Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2717)
Editorial
(414)
by Journal
by Funding Agency
Clear filters
Powered by
7 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.7.m - Miscellaneous
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Detection of Size Modulation Covert Channels Using Countermeasure Variation
Steffen Wendzel
,
Florian Link
,
Daniela Eller
,
Wojciech Mazurczyk
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1396
28-11-2019
Unique: 1280 | Total: 2049
| Access Period:
1396-1416
HTML
XML
PDF
Research Article
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms
Ralf Keidel
,
Steffen Wendzel
,
Sebastian Zillien
,
Eric Conner
,
Georg Haas
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0556
28-05-2018
Unique: 1091 | Total: 1384
| Access Period:
556-576
HTML
XML
PDF
Research Article
Unified Description for Network Information Hiding Methods
Steffen Wendzel
,
Wojciech Mazurczyk
,
Sebastian Zander
10.3217/jucs-022-11-1456
01-11-2016
Unique: 1097 | Total: 1516
| Access Period:
1456-1486
HTML
XML
PDF
Research Article
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
Steffen Wendzel
,
Carolin Palmer
10.3217/jucs-021-12-1684
01-12-2015
Unique: 812 | Total: 1023
| Access Period:
1684-1705
HTML
XML
PDF
Research Article
The Forum for Negative Results (FNR)Guest Editorial
Lutz Prechelt
10.3217/jucs-018-20-2748
01-12-2012
Unique: 875 | Total: 1208
| Access Period:
2748-2749
HTML
XML
PDF
Research Article
Computing as Engineering
Matti Tedre
10.3217/jucs-015-08-1642
28-04-2009
Unique: 624 | Total: 761
| Access Period:
1642-1658
HTML
XML
PDF
Research Article
Why We Need an Explicit Forum for Negative Results
Lutz Prechelt
10.3217/jucs-003-09-1074
28-09-1997
Unique: 701 | Total: 944
| Access Period:
1074-1083
HTML
XML
PDF
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK