Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2747)
Editorial
(420)
by Journal
by Funding Agency
Clear filters
Powered by
89 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6.5 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Advancing the Threat Intelligence with AI: An Overview, Taxonomy and Roadmap
Igor Tomičić
,
Petra Grd
,
Andrija Bernik
10.3897/jucs.137544
28-08-2025
Unique: 969 | Total: 1304
Access Period: 0
0
1102-1129
HTML
PDF
Editorial
Explanatory Data Science in Technology Applications
Wolfram Luther
,
A. J. Han Vinck
Part of: Explanatory Data Science in Technology Applications
10.3897/jucs.164654
14-08-2025
Unique: 727 | Total: 1028
Access Period: 0
0
873-876
HTML
PDF
Research Article
Refining Ethical Reflections in Cybersecurity Policy and Privacy: Insights for Policy Makers
Ryma Abassi
10.3897/jucs.125999
28-05-2025
Unique: 1277 | Total: 1759
Access Period: 0
0
572-602
HTML
PDF
Research Article
Recognition of genuine and phishing emails may not be associated with response to phishing attacks
Alex Crgol
,
Simon Vrhovec
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.132113
14-09-2024
Unique: 1387 | Total: 1980
Access Period: 0
0
1265-1283
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 1202 | Total: 1581
Access Period: 0
0
1224-1243
HTML
PDF
Research Article
A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection
Javier Muñoz-Calle
,
Rafael Estepa Alonso
,
Antonio Estepa Alonso
,
Jesús E. Díaz-Verdejo
,
Elvira Castillo Fernández
,
Germán Madinabeitia
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131686
14-09-2024
Unique: 1428 | Total: 2001
Access Period: 0
0
1184-1204
HTML
PDF
Research Article
An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection
Orçun Çetin
,
Emre Ekmekcioglu
,
Budi Arief
,
Julio Hernandez-Castro
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134739
14-09-2024
Unique: 1848 | Total: 3070
Access Period: 0
0
1163-1183
HTML
PDF
Research Article
Exploiting TTPs to Design an Extensible and Explainable Malware Detection System
Yashovardhan Sharma
,
Simon Birnbach
,
Ivan Martinovic
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131753
14-09-2024
Unique: 1178 | Total: 1545
Access Period: 0
0
1140-1162
HTML
PDF
Research Article
Towards a single device for multiple security domains
Florian Skopik
,
Arndt Bonitz
,
Daniel Slamanig
,
Markus Kirschner
,
Wolfgang Hacker
10.3897/jucs.112790
28-05-2024
Unique: 1176 | Total: 1542
Access Period: 0
0
563-589
HTML
PDF
Research Article
UP-Home: A Self-Adaptive Solution for Smart Home Security
Josival Silva
,
Nelson Rosa
,
Fernando Aires
10.3897/jucs.107050
28-04-2024
Unique: 1344 | Total: 1802
Access Period: 0
0
502-530
HTML
PDF
Research Article
Low-sample classification in NIDS using the EC-GAN method
Marko Zekan
,
Igor Tomičić
,
Markus Schatten
10.3897/jucs.85703
28-12-2022
Unique: 2081 | Total: 3143
Access Period: 0
0
1330-1346
HTML
XML
PDF
Research Article
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms
Mohamed Talha
,
Anas Abou El Kalam
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence II
10.3897/jucs.77046
28-12-2021
Unique: 2112 | Total: 3497
Access Period: 0
0
1300-1324
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK