Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
41
42
43
44
45
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Editorial
Computational Intelligence Technologies Meet Medical Informatics - From Prediction to Prognosis
Chi-Chang Chang
,
Chi-Jie Lu
,
Chalong Cheewakriangkrai
,
Su-Hsin Chang
Part of: Computational Intelligence Technologies Meet Medical Informatics - From Prediction to Prognosis
10.3217/jucs-024-06
28-06-2018
Unique: 438 | Total: 548
| Access Period:
662-664
HTML
XML
PDF
Research Article
Obligation to Defend the Critical Infrastructure? Offensive Cybersecurity Measures
Anže Mihelič
,
Simon Vrhovec
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0646
28-05-2018
Unique: 569 | Total: 778
| Access Period:
646-661
HTML
XML
PDF
Research Article
Relating Mobile Device Use and Adherence to Information Security Policy with Data Breach Consequences in Hospitals
Simon Vrhovec
,
Blaž Markelj
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0634
28-05-2018
Unique: 595 | Total: 829
| Access Period:
634-645
HTML
XML
PDF
Research Article
Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity
Barbara Bobowska
,
Michał Choraś
,
Michał Woźniak
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0622
28-05-2018
Unique: 562 | Total: 777
| Access Period:
622-633
HTML
XML
PDF
Research Article
Efficient Privacy-Preserving Remote Data Possession Checking Protocol for Critical Information Infrastructure
Loganathan Yamunadevi
,
Kaliannan Thilagavathy
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0603
28-05-2018
Unique: 451 | Total: 571
| Access Period:
603-621
HTML
XML
PDF
Research Article
Design of Cognitive Fog Computing for Autonomic Security System in Critical Infrastructure
S. Prabavathy
,
K. Sundarakantham
,
S. Mercy Shalinie
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0577
28-05-2018
Unique: 860 | Total: 1105
| Access Period:
577-602
HTML
XML
PDF
Research Article
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms
Ralf Keidel
,
Steffen Wendzel
,
Sebastian Zillien
,
Eric Conner
,
Georg Haas
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0556
28-05-2018
Unique: 715 | Total: 915
| Access Period:
556-576
HTML
XML
PDF
Editorial
Technical and Social Aspects of Critical Infrastructure Security
Jörg Keller
,
Igor Bernik
,
Wojciech Mazurczyk
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05
28-05-2018
Unique: 466 | Total: 608
| Access Period:
554-555
HTML
XML
PDF
Research Article
Design of Computational Intelligence-based Language Interface for Human-Machine Secure Interaction
Marcin Woźniak
,
Dawid Połap
,
Robertas Damaševičius
,
Wei Wei
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0537
28-04-2018
Unique: 559 | Total: 769
| Access Period:
537-553
HTML
XML
PDF
Research Article
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems
Xiang Wang
,
Weike Wang
,
Bin Xu
,
Pei Du
,
Lin Li
,
Muyang Liu
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0515
28-04-2018
Unique: 502 | Total: 696
| Access Period:
515-536
HTML
XML
PDF
Research Article
Parallel Fast Sort Algorithm for Secure Multiparty Computation
Zbigniew Marszałek
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0488
28-04-2018
Unique: 560 | Total: 775
| Access Period:
488-514
HTML
XML
PDF
Research Article
Real Time Path Finding for Assisted Living Using Deep Learning
Ugnius Malūkas
,
Rytis Maskeliūnas
,
Robertas Damaševičius
,
Marcin Woźniak
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0475
28-04-2018
Unique: 654 | Total: 867
| Access Period:
475-487
HTML
XML
PDF
41
42
43
44
45
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK