Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2765)
Editorial
(423)
by Journal
by Funding Agency
Clear filters
Powered by
68 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.4.6 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Utilizing Debugging Information of Applications in Memory Forensics
Mohammed Al-Saleh
,
Ethar Qawasmeh
,
Ziad Al-Sharif
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.044
28-07-2020
Unique: 1496 | Total: 2482
Access Period: 0
0
805-826
HTML
XML
PDF
Research Article
Analysis of the Infection and the Injection Phases of the Telnet Botnets
Tomáš Bajtoš
,
Pavol Sokol
,
Andrej Gajdoš
,
Katarína Lučivjanská
,
Terézia Mézešová
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1417
28-11-2019
Unique: 1539 | Total: 2371
Access Period: 0
0
1417-1436
HTML
XML
PDF
Research Article
Detection of Size Modulation Covert Channels Using Countermeasure Variation
Steffen Wendzel
,
Florian Link
,
Daniela Eller
,
Wojciech Mazurczyk
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1396
28-11-2019
Unique: 1589 | Total: 2486
Access Period: 0
0
1396-1416
HTML
XML
PDF
Research Article
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
K. Shankar
,
Mohamed Elhoseny
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1221
28-10-2019
Unique: 1566 | Total: 2456
Access Period: 0
0
1221-1239
HTML
XML
PDF
Research Article
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images
Mingying Huang
,
Ming Xu
,
Tong Qiao
,
Ting Wu
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1151
28-09-2019
Unique: 1251 | Total: 2115
Access Period: 0
0
1151-1173
HTML
XML
PDF
Research Article
Precise Performance Characterization of Antivirus on the File System Operations
Mohammed Al-Saleh
,
Hanan Hamdan
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1089
28-09-2019
Unique: 1468 | Total: 2419
Access Period: 0
0
1089-1108
HTML
XML
PDF
Research Article
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study
Łukasz Apiecionek
,
Marcel Großmann
,
Udo Krieger
Part of: Recent Advances, Emerging Methods and Applications of Pattern Recognition
10.3217/jucs-025-06-0571
28-06-2019
Unique: 1583 | Total: 2441
Access Period: 0
0
571-590
HTML
XML
PDF
Research Article
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
Bagus Santoso
,
Chunhua Su
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0294
28-03-2019
Unique: 1355 | Total: 2254
Access Period: 0
0
294-308
HTML
XML
PDF
Research Article
CCA-Secure Deterministic Identity-Based Encryption Scheme
Meijuan Huang
,
Bo Yang
,
Yi Zhao
,
Kaitai Liang
,
Liang Xue
,
Xiaoyi Yang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0245
28-03-2019
Unique: 1429 | Total: 2383
Access Period: 0
0
245-269
HTML
XML
PDF
Research Article
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
Yi-Fan Tseng
,
Chun-I Fan
,
Chih-Wen Lin
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0182
28-03-2019
Unique: 1289 | Total: 2120
Access Period: 0
0
182-202
HTML
XML
PDF
Research Article
Methods for Information Hiding in Open Social Networks
Jędrzej Bieniasz
,
Krzysztof Szczypiorski
10.3217/jucs-025-02-0074
28-02-2019
Unique: 1381 | Total: 2235
Access Period: 0
0
74-97
HTML
XML
PDF
Research Article
SOMSteg - Framework for Covert Channel, and its Detection, within HTTP
Waldemar Graniszewski
,
Jacek Krupski
,
Krzysztof Szczypiorski
10.3217/jucs-024-07-0864
28-07-2018
Unique: 1220 | Total: 1747
Access Period: 0
0
864-891
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK