Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2765)
Editorial
(423)
by Journal
by Funding Agency
Clear filters
Powered by
34 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: L.4 - SECURITY/TRUST
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
SNAP Framework: Linked Prediction Based Anomaly Prevention With Suspicious Nodes on Social Network Graph
Vahide Nida Kılıç
,
Esra Saraç Eşsiz
10.3897/jucs.152114
28-11-2025
Unique: 604 | Total: 786
Access Period: 0
0
1538-1563
HTML
PDF
Research Article
DeepV-Net: A Deep Learning Technique for Multimodal Biometric Authentication Using EEG Signals and Handwritten Signatures
Ashish Ranjan Mishra
,
Rakesh Kumar
,
Rajkumar Saini
10.3897/jucs.150681
28-09-2025
Unique: 872 | Total: 1192
Access Period: 0
0
1196-1221
HTML
PDF
Research Article
Refining Ethical Reflections in Cybersecurity Policy and Privacy: Insights for Policy Makers
Ryma Abassi
10.3897/jucs.125999
28-05-2025
Unique: 1734 | Total: 2383
Access Period: 0
0
572-602
HTML
PDF
Research Article
Privacy and security challenges of the digital twin: systematic literature review
Marija Kuštelega
,
Renata Mekovec
,
Ahmed Shareef
10.3897/jucs.114607
28-12-2024
Unique: 3230 | Total: 5221
Access Period: 0
0
1782-1806
HTML
PDF
Research Article
Certificateless Aggregate Signatures: A Comprehensive Survey and Comparative Analysis
Rupesh Kumar Verma
,
A. J. Khan
,
Sunil Kashyap
,
Manoj Kumar Chande
10.3897/jucs.116249
28-11-2024
Unique: 1224 | Total: 1627
Access Period: 0
0
1662-1690
HTML
PDF
Research Article
Exploiting TTPs to Design an Extensible and Explainable Malware Detection System
Yashovardhan Sharma
,
Simon Birnbach
,
Ivan Martinovic
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131753
14-09-2024
Unique: 1305 | Total: 1718
Access Period: 0
0
1140-1162
HTML
PDF
Research Article
A Novel Data-Driven Attack Method on Machine Learning Models
Emre Sadıkoğlu
,
İrfan Kösesoy
,
Murat Gök
10.3897/jucs.108445
28-03-2024
Unique: 1473 | Total: 2146
Access Period: 0
0
402-417
HTML
PDF
Research Article
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
Tien Quang Dam
,
Nghia Thinh Nguyen
,
Trung Viet Le
,
Tran Duc Le
,
Sylvestre Uwizeyemungu
,
Thang Le-Dinh
10.3897/jucs.104901
28-02-2024
Unique: 2354 | Total: 3267
Access Period: 0
0
262-286
HTML
PDF
Research Article
A new lightweight decentralized mitigation solution against Version Number Attacks for IoT Networks
Mehdi Rouissat
,
Mohammed Belkheir
,
Hicham Sid Ahmed Belkhira
,
Sofiane Boukli Hacene
,
Pascal Lorenz
,
Merahi Bouziani
10.3897/jucs.85506
28-02-2023
Unique: 2284 | Total: 3362
Access Period: 0
0
118-151
HTML
XML
PDF
Research Article
Disassemble Byte Sequence Using Graph Attention Network
Jing Qiu
,
Feng Dong
,
Guanglu Sun
10.3897/jucs.76528
28-07-2022
Unique: 2098 | Total: 3476
Access Period: 0
0
758-775
HTML
XML
PDF
Research Article
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms
Mohamed Talha
,
Anas Abou El Kalam
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence II
10.3897/jucs.77046
28-12-2021
Unique: 2283 | Total: 3741
Access Period: 0
0
1300-1324
HTML
XML
PDF
Research Article
Spam Detection Based on Feature Evolution to Deal with Concept Drift
Marcia Henke
,
Eulanda Santos
,
Eduardo Souto
,
Altair O Santin
10.3897/jucs.66284
28-04-2021
Unique: 2740 | Total: 4972
Access Period: 0
0
364-386
HTML
XML
PDF
1
2
3
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK