Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2642)
Editorial
(400)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
26
27
28
29
30
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Testing the Human Backdoor: Organizational Response to a Phishing Campaign
Anže Mihelič
,
Matej Jevšček
,
Simon Vrhovec
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1458
28-11-2019
Unique: 1080 | Total: 1779
| Access Period:
1458-1477
HTML
XML
PDF
Research Article
Cyberattack Response Model for the Nuclear Regulator in Slovenia
Samo Tomažič
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1437
28-11-2019
Unique: 777 | Total: 1278
| Access Period:
1437-1457
HTML
XML
PDF
Research Article
Analysis of the Infection and the Injection Phases of the Telnet Botnets
Tomáš Bajtoš
,
Pavol Sokol
,
Andrej Gajdoš
,
Katarína Lučivjanská
,
Terézia Mézešová
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1417
28-11-2019
Unique: 809 | Total: 1387
| Access Period:
1417-1436
HTML
XML
PDF
Research Article
Detection of Size Modulation Covert Channels Using Countermeasure Variation
Steffen Wendzel
,
Florian Link
,
Daniela Eller
,
Wojciech Mazurczyk
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1396
28-11-2019
Unique: 882 | Total: 1467
| Access Period:
1396-1416
HTML
XML
PDF
Editorial
Cyberattack Detection and Response
Jörg Keller
,
Wojciech Mazurczyk
,
Bela Genge
,
Lothar Fritsch
,
Simon Vrhovec
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11
28-11-2019
Unique: 755 | Total: 1412
| Access Period:
1394-1395
HTML
XML
PDF
Research Article
A Web3.0-based Intelligent Learning System Supporting Education in the 21st Century
Khaled Halimi
,
Hassina Seridi-Bouchelaghem
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1373
28-10-2019
Unique: 1030 | Total: 1759
| Access Period:
1373-1393
HTML
XML
PDF
Research Article
An Intelligent Data Analytics based Model Driven Recommendation System
Bushra Ramzan
,
Imran Bajwa
,
Rafaqut Kazmi
,
Shabana Ramzan
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1353
28-10-2019
Unique: 834 | Total: 1376
| Access Period:
1353-1372
HTML
XML
PDF
Research Article
SENTIPEDE: A Smart System for Sentiment-based Personality Detection from Short Texts
Adi Darliansyah
,
M. Naeem
,
Farhaan Mirza
,
Russel Pears
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1323
28-10-2019
Unique: 891 | Total: 1516
| Access Period:
1323-1352
HTML
XML
PDF
Research Article
Decision-making Model at Higher Educational Institutions based on Machine Learning
Yuri Nieto
,
Vicente García-Díaz
,
Carlos Montenegro
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1301
28-10-2019
Unique: 851 | Total: 1421
| Access Period:
1301-1322
HTML
XML
PDF
Research Article
A Smart Hydroponics-Based System for Child Education
Samet Dinçer
,
Yıltan Bitirim
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1279
28-10-2019
Unique: 1892 | Total: 5620
| Access Period:
1279-1300
HTML
XML
PDF
Research Article
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform
Akhtar Ali
,
Imran Bajwa
,
Rafaqat Kazmi
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1261
28-10-2019
Unique: 786 | Total: 1384
| Access Period:
1261-1278
HTML
XML
PDF
Research Article
Research on Fair Trading Mechanism of Surplus Power Based on Blockchain
Zhuoqun Xia
,
Jingjing Tan
,
Jin Wang
,
Runnong Zhu
,
Hongguang Xiao
,
Arun Sangaiah
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1240
28-10-2019
Unique: 832 | Total: 1375
| Access Period:
1240-1260
HTML
XML
PDF
26
27
28
29
30
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK