Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
91
92
93
94
95
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
P Systems with Shuffle Operation and Catalytic-Like Rules
Yunyun Niu
,
Jinbang Xu
,
K. G. Subramanian
,
Rosni Abdullah
Part of: Recent Advances in Bio-Inspired Computing: Theory and Applications
10.3217/jucs-018-13-1782
01-07-2012
Unique: 497 | Total: 675
| Access Period:
1782-1801
HTML
XML
PDF
Research Article
A Variant of Distributed P Systems for Real Time Cross Layer Optimization
Susan Elias
,
Vanaja Gokul
,
Kamala Krithivasan
,
Marian Gheorghe
,
Gexiang Zhang
Part of: Recent Advances in Bio-Inspired Computing: Theory and Applications
10.3217/jucs-018-13-1760
01-07-2012
Unique: 599 | Total: 744
| Access Period:
1760-1781
HTML
XML
PDF
Editorial
Recent Advances in Bio-Inspired Computing: Theory and Applications
Atulya Nagar
,
T. Robinson
Part of: Recent Advances in Bio-Inspired Computing: Theory and Applications
10.3217/jucs-018-13
01-07-2012
Unique: 384 | Total: 504
| Access Period:
1757-1759
HTML
XML
PDF
Research Article
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
Lin Ding
,
Jie Guan
,
Wen-long Sun
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1741
28-06-2012
Unique: 555 | Total: 685
| Access Period:
1741-1756
HTML
XML
PDF
Research Article
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks
Sipho Ngobeni
,
Hein Venter
,
Ivan Burke
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1721
28-06-2012
Unique: 484 | Total: 627
| Access Period:
1721-1740
HTML
XML
PDF
Research Article
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management
Ismael Caballero
,
Luis Sánchez
,
Alberto Freitas
,
Eduardo Fernández-Medina
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1703
28-06-2012
Unique: 487 | Total: 632
| Access Period:
1703-1720
HTML
XML
PDF
Research Article
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study
Reijo Savola
,
Christian Frühwirth
,
Ari Pietikäinen
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1679
28-06-2012
Unique: 667 | Total: 897
| Access Period:
1679-1702
HTML
XML
PDF
Research Article
Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study
Thijs Baars
,
Marco Spruit
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1662
28-06-2012
Unique: 470 | Total: 608
| Access Period:
1662-1678
HTML
XML
PDF
Research Article
A Novel Identity-based Network Architecture for Next Generation Internet
Pedro Martinez-Julia
,
Antonio Skarmeta
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1643
28-06-2012
Unique: 549 | Total: 758
| Access Period:
1643-1661
HTML
XML
PDF
Research Article
Information Security Service Culture - Information Security for End-users
Rahul Rastogi
,
Rossouw Solms
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1628
28-06-2012
Unique: 508 | Total: 619
| Access Period:
1628-1642
HTML
XML
PDF
Research Article
Aligning Security and Privacy to Support the Development of Secure Information Systems
Haralambos Mouratidis
,
Christos Kalloniatis
,
Shareeful Islam
,
Marc-Philippe Huget
,
Stefanos Gritzalis
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1608
28-06-2012
Unique: 548 | Total: 743
| Access Period:
1608-1627
HTML
XML
PDF
Editorial
An Overview of Current Information Systems Security Challenges and Innovations
Daniel Mellado
,
David G. Rosado
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12
28-06-2012
Unique: 439 | Total: 572
| Access Period:
1598-1607
HTML
XML
PDF
91
92
93
94
95
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK