Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2765)
Editorial
(423)
by Journal
by Funding Agency
Clear filters
Powered by
139 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6 - MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Advancing the Threat Intelligence with AI: An Overview, Taxonomy and Roadmap
Igor Tomičić
,
Petra Grd
,
Andrija Bernik
10.3897/jucs.137544
28-08-2025
Unique: 1242 | Total: 1714
Access Period: 0
0
1102-1129
HTML
PDF
Editorial
Explanatory Data Science in Technology Applications
Wolfram Luther
,
A. J. Han Vinck
Part of: Explanatory Data Science in Technology Applications
10.3897/jucs.164654
14-08-2025
Unique: 887 | Total: 1231
Access Period: 0
0
873-876
HTML
PDF
Research Article
Refining Ethical Reflections in Cybersecurity Policy and Privacy: Insights for Policy Makers
Ryma Abassi
10.3897/jucs.125999
28-05-2025
Unique: 1661 | Total: 2297
Access Period: 0
0
572-602
HTML
PDF
Research Article
Recognition of genuine and phishing emails may not be associated with response to phishing attacks
Alex Crgol
,
Simon Vrhovec
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.132113
14-09-2024
Unique: 1499 | Total: 2134
Access Period: 0
0
1265-1283
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 1299 | Total: 1706
Access Period: 0
0
1224-1243
HTML
PDF
Research Article
A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection
Javier Muñoz-Calle
,
Rafael Estepa Alonso
,
Antonio Estepa Alonso
,
Jesús E. Díaz-Verdejo
,
Elvira Castillo Fernández
,
Germán Madinabeitia
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131686
14-09-2024
Unique: 1557 | Total: 2176
Access Period: 0
0
1184-1204
HTML
PDF
Research Article
An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection
Orçun Çetin
,
Emre Ekmekcioglu
,
Budi Arief
,
Julio Hernandez-Castro
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134739
14-09-2024
Unique: 2068 | Total: 3376
Access Period: 0
0
1163-1183
HTML
PDF
Research Article
Exploiting TTPs to Design an Extensible and Explainable Malware Detection System
Yashovardhan Sharma
,
Simon Birnbach
,
Ivan Martinovic
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131753
14-09-2024
Unique: 1292 | Total: 1703
Access Period: 0
0
1140-1162
HTML
PDF
Research Article
Towards a single device for multiple security domains
Florian Skopik
,
Arndt Bonitz
,
Daniel Slamanig
,
Markus Kirschner
,
Wolfgang Hacker
10.3897/jucs.112790
28-05-2024
Unique: 1290 | Total: 1693
Access Period: 0
0
563-589
HTML
PDF
Research Article
UP-Home: A Self-Adaptive Solution for Smart Home Security
Josival Silva
,
Nelson Rosa
,
Fernando Aires
10.3897/jucs.107050
28-04-2024
Unique: 1481 | Total: 2014
Access Period: 0
0
502-530
HTML
PDF
Research Article
Challenges and Experiences in Designing Interpretable KPI-diagnostics for Cloud Applications
Ashot Harutyunyan
,
Arnak Poghosyan
,
Lilit Harutyunyan
,
Nelli Aghajanyan
,
Tigran Bunarjyan
,
A.J. Han Vinck
Part of: Traceable use of emerging technologies in smart systems
10.3897/jucs.112570
28-11-2023
Unique: 1833 | Total: 2747
Access Period: 0
0
1298-1318
HTML
XML
PDF
Research Article
Low-sample classification in NIDS using the EC-GAN method
Marko Zekan
,
Igor Tomičić
,
Markus Schatten
10.3897/jucs.85703
28-12-2022
Unique: 2206 | Total: 3311
Access Period: 0
0
1330-1346
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK