Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Topical collections
Author Guidelines
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(907)
Editorial
(147)
by Journal
by Funding Agency
Clear filters
Powered by
18 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: L.4 - SECURITY/TRUST
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Disassemble Byte Sequence Using Graph Attention Network
Jing Qiu
,
Feng Dong
,
Guanglu Sun
10.3897/jucs.76528
28-07-2022
Unique: 168 | Total: 210
| Access Period:
758-775
HTML
XML
PDF
Research Article
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms
Mohamed Talha
,
Anas Abou El Kalam
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence II
10.3897/jucs.77046
28-12-2021
Unique: 532 | Total: 792
| Access Period:
1300-1324
HTML
XML
PDF
Research Article
Spam Detection Based on Feature Evolution to Deal with Concept Drift
Marcia Henke
,
Eulanda Santos
,
Eduardo Souto
,
Altair O Santin
10.3897/jucs.66284
28-04-2021
Unique: 1058 | Total: 1728
| Access Period:
364-386
HTML
XML
PDF
Research Article
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity
Simon Vrhovec
,
Damjan Fujs
,
Luka Jelovčan
,
Anže Mihelič
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.045
28-07-2020
Unique: 231 | Total: 345
| Access Period:
827-853
HTML
PDF
Research Article
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking
Caroline Moeckel
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.043
28-07-2020
Unique: 194 | Total: 287
| Access Period:
783-804
HTML
PDF
Research Article
Testing the Human Backdoor: Organizational Response to a Phishing Campaign
Anže Mihelič
,
Matej Jevšček
,
Simon Vrhovec
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1458
28-11-2019
Unique: 361 | Total: 652
| Access Period:
1458-1477
HTML
PDF
Research Article
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
K. Shankar
,
Mohamed Elhoseny
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1221
28-10-2019
Unique: 343 | Total: 590
| Access Period:
1221-1239
HTML
PDF
Research Article
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios
Yosra Lakhdhar
,
Slim Rekhis
,
Noureddine Boudriga
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1066
28-09-2019
Unique: 273 | Total: 536
| Access Period:
1066-1088
HTML
PDF
Research Article
An Identity-Based Signcryption on Lattice without Trapdoor
Xianmin Wang
,
Yu Zhang
,
Brij Gupta
,
Hongfei Zhu
,
Dongxi Liu
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0282
28-03-2019
Unique: 276 | Total: 526
| Access Period:
282-293
HTML
PDF
Research Article
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection
Rafał Kozik
,
Michał Choraś
,
Jörg Keller
10.3217/jucs-025-01-0002
28-01-2019
Unique: 299 | Total: 544
| Access Period:
2-15
HTML
PDF
Research Article
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
Nipon Theera-Umpon
,
Kun-Hee Han
,
Woo-Sik Bae
,
Sanghyuk Lee
,
Van Pham
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1258
28-09-2018
Unique: 120 | Total: 160
| Access Period:
1258-1270
HTML
PDF
Research Article
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
Flavio De Mello
,
José A. M. Xexéo
10.3217/jucs-024-01-0025
28-01-2018
Unique: 132 | Total: 187
| Access Period:
25-42
HTML
PDF
1
2
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK