Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
79 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6.5 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Low-sample classification in NIDS using the EC-GAN method
Marko Zekan
,
Igor Tomičić
,
Markus Schatten
10.3897/jucs.85703
28-12-2022
Unique: 1171 | Total: 1789
| Access Period:
1330-1346
HTML
XML
PDF
Research Article
Big Data between Quality and Security: Dynamic Access Control for Collaborative Platforms
Mohamed Talha
,
Anas Abou El Kalam
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence II
10.3897/jucs.77046
28-12-2021
Unique: 1283 | Total: 2247
| Access Period:
1300-1324
HTML
XML
PDF
Research Article
Security Reference Architecture for Cyber-Physical Systems (CPS)
Julio Moreno
,
David G. Rosado
,
Luis E. Sánchez
,
Manuel A. Serrano
,
Eduardo Fernández-Medina
10.3897/jucs.68539
28-06-2021
Unique: 2120 | Total: 3873
| Access Period:
609-634
HTML
XML
PDF
Research Article
Fuzzy Adaptive Data Packets Control Algorithm for IoT System Protection
Łukasz Apiecionek
,
Matusz Biedziak
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.076
28-11-2020
Unique: 685 | Total: 1165
| Access Period:
1435-1454
HTML
XML
PDF
Research Article
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking
Caroline Moeckel
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.043
28-07-2020
Unique: 664 | Total: 1210
| Access Period:
783-804
HTML
XML
PDF
Research Article
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems
Damjan Fujs
,
Simon Vrhovec
,
Damjan Vavpotič
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.042
28-07-2020
Unique: 747 | Total: 1333
| Access Period:
764-782
HTML
XML
PDF
Research Article
Anomaly Detection for Smart Lighting Infrastructure with the Use of Time Series Analysis
Tomasz Andrysiak
,
Łukasz Saganowski
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.027
28-04-2020
Unique: 734 | Total: 1331
| Access Period:
508-527
HTML
XML
PDF
Research Article
Authorship Studies and the Dark Side of Social Media Analytics
Patrick Juola
Part of: Recent Advances in Social Network Analysis, Management and Security
10.3897/jucs.2020.009
28-01-2020
Unique: 813 | Total: 1591
| Access Period:
156-170
HTML
XML
PDF
Research Article
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure
Halima Kure
,
Shareeful Islam
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1478
28-11-2019
Unique: 1909 | Total: 3233
| Access Period:
1478-1502
HTML
XML
PDF
Research Article
Testing the Human Backdoor: Organizational Response to a Phishing Campaign
Anže Mihelič
,
Matej Jevšček
,
Simon Vrhovec
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1458
28-11-2019
Unique: 993 | Total: 1646
| Access Period:
1458-1477
HTML
XML
PDF
Research Article
Analysis of the Infection and the Injection Phases of the Telnet Botnets
Tomáš Bajtoš
,
Pavol Sokol
,
Andrej Gajdoš
,
Katarína Lučivjanská
,
Terézia Mézešová
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1417
28-11-2019
Unique: 749 | Total: 1293
| Access Period:
1417-1436
HTML
XML
PDF
Research Article
Detection of Size Modulation Covert Channels Using Countermeasure Variation
Steffen Wendzel
,
Florian Link
,
Daniela Eller
,
Wojciech Mazurczyk
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1396
28-11-2019
Unique: 819 | Total: 1370
| Access Period:
1396-1416
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK