Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2712)
Editorial
(413)
by Journal
by Funding Agency
Clear filters
Powered by
16 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: L.4.0 - Security and Trust
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
A Novel Data-Driven Attack Method on Machine Learning Models
Emre Sadıkoğlu
,
İrfan Kösesoy
,
Murat Gök
10.3897/jucs.108445
28-03-2024
Unique: 1151 | Total: 1697
| Access Period:
402-417
HTML
PDF
Research Article
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
Tien Quang Dam
,
Nghia Thinh Nguyen
,
Trung Viet Le
,
Tran Duc Le
,
Sylvestre Uwizeyemungu
,
Thang Le-Dinh
10.3897/jucs.104901
28-02-2024
Unique: 1745 | Total: 2471
| Access Period:
262-286
HTML
PDF
Research Article
A new lightweight decentralized mitigation solution against Version Number Attacks for IoT Networks
Mehdi Rouissat
,
Mohammed Belkheir
,
Hicham Sid Ahmed Belkhira
,
Sofiane Boukli Hacene
,
Pascal Lorenz
,
Merahi Bouziani
10.3897/jucs.85506
28-02-2023
Unique: 1853 | Total: 2801
| Access Period:
118-151
HTML
XML
PDF
Research Article
Disassemble Byte Sequence Using Graph Attention Network
Jing Qiu
,
Feng Dong
,
Guanglu Sun
10.3897/jucs.76528
28-07-2022
Unique: 1663 | Total: 2822
| Access Period:
758-775
HTML
XML
PDF
Research Article
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms
Mohamed Talha
,
Anas Abou El Kalam
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence II
10.3897/jucs.77046
28-12-2021
Unique: 1838 | Total: 3094
| Access Period:
1300-1324
HTML
XML
PDF
Research Article
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity
Simon Vrhovec
,
Damjan Fujs
,
Luka Jelovčan
,
Anže Mihelič
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.045
28-07-2020
Unique: 1369 | Total: 2302
| Access Period:
827-853
HTML
XML
PDF
Research Article
Testing the Human Backdoor: Organizational Response to a Phishing Campaign
Anže Mihelič
,
Matej Jevšček
,
Simon Vrhovec
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1458
28-11-2019
Unique: 1461 | Total: 2355
| Access Period:
1458-1477
HTML
XML
PDF
Research Article
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
K. Shankar
,
Mohamed Elhoseny
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1221
28-10-2019
Unique: 1222 | Total: 1958
| Access Period:
1221-1239
HTML
XML
PDF
Research Article
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios
Yosra Lakhdhar
,
Slim Rekhis
,
Noureddine Boudriga
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1066
28-09-2019
Unique: 1117 | Total: 1902
| Access Period:
1066-1088
HTML
XML
PDF
Research Article
An Identity-Based Signcryption on Lattice without Trapdoor
Xianmin Wang
,
Yu Zhang
,
Brij Gupta
,
Hongfei Zhu
,
Dongxi Liu
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0282
28-03-2019
Unique: 1087 | Total: 1816
| Access Period:
282-293
HTML
XML
PDF
Research Article
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection
Rafał Kozik
,
Michał Choraś
,
Jörg Keller
10.3217/jucs-025-01-0002
28-01-2019
Unique: 1342 | Total: 2158
| Access Period:
2-15
HTML
XML
PDF
Research Article
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
Nipon Theera-Umpon
,
Kun-Hee Han
,
Woo-Sik Bae
,
Sanghyuk Lee
,
Van Pham
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1258
28-09-2018
Unique: 880 | Total: 1226
| Access Period:
1258-1270
HTML
XML
PDF
1
2
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK