Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
92 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.4 - OPERATING SYSTEMS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
K. Shankar
,
Mohamed Elhoseny
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1221
28-10-2019
Unique: 817 | Total: 1369
| Access Period:
1221-1239
HTML
XML
PDF
Research Article
Digital Investigation of IoT Devices in the Criminal Scene
François Bouchaud
,
Gilles Grimaud
,
Thomas Vantroys
,
Pierrick Buret
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1199
28-09-2019
Unique: 1194 | Total: 1982
| Access Period:
1199-1218
HTML
XML
PDF
Research Article
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images
Mingying Huang
,
Ming Xu
,
Tong Qiao
,
Ting Wu
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1151
28-09-2019
Unique: 691 | Total: 1236
| Access Period:
1151-1173
HTML
XML
PDF
Research Article
Precise Performance Characterization of Antivirus on the File System Operations
Mohammed Al-Saleh
,
Hanan Hamdan
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1089
28-09-2019
Unique: 735 | Total: 1362
| Access Period:
1089-1108
HTML
XML
PDF
Research Article
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study
Łukasz Apiecionek
,
Marcel Großmann
,
Udo Krieger
Part of: Recent Advances, Emerging Methods and Applications of Pattern Recognition
10.3217/jucs-025-06-0571
28-06-2019
Unique: 762 | Total: 1356
| Access Period:
571-590
HTML
XML
PDF
Research Article
Scheduling Mandatory-Optional Real-Time Tasks in Homogeneous Multi-Core Systems with Energy Constraints Using Bio-Inspired Meta-Heuristics
Matias Micheletto
,
Rodrigo Santos
,
Javier Orozco
10.3217/jucs-025-04-0390
28-04-2019
Unique: 641 | Total: 1214
| Access Period:
390-417
HTML
XML
PDF
Research Article
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
Bagus Santoso
,
Chunhua Su
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0294
28-03-2019
Unique: 714 | Total: 1294
| Access Period:
294-308
HTML
XML
PDF
Research Article
CCA-Secure Deterministic Identity-Based Encryption Scheme
Meijuan Huang
,
Bo Yang
,
Yi Zhao
,
Kaitai Liang
,
Liang Xue
,
Xiaoyi Yang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0245
28-03-2019
Unique: 777 | Total: 1409
| Access Period:
245-269
HTML
XML
PDF
Research Article
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
Yi-Fan Tseng
,
Chun-I Fan
,
Chih-Wen Lin
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0182
28-03-2019
Unique: 658 | Total: 1191
| Access Period:
182-202
HTML
XML
PDF
Research Article
Methods for Information Hiding in Open Social Networks
Jędrzej Bieniasz
,
Krzysztof Szczypiorski
10.3217/jucs-025-02-0074
28-02-2019
Unique: 689 | Total: 1225
| Access Period:
74-97
HTML
XML
PDF
Research Article
A Logistic Fault-Dependent Detection Software Reliability Model
Hoang Pham
Part of: Quality and Reliability Engineering: Trends and Future Directions
10.3217/jucs-024-12-1717
28-12-2018
Unique: 527 | Total: 673
| Access Period:
1717-1730
HTML
XML
PDF
Research Article
SOMSteg - Framework for Covert Channel, and its Detection, within HTTP
Waldemar Graniszewski
,
Jacek Krupski
,
Krzysztof Szczypiorski
10.3217/jucs-024-07-0864
28-07-2018
Unique: 611 | Total: 812
| Access Period:
864-891
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK