Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
61 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.4.6 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Rewriting-Based Enforcement of Noninterference in Programs with Observable Intermediate Values
Afshin Lamei
,
Mehran Fallah
10.3217/jucs-022-07-0956
01-07-2016
Unique: 461 | Total: 574
| Access Period:
956-991
HTML
XML
PDF
Research Article
On the Analysis and Detection of Mobile Botnet Applications
Ahmad Karim
,
Muhammad Khan
,
Aisha Siddiqa
,
Kim-Kwang Choo
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0567
01-04-2016
Unique: 456 | Total: 568
| Access Period:
567-588
HTML
XML
PDF
Research Article
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves
Omar Alzubi
,
Thomas Chen
,
Jafar Alzubi
,
Hasan Rashaideh
,
Nijad Al-Najdawi
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0552
01-04-2016
Unique: 442 | Total: 589
| Access Period:
552-566
HTML
XML
PDF
Research Article
Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud
Asif Imran
,
Shadi Aljawarneh
,
Kazi Sakib
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0494
01-04-2016
Unique: 489 | Total: 641
| Access Period:
494-520
HTML
XML
PDF
Research Article
A Novel Similar Temporal System Call Pattern Mining for Efficient Intrusion Detection
Vangipuram Radhakrishna
,
Puligadda Kumar
,
Vinjamuri Janaki
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0475
01-04-2016
Unique: 413 | Total: 528
| Access Period:
475-493
HTML
XML
PDF
Research Article
Analysis of Permission-based Security in Android through Policy Expert, Developer, and End User Perspectives
Ajay Jha
,
Woo Lee
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0459
01-04-2016
Unique: 372 | Total: 478
| Access Period:
459-474
HTML
XML
PDF
Research Article
Creativity in Mind: Evaluating and Maintaining Advances in Network Steganographic Research
Steffen Wendzel
,
Carolin Palmer
10.3217/jucs-021-12-1684
01-12-2015
Unique: 510 | Total: 626
| Access Period:
1684-1705
HTML
XML
PDF
Research Article
Restricted Identification Secure in the Extended Canetti-Krawczyk Model
Lucjan Hanzlik
,
Mirosław Kutyłowski
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0419
01-03-2015
Unique: 452 | Total: 569
| Access Period:
419-439
HTML
XML
PDF
Research Article
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence
Junho Choi
,
Chang Choi
,
Ilsun You
,
Pankoo Kim
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0369
01-03-2015
Unique: 525 | Total: 676
| Access Period:
369-383
HTML
XML
PDF
Research Article
Observations of Skipjack-like Structure with SP/SPS Round Function
Ting Cui
,
Chenhui Jin
,
Guoshuang Zhang
Part of: Information Security
10.3217/jucs-019-16-2453
01-10-2013
Unique: 441 | Total: 579
| Access Period:
2453-2471
HTML
XML
PDF
Research Article
Applying Professional Solutions within the Educational Environments by Means of Cloud Computing: Coaching for Teachers
Habib Fardoun
,
Abdulfattah Mashat
,
Sebastián López
10.3217/jucs-019-12-1703
28-06-2013
Unique: 585 | Total: 862
| Access Period:
1703-1717
HTML
XML
PDF
Research Article
Interactive Design System for Schools using Cloud Computing
Habib Fardoun
,
Bassam Zafar
,
Abdulrahman Altalhi
,
Antonio Paules
Part of: Interaction Design in Educational Environments
10.3217/jucs-019-07-0950
01-04-2013
Unique: 539 | Total: 753
| Access Period:
950-964
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK