XML
PDF
Research Article
Understanding the Impact of Development Efforts in Code Quality
Ricardo Perez-Castillo
,
Mario Piattini
10.3897/jucs.72475
28-10-2021
Unique: 1811 | Total: 3496
| Access Period:
1096-1127
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK