Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2694)
Editorial
(409)
by Journal
by Funding Agency
Clear filters
Powered by
7 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.7.m - Miscellaneous
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Detection of Size Modulation Covert Channels Using Countermeasure Variation
Steffen Wendzel
,
Florian Link
,
Daniela Eller
,
Wojciech Mazurczyk
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1396
28-11-2019
Unique: 1146 | Total: 1836
| Access Period:
1396-1416
HTML
XML
PDF
Research Article
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms
Ralf Keidel
,
Steffen Wendzel
,
Sebastian Zillien
,
Eric Conner
,
Georg Haas
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0556
28-05-2018
Unique: 976 | Total: 1224
| Access Period:
556-576
HTML
XML
PDF
Research Article
Unified Description for Network Information Hiding Methods
Steffen Wendzel
,
Wojciech Mazurczyk
,
Sebastian Zander
10.3217/jucs-022-11-1456
01-11-2016
Unique: 970 | Total: 1321
| Access Period:
1456-1486
HTML
XML
PDF
Research Article
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
Steffen Wendzel
,
Carolin Palmer
10.3217/jucs-021-12-1684
01-12-2015
Unique: 729 | Total: 899
| Access Period:
1684-1705
HTML
XML
PDF
Research Article
The Forum for Negative Results (FNR)Guest Editorial
Lutz Prechelt
10.3217/jucs-018-20-2748
01-12-2012
Unique: 781 | Total: 1039
| Access Period:
2748-2749
HTML
XML
PDF
Research Article
Computing as Engineering
Matti Tedre
10.3217/jucs-015-08-1642
28-04-2009
Unique: 556 | Total: 654
| Access Period:
1642-1658
HTML
XML
PDF
Research Article
Why We Need an Explicit Forum for Negative Results
Lutz Prechelt
10.3217/jucs-003-09-1074
28-09-1997
Unique: 609 | Total: 783
| Access Period:
1074-1083
HTML
XML
PDF
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK