Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
129 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6 - MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Efficient Privacy-Preserving Remote Data Possession Checking Protocol for Critical Information Infrastructure
Loganathan Yamunadevi
,
Kaliannan Thilagavathy
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0603
28-05-2018
Unique: 410 | Total: 519
| Access Period:
603-621
HTML
XML
PDF
Research Article
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms
Ralf Keidel
,
Steffen Wendzel
,
Sebastian Zillien
,
Eric Conner
,
Georg Haas
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0556
28-05-2018
Unique: 664 | Total: 839
| Access Period:
556-576
HTML
XML
PDF
Research Article
Large Scale Mobility-based Behavioral Biometrics on the Example of the Trajectory-based Model for Anomaly Detection
Piotr Kałużny
,
Agata Filipowska
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0417
28-04-2018
Unique: 506 | Total: 655
| Access Period:
417-443
HTML
XML
PDF
Research Article
A New Hybrid Access Control Model for Security Policies in Multimodal Applications Environments
Hasiba Attia
,
Laid Kahloul
,
Saber Benharzallah
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0392
28-04-2018
Unique: 452 | Total: 572
| Access Period:
392-416
HTML
XML
PDF
Research Article
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
Flavio De Mello
,
José A. M. Xexéo
10.3217/jucs-024-01-0025
28-01-2018
Unique: 605 | Total: 849
| Access Period:
25-42
HTML
XML
PDF
Research Article
Contactless Vulnerability Analysis using Google and Shodan
Kai Simon
,
Cornelius Moucha
,
Jörg Keller
10.3217/jucs-023-04-0404
01-04-2017
Unique: 557 | Total: 775
| Access Period:
404-430
HTML
XML
PDF
Research Article
Unified Description for Network Information Hiding Methods
Steffen Wendzel
,
Wojciech Mazurczyk
,
Sebastian Zander
10.3217/jucs-022-11-1456
01-11-2016
Unique: 660 | Total: 892
| Access Period:
1456-1486
HTML
XML
PDF
Research Article
Secure Control Applications in Smart Homes and Buildings
Friedrich Praus
,
Wolfgang Kastner
,
Peter Palensky
Part of: Security, Privacy and Reliability of Smart Buildings
10.3217/jucs-022-09-1249
01-09-2016
Unique: 472 | Total: 592
| Access Period:
1249-1273
HTML
XML
PDF
Research Article
A Comprehensive Dependability Approach for Building Automation Networks
Lukas Krammer
,
Wolfgang Kastner
,
Thilo Sauter
Part of: Security, Privacy and Reliability of Smart Buildings
10.3217/jucs-022-09-1225
01-09-2016
Unique: 451 | Total: 577
| Access Period:
1225-1248
HTML
XML
PDF
Research Article
An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function
Gunupudi Kumar
,
Nimmala Mangathayaru
,
Gugulothu Narsimha
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0589
01-04-2016
Unique: 456 | Total: 615
| Access Period:
589-604
HTML
XML
PDF
Research Article
On the Analysis and Detection of Mobile Botnet Applications
Ahmad Karim
,
Muhammad Khan
,
Aisha Siddiqa
,
Kim-Kwang Choo
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0567
01-04-2016
Unique: 457 | Total: 569
| Access Period:
567-588
HTML
XML
PDF
Research Article
An Empirical Investigation of Security Vulnerabilities within Web Applications
Ibrahim Abunadi
,
Mamdouh Alenezi
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0537
01-04-2016
Unique: 479 | Total: 615
| Access Period:
537-551
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK