Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
96
97
98
99
100
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Adaptive Group Key Management Protocol for Wireless Communications
Saïd Gharout
,
Abdelmadjid Bouabdallah
,
Yacine Challal
,
Mohammed Achemlal
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0874
28-03-2012
Unique: 520 | Total: 660
| Access Period:
874-898
HTML
XML
PDF
Research Article
Countermeasures to Prevent Misbehaviour in VANETs
Jezabel Molina-Gil
,
Pino Caballero-Gil
,
Cándido Caballero-Gil
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0857
28-03-2012
Unique: 589 | Total: 763
| Access Period:
857-873
HTML
XML
PDF
Research Article
A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks
Carla-Lee Botha
,
Elmarie Kritzinger
,
Marianne Loock
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0845
28-03-2012
Unique: 488 | Total: 639
| Access Period:
845-856
HTML
XML
PDF
Research Article
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management
Raimundas Matulevičius
,
Haralambos Mouratidis
,
Nicolas Mayer
,
Eric Dubois
,
Patrick Heymans
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0816
28-03-2012
Unique: 547 | Total: 713
| Access Period:
816-844
HTML
XML
PDF
Research Article
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment
Oscar Rebollo
,
Daniel Mellado
,
Eduardo Fernández-Medina
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0798
28-03-2012
Unique: 655 | Total: 880
| Access Period:
798-815
HTML
XML
PDF
Research Article
Qos-Security Metrics Based on ITIL and COBIT Standard for Measurement Web Services
Pattama Charuenporn
,
Sarun Intakosum
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0775
28-03-2012
Unique: 645 | Total: 838
| Access Period:
775-797
HTML
XML
PDF
Research Article
Combating Mobile Spam through Botnet Detection using Artificial Immune Systems
Ickin Vural
,
Hein Venter
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0750
28-03-2012
Unique: 548 | Total: 674
| Access Period:
750-774
HTML
XML
PDF
Research Article
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations
Hannes Holm
,
Teodor Sommestad
,
Ulrik Franke
,
Mathias Ekstedt
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0732
28-03-2012
Unique: 613 | Total: 844
| Access Period:
732-749
HTML
XML
PDF
Research Article
Applying a Modular Framework to Develop Mobile Applications and Services
Mabel Vazquez-Briseno
,
Pierre Vincent
,
Juan Nieto-Hipolito
,
Juan Sanchez-Lopez
10.3217/jucs-018-05-0704
01-03-2012
Unique: 573 | Total: 716
| Access Period:
704-727
HTML
XML
PDF
Research Article
Modeling and Performance Evaluation of a Contract-based Electronic Signature Process
Ahmed Nait-Sidi-Moh
,
Mohamed Bakhouya
,
Wafaa Ait-Cheik-Bihi
,
Jaafar Gaber
10.3217/jucs-018-05-0676
01-03-2012
Unique: 617 | Total: 814
| Access Period:
676-703
HTML
XML
PDF
Research Article
Wikipedia-Based Semantic Interpreter Using Approximate Top-k Processing and Its Application
Jong Kim
,
Ashwin Kashyap
,
Sandilya Bhamidipati
10.3217/jucs-018-05-0650
01-03-2012
Unique: 518 | Total: 663
| Access Period:
650-675
HTML
XML
PDF
Research Article
Improving the Extraction of Text in PDFs by Simulating the Human Reading Order
Ismael Hasan
,
Javier Parapar
,
Álvaro Barreiro
10.3217/jucs-018-05-0623
01-03-2012
Unique: 617 | Total: 803
| Access Period:
623-649
HTML
XML
PDF
96
97
98
99
100
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK