Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
93 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.4 - OPERATING SYSTEMS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
UP-Home: A Self-Adaptive Solution for Smart Home Security
Josival Silva
,
Nelson Rosa
,
Fernando Aires
10.3897/jucs.107050
28-04-2024
Unique: 18 | Total: 19
| Access Period:
502-530
HTML
XML
PDF
Research Article
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
Tien Quang Dam
,
Nghia Thinh Nguyen
,
Trung Viet Le
,
Tran Duc Le
,
Sylvestre Uwizeyemungu
,
Thang Le-Dinh
10.3897/jucs.104901
28-02-2024
Unique: 480 | Total: 697
| Access Period:
262-286
HTML
XML
PDF
Research Article
diffReplication - An Energy-Aware Fault Tolerance Model for Silent Error Detection and Mitigation in Heterogeneous Extreme-scale Computing Environment
Longhao Li
,
Taieb Znati
,
Rami Melhem
10.3897/jucs.94462
28-08-2023
Unique: 554 | Total: 759
| Access Period:
892-910
HTML
XML
PDF
Research Article
Cost-Effective Scheduling in Fog Computing: An Environment Based on Modified PROMETHEE Technique
Shefali Varshney
,
Rajinder Sandhu
,
P. K. Gupta
10.3897/jucs.90429
28-04-2023
Unique: 884 | Total: 1255
| Access Period:
397-416
HTML
XML
PDF
Research Article
Cybersecurity Verification and Validation Testing in Automotive
Damjan Ekert
,
Jürgen Dobaj
,
Alen Salamun
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71833
28-08-2021
Unique: 1940 | Total: 3351
| Access Period:
850-867
HTML
XML
PDF
Research Article
Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study
Jürgen Dobaj
,
Damjan Ekert
,
Jakub Stolfa
,
Svatopluk Stolfa
,
Georg Macher
,
Richard Messnarz
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72367
28-08-2021
Unique: 2073 | Total: 3734
| Access Period:
830-849
HTML
XML
PDF
Editorial
Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
Richard Messnarz
,
Ricardo Colomo-Palacios
,
Georg Macher
,
Andreas Riel
,
Miklos Biro
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72072
28-08-2021
Unique: 1498 | Total: 2601
| Access Period:
793-795
HTML
XML
PDF
Editorial
Mobile, Open and Social Language Learning Designs and Architectures
Agnes Kukulska-Hulme
,
Jorge Arus-Hota
,
Jesus Garcia Laborda
Part of: Mobile, Open and Social Language Learning Designs and Architectures
10.3897/jucs.68852
28-05-2021
Unique: 1621 | Total: 2976
| Access Period:
413-424
HTML
XML
PDF
Research Article
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection
Łukasz Apiecionek
,
Matusz Biedziak
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.076
28-11-2020
Unique: 697 | Total: 1186
| Access Period:
1435-1454
HTML
XML
PDF
Research Article
Utilizing Debugging Information of Applications in Memory Forensics
Mohammed Al-Saleh
,
Ethar Qawasmeh
,
Ziad Al-Sharif
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.044
28-07-2020
Unique: 674 | Total: 1273
| Access Period:
805-826
HTML
XML
PDF
Research Article
Scalable Distributed Metadata Server Based on Nonblocking Transactions
Kohei Hiraga
,
Osamu Tatebe
,
Hideyuki Kawashima
Part of: Recent Advances in Social Network Analysis, Management and Security
10.3897/jucs.2020.006
28-01-2020
Unique: 871 | Total: 2297
| Access Period:
89-106
HTML
XML
PDF
Research Article
Analysis of the Infection and the Injection Phases of the Telnet Botnets
Tomáš Bajtoš
,
Pavol Sokol
,
Andrej Gajdoš
,
Katarína Lučivjanská
,
Terézia Mézešová
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1417
28-11-2019
Unique: 764 | Total: 1312
| Access Period:
1417-1436
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK