Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
50 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: C.2.0 - General
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Multilevel Steganography: Improving Hidden Communication in Networks
Wojciech Frączek
,
Wojciech Mazurczyk
,
Krzysztof Szczypiorski
10.3217/jucs-018-14-1967
28-07-2012
Unique: 495 | Total: 711
| Access Period:
1967-1986
HTML
XML
PDF
Research Article
Adaptive Group Key Management Protocol for Wireless Communications
Saïd Gharout
,
Abdelmadjid Bouabdallah
,
Yacine Challal
,
Mohammed Achemlal
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0874
28-03-2012
Unique: 474 | Total: 592
| Access Period:
874-898
HTML
XML
PDF
Research Article
Countermeasures to Prevent Misbehaviour in VANETs
Jezabel Molina-Gil
,
Pino Caballero-Gil
,
Cándido Caballero-Gil
Part of: Security in Information Systems: New Challenges and Opportunities
10.3217/jucs-018-06-0857
28-03-2012
Unique: 538 | Total: 699
| Access Period:
857-873
HTML
XML
PDF
Research Article
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
Khaled Salah
,
Mojeeb-Al-Rhman Al-Khiaty
,
Rashad Ahmed
,
Adnan Mahdi
10.3217/jucs-017-11-1605
01-07-2011
Unique: 385 | Total: 497
| Access Period:
1605-1622
HTML
XML
PDF
Research Article
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP
Khaled Salah
,
Mohamed Hamawi
10.3217/jucs-016-21-3299
01-12-2010
Unique: 399 | Total: 489
| Access Period:
3299-3313
HTML
XML
PDF
Research Article
Classifying and Tracking Free Riders in Multimedia-Based Systems
Farag Azzedin
10.3217/jucs-016-10-1368
28-05-2010
Unique: 317 | Total: 362
| Access Period:
1368-1387
HTML
XML
PDF
Research Article
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
Lei Shu
,
Manfred Hauswirth
,
Yan Zhang
,
Jianhua Ma
,
Geyong Min
,
Yu Wang
10.3217/jucs-016-10-1343
28-05-2010
Unique: 356 | Total: 441
| Access Period:
1343-1367
HTML
XML
PDF
Research Article
Position-based Routing Protocol for Low Power Wireless Sensor Networks
Sajjad Madani
,
Daniel Weber
,
Stefan Mahlknecht
10.3217/jucs-016-09-1215
01-05-2010
Unique: 364 | Total: 428
| Access Period:
1215-1233
HTML
XML
PDF
Research Article
A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme
Junzhou Luo
,
Xiaogang Wang
,
Ming Yang
10.3217/jucs-015-09-1797
01-05-2009
Unique: 390 | Total: 478
| Access Period:
1797-1811
HTML
XML
PDF
Research Article
Light-Weight Key Exchange with Different Passwords in the Standard Model
Jeong Kwon
,
Ik Jeong
,
Dong Lee
10.3217/jucs-015-05-1042
01-03-2009
Unique: 318 | Total: 375
| Access Period:
1042-1064
HTML
XML
PDF
Research Article
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols
Peter Pecho
,
Frantisek Jr.
,
Martin Drahansky
,
Petr Hanacek
10.3217/jucs-015-05-0992
01-03-2009
Unique: 327 | Total: 381
| Access Period:
992-1006
HTML
XML
PDF
Research Article
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
Chin-Ling Chen
10.3217/jucs-015-02-0488
28-01-2009
Unique: 289 | Total: 347
| Access Period:
488-504
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK