Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
81 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6.5 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Video Semantic Analysis Framework based on Run-time Production Rules - Towards Cognitive Vision
Alejandro Zambrano
,
Carlos Toro
,
Marcos Nieto
,
Ricardo Sotaquira
,
Cesar Sanín
,
Edward Szczerbicki
Part of: Intelligent Distributed Processing Methods for Big Data
10.3217/jucs-021-06-0856
01-06-2015
Unique: 482 | Total: 659
| Access Period:
856-870
HTML
XML
PDF
Research Article
Restricted Identification Secure in the Extended Canetti-Krawczyk Model
Lucjan Hanzlik
,
Mirosław Kutyłowski
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0419
01-03-2015
Unique: 490 | Total: 620
| Access Period:
419-439
HTML
XML
PDF
Research Article
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence
Junho Choi
,
Chang Choi
,
Ilsun You
,
Pankoo Kim
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0369
01-03-2015
Unique: 559 | Total: 725
| Access Period:
369-383
HTML
XML
PDF
Research Article
An Anonymization Algorithm for (α, β, γ, δ)-Social Network Privacy Considering Data Utility
Mehri Rajaei
,
Mostafa Haghjoo
,
Eynollah Miyaneh
10.3217/jucs-021-02-0268
01-02-2015
Unique: 452 | Total: 565
| Access Period:
268-305
HTML
XML
PDF
Research Article
Automatic Authentication to Cloud-Based Services
Mircea Vleju
Part of: Conceptual Modelling with Specific Focus on Service-Oriented Systems
10.3217/jucs-020-03-0385
01-03-2014
Unique: 573 | Total: 793
| Access Period:
385-405
HTML
XML
PDF
Research Article
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
Carlos Blanco
,
Ignacio De Guzmán
,
Eduardo Fernández-Medina
,
Juan Trujillo
10.3217/jucs-020-02-0079
01-02-2014
Unique: 746 | Total: 1026
| Access Period:
79-106
HTML
XML
PDF
Research Article
Toward a Module-centralized and Aspect-oriented Monitoring Framework in Clouds
Kun Ma
,
Runyuan Sun
,
Ajith Abraham
10.3217/jucs-019-15-2241
01-09-2013
Unique: 568 | Total: 745
| Access Period:
2241-2265
HTML
XML
PDF
Research Article
Engineering Security into Distributed Systems: A Survey of Methodologies
Anton Uzunov
,
Eduardo Fernandez
,
Katrina Falkner
10.3217/jucs-018-20-2920
01-12-2012
Unique: 585 | Total: 728
| Access Period:
2920-3006
HTML
XML
PDF
Research Article
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
Lin Ding
,
Jie Guan
,
Wen-long Sun
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1741
28-06-2012
Unique: 556 | Total: 686
| Access Period:
1741-1756
HTML
XML
PDF
Research Article
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management
Ismael Caballero
,
Luis Sánchez
,
Alberto Freitas
,
Eduardo Fernández-Medina
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1703
28-06-2012
Unique: 490 | Total: 635
| Access Period:
1703-1720
HTML
XML
PDF
Research Article
A Novel Identity-based Network Architecture for Next Generation Internet
Pedro Martinez-Julia
,
Antonio Skarmeta
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1643
28-06-2012
Unique: 552 | Total: 761
| Access Period:
1643-1661
HTML
XML
PDF
Research Article
Aligning Security and Privacy to Support the Development of Secure Information Systems
Haralambos Mouratidis
,
Christos Kalloniatis
,
Shareeful Islam
,
Marc-Philippe Huget
,
Stefanos Gritzalis
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1608
28-06-2012
Unique: 549 | Total: 744
| Access Period:
1608-1627
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK