Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2642)
Editorial
(400)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
31
32
33
34
35
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
K. Shankar
,
Mohamed Elhoseny
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1221
28-10-2019
Unique: 858 | Total: 1437
| Access Period:
1221-1239
HTML
XML
PDF
Editorial
Intelligent Computing for Society
Imran Bajwa
,
Fairouz Kamareddine
,
Pamini Thangarajah
Part of: Intelligent Computing for Society
10.3217/jucs-025-10
28-10-2019
Unique: 646 | Total: 1096
| Access Period:
1219-1220
HTML
XML
PDF
Research Article
Digital Investigation of IoT Devices in the Criminal Scene
François Bouchaud
,
Gilles Grimaud
,
Thomas Vantroys
,
Pierrick Buret
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1199
28-09-2019
Unique: 1245 | Total: 2068
| Access Period:
1199-1218
HTML
XML
PDF
Research Article
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach
Ziad Al-Sharif
,
Mohammed Al-Saleh
,
Yaser Jararweh
,
Ahmed Shatnawi
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1174
28-09-2019
Unique: 791 | Total: 1339
| Access Period:
1174-1198
HTML
XML
PDF
Research Article
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images
Mingying Huang
,
Ming Xu
,
Tong Qiao
,
Ting Wu
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1151
28-09-2019
Unique: 720 | Total: 1293
| Access Period:
1151-1173
HTML
XML
PDF
Research Article
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
Hui Tian
,
Meilun Huang
,
Chin-Chen Chang
,
Yongfeng Huang
,
Jing Lu
,
Yongqian Du
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1131
28-09-2019
Unique: 758 | Total: 1281
| Access Period:
1131-1150
HTML
XML
PDF
Research Article
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
Jędrzej Bieniasz
,
Monika Stępkowska
,
Artur Janicki
,
Krzysztof Szczypiorski
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1109
28-09-2019
Unique: 782 | Total: 1347
| Access Period:
1109-1130
HTML
XML
PDF
Research Article
Precise Performance Characterization of Antivirus on the File System Operations
Mohammed Al-Saleh
,
Hanan Hamdan
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1089
28-09-2019
Unique: 769 | Total: 1438
| Access Period:
1089-1108
HTML
XML
PDF
Research Article
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios
Yosra Lakhdhar
,
Slim Rekhis
,
Noureddine Boudriga
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1066
28-09-2019
Unique: 774 | Total: 1405
| Access Period:
1066-1088
HTML
XML
PDF
Research Article
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
Andrey Fedorchenko
,
Elena Doynikova
,
Igor Kotenko
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1043
28-09-2019
Unique: 814 | Total: 1379
| Access Period:
1043-1065
HTML
XML
PDF
Editorial
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
Artur Janicki
,
Wojciech Mazurczyk
,
Xiangyang Luo
,
Dengpan Ye
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09
28-09-2019
Unique: 667 | Total: 1185
| Access Period:
1039-1042
HTML
XML
PDF
Research Article
A Model for Resource Management in Smart Cities Based on Crowdsourcing and Gamification
Rodrigo Barbosa Sounited States Of America Orrego
,
Jorge Luis Victória Barbosa
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-1018
28-08-2019
Unique: 943 | Total: 1578
| Access Period:
1018-1038
HTML
XML
PDF
31
32
33
34
35
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK