Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2712)
Editorial
(413)
by Journal
by Funding Agency
Clear filters
Powered by
65 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.4.6 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence
Junho Choi
,
Chang Choi
,
Ilsun You
,
Pankoo Kim
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0369
01-03-2015
Unique: 834 | Total: 1080
| Access Period:
369-383
HTML
XML
PDF
Research Article
Observations of Skipjack-like Structure with SP/SPS Round Function
Ting Cui
,
Chenhui Jin
,
Guoshuang Zhang
Part of: Information Security
10.3217/jucs-019-16-2453
01-10-2013
Unique: 738 | Total: 962
| Access Period:
2453-2471
HTML
XML
PDF
Research Article
Applying Professional Solutions within the Educational Environments by Means of Cloud Computing: Coaching for Teachers
Habib Fardoun
,
Abdulfattah Mashat
,
Sebastián López
10.3217/jucs-019-12-1703
28-06-2013
Unique: 971 | Total: 1429
| Access Period:
1703-1717
HTML
XML
PDF
Research Article
Interactive Design System for Schools using Cloud Computing
Habib Fardoun
,
Bassam Zafar
,
Abdulrahman Altalhi
,
Antonio Paules
Part of: Interaction Design in Educational Environments
10.3217/jucs-019-07-0950
01-04-2013
Unique: 844 | Total: 1195
| Access Period:
950-964
HTML
XML
PDF
Research Article
Engineering Security into Distributed Systems: A Survey of Methodologies
Anton Uzunov
,
Eduardo Fernandez
,
Katrina Falkner
10.3217/jucs-018-20-2920
01-12-2012
Unique: 860 | Total: 1097
| Access Period:
2920-3006
HTML
XML
PDF
Research Article
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
Lin Ding
,
Jie Guan
,
Wen-long Sun
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1741
28-06-2012
Unique: 812 | Total: 1033
| Access Period:
1741-1756
HTML
XML
PDF
Research Article
Security Analysis of Three Password Authentication Schemes
Kyung-Ah Shim
10.3217/jucs-017-11-1623
01-07-2011
Unique: 592 | Total: 726
| Access Period:
1623-1633
HTML
XML
PDF
Research Article
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
Khaled Salah
,
Mojeeb-Al-Rhman Al-Khiaty
,
Rashad Ahmed
,
Adnan Mahdi
10.3217/jucs-017-11-1605
01-07-2011
Unique: 747 | Total: 1028
| Access Period:
1605-1622
HTML
XML
PDF
Research Article
A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices
Peter Danner
,
Daniel Hein
10.3217/jucs-016-09-1139
01-05-2010
Unique: 572 | Total: 686
| Access Period:
1139-1151
HTML
XML
PDF
Research Article
VIMM: Runtime Integrity Measurement of a Virtualized Operating System
Chun Suen
10.3217/jucs-016-04-0554
28-02-2010
Unique: 581 | Total: 747
| Access Period:
554-576
HTML
XML
PDF
Research Article
Towards a Virtual Trusted Platform
Martin Pirker
,
Ronald Toegl
10.3217/jucs-016-04-0531
28-02-2010
Unique: 649 | Total: 1049
| Access Period:
531-542
HTML
XML
PDF
Research Article
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers
Pino Caballero-Gil
,
Amparo Fúster-Sabater
,
Candelaria Hernández-Goya
10.3217/jucs-015-15-2981
01-09-2009
Unique: 637 | Total: 762
| Access Period:
2981-2998
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK