Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
142 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic E - Data
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Digital Investigation of IoT Devices in the Criminal Scene
François Bouchaud
,
Gilles Grimaud
,
Thomas Vantroys
,
Pierrick Buret
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1199
28-09-2019
Unique: 1192 | Total: 1979
| Access Period:
1199-1218
HTML
XML
PDF
Research Article
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
Hui Tian
,
Meilun Huang
,
Chin-Chen Chang
,
Yongfeng Huang
,
Jing Lu
,
Yongqian Du
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1131
28-09-2019
Unique: 726 | Total: 1222
| Access Period:
1131-1150
HTML
XML
PDF
Research Article
On Machine Learning Approaches for Automated Log Management
Ashot Harutyunyan
,
Arnak Poghosyan
,
Naira Grigoryan
,
Narek Hovhannisyan
,
Nicholas Kushmerick
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0925
28-08-2019
Unique: 862 | Total: 1462
| Access Period:
925-945
HTML
XML
PDF
Research Article
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation
Yanling Chen
,
O. Koyluoglu
,
A. J. Han Vinck
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0904
28-08-2019
Unique: 648 | Total: 1164
| Access Period:
904-924
HTML
XML
PDF
Research Article
A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms
Mariam Haroutunian
,
Karen Mkhitaryan
,
Josiane Mothe
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0887
28-08-2019
Unique: 686 | Total: 1168
| Access Period:
887-903
HTML
XML
PDF
Research Article
Towards Secure and Efficient "white-box" Encryption
Gurgen Khachatrian
,
Sergey Abrahamyan
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0868
28-08-2019
Unique: 634 | Total: 1149
| Access Period:
868-886
HTML
XML
PDF
Research Article
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
Bagus Santoso
,
Chunhua Su
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0294
28-03-2019
Unique: 714 | Total: 1294
| Access Period:
294-308
HTML
XML
PDF
Research Article
Combination Model of Heterogeneous Data for Security Measurement
Xiuze Dong
,
Yunchuan Guo
,
Fenghua Li
,
Liju Dong
,
Arshad Khan
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0270
28-03-2019
Unique: 654 | Total: 1188
| Access Period:
270-281
HTML
XML
PDF
Research Article
CCA-Secure Deterministic Identity-Based Encryption Scheme
Meijuan Huang
,
Bo Yang
,
Yi Zhao
,
Kaitai Liang
,
Liang Xue
,
Xiaoyi Yang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0245
28-03-2019
Unique: 776 | Total: 1408
| Access Period:
245-269
HTML
XML
PDF
Research Article
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption
Yunling Wang
,
Jianfeng Wang
,
Shi-Feng Sun
,
Joseph Liu
,
Willy Susilo
,
Joonsang Baek
,
Ilsun You
,
Xiaofeng Chen
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0222
28-03-2019
Unique: 812 | Total: 1364
| Access Period:
222-244
HTML
XML
PDF
Research Article
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
Yi-Fan Tseng
,
Chun-I Fan
,
Chih-Wen Lin
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0182
28-03-2019
Unique: 658 | Total: 1191
| Access Period:
182-202
HTML
XML
PDF
Research Article
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms
Yuan Chen
,
Qingkuan Dong
,
Yannan Li
,
Qiqi Lai
,
Zhedong Wang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0158
28-03-2019
Unique: 636 | Total: 1188
| Access Period:
158-181
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK