Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
632 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic D - Software
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
11
12
13
14
15
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves
Omar Alzubi
,
Thomas Chen
,
Jafar Alzubi
,
Hasan Rashaideh
,
Nijad Al-Najdawi
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0552
01-04-2016
Unique: 453 | Total: 601
| Access Period:
552-566
HTML
XML
PDF
Research Article
An Empirical Investigation of Security Vulnerabilities within Web Applications
Ibrahim Abunadi
,
Mamdouh Alenezi
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0537
01-04-2016
Unique: 487 | Total: 623
| Access Period:
537-551
HTML
XML
PDF
Research Article
Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud
Asif Imran
,
Shadi Aljawarneh
,
Kazi Sakib
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0494
01-04-2016
Unique: 495 | Total: 647
| Access Period:
494-520
HTML
XML
PDF
Research Article
A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection
Vangipuram Radhakrishna
,
Puligadda Kumar
,
Vinjamuri Janaki
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0475
01-04-2016
Unique: 422 | Total: 537
| Access Period:
475-493
HTML
XML
PDF
Research Article
Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives
Ajay Jha
,
Woo Lee
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0459
01-04-2016
Unique: 380 | Total: 487
| Access Period:
459-474
HTML
XML
PDF
Research Article
A Bot Spooler Architecture to Integrate Virtual Worlds with E-learning Management Systems for Corporate Training
Leonel Morgado
,
Hugo Paredes
,
Benjamim Fonseca
,
Paulo Martins
,
Alvaro Almeida
,
Andreas Vilela
,
Filipe Peixinho
,
Arnaldo Santos
10.3217/jucs-022-02-0271
01-01-2016
Unique: 583 | Total: 765
| Access Period:
271-297
HTML
XML
PDF
Research Article
Analyzing Communication Dimensions in a Ubiquitous Learning Environment
Dilek Karahoca
,
Adem Karahoca
,
Ayça Kurnaz
Part of: Future Trends in Computing Technology in Education
10.3217/jucs-022-01-0124
01-01-2016
Unique: 472 | Total: 634
| Access Period:
124-145
HTML
XML
PDF
Research Article
An Interactive Design Pattern Selection Method
Nadia Bouassida
,
Salma Jamoussi
,
Ahmed Msaed
,
Hanêne Ben-Abdallah
Part of: Information Retrieval and Recommender Systems
10.3217/jucs-021-13-1746
28-12-2015
Unique: 534 | Total: 716
| Access Period:
1746-1766
HTML
XML
PDF
Research Article
Cross-Language Source Code Re-Use Detection Using Latent Semantic Analysis
Enrique Flores
,
Alberto Barrón-Cedeño
,
Lidia Moreno
,
Paolo Rosso
Part of: Information Retrieval and Recommender Systems
10.3217/jucs-021-13-1708
28-12-2015
Unique: 554 | Total: 745
| Access Period:
1708-1725
HTML
XML
PDF
Research Article
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
Steffen Wendzel
,
Carolin Palmer
10.3217/jucs-021-12-1684
01-12-2015
Unique: 517 | Total: 634
| Access Period:
1684-1705
HTML
XML
PDF
Research Article
DWCMM: The Data Warehouse Capability Maturity Model
Marco Spruit
,
Catalina Sacu
Part of: Enabling Technologies and Business Infrastructures for Next Generation Social Media:Big Data, Cloud Computing, Internet of Things and Virtual Reality
10.3217/jucs-021-11-1508
01-11-2015
Unique: 560 | Total: 752
| Access Period:
1508-1534
HTML
XML
PDF
Research Article
PSO-Based Feature Selection for Arabic Text Summarization
Ahmed Al-Zahrani
,
Hassan Mathkour
,
Hassan Abdalla
Part of: Enabling Technologies and Business Infrastructures for Next Generation Social Media:Big Data, Cloud Computing, Internet of Things and Virtual Reality
10.3217/jucs-021-11-1454
01-11-2015
Unique: 510 | Total: 679
| Access Period:
1454-1469
HTML
XML
PDF
11
12
13
14
15
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK