Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2586)
Editorial
(391)
by Journal
by Funding Agency
Clear filters
Powered by
79 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6.5 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
Hui Tian
,
Meilun Huang
,
Chin-Chen Chang
,
Yongfeng Huang
,
Jing Lu
,
Yongqian Du
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1131
28-09-2019
Unique: 524 | Total: 892
| Access Period:
1131-1150
HTML
XML
PDF
Research Article
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels
Jędrzej Bieniasz
,
Monika Stępkowska
,
Artur Janicki
,
Krzysztof Szczypiorski
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1109
28-09-2019
Unique: 533 | Total: 933
| Access Period:
1109-1130
HTML
XML
PDF
Research Article
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios
Yosra Lakhdhar
,
Slim Rekhis
,
Noureddine Boudriga
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1066
28-09-2019
Unique: 546 | Total: 990
| Access Period:
1066-1088
HTML
XML
PDF
Research Article
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study
Łukasz Apiecionek
,
Marcel Großmann
,
Udo Krieger
Part of: Recent Advances, Emerging Methods and Applications of Pattern Recognition
10.3217/jucs-025-06-0571
28-06-2019
Unique: 529 | Total: 966
| Access Period:
571-590
HTML
XML
PDF
Research Article
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms
Yuan Chen
,
Qingkuan Dong
,
Yannan Li
,
Qiqi Lai
,
Zhedong Wang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0158
28-03-2019
Unique: 420 | Total: 800
| Access Period:
158-181
HTML
XML
PDF
Research Article
Methods for Information Hiding in Open Social Networks
Jędrzej Bieniasz
,
Krzysztof Szczypiorski
10.3217/jucs-025-02-0074
28-02-2019
Unique: 499 | Total: 861
| Access Period:
74-97
HTML
XML
PDF
Research Article
SOMSteg - Framework for Covert Channel, and its Detection, within HTTP
Waldemar Graniszewski
,
Jacek Krupski
,
Krzysztof Szczypiorski
10.3217/jucs-024-07-0864
28-07-2018
Unique: 387 | Total: 514
| Access Period:
864-891
HTML
XML
PDF
Research Article
Obligation to Defend the Critical Infrastructure? Offensive Cybersecurity Measures
Anže Mihelič
,
Simon Vrhovec
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0646
28-05-2018
Unique: 313 | Total: 431
| Access Period:
646-661
HTML
XML
PDF
Research Article
Relating Mobile Device Use and Adherence to Information Security Policy with Data Breach Consequences in Hospitals
Simon Vrhovec
,
Blaž Markelj
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0634
28-05-2018
Unique: 346 | Total: 481
| Access Period:
634-645
HTML
XML
PDF
Research Article
Efficient Privacy-Preserving Remote Data Possession Checking Protocol for Critical Information Infrastructure
Loganathan Yamunadevi
,
Kaliannan Thilagavathy
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0603
28-05-2018
Unique: 250 | Total: 325
| Access Period:
603-621
HTML
XML
PDF
Research Article
WoDiCoF - A Testbed for the Evaluation of (Parallel) Covert Channel Detection Algorithms
Ralf Keidel
,
Steffen Wendzel
,
Sebastian Zillien
,
Eric Conner
,
Georg Haas
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0556
28-05-2018
Unique: 293 | Total: 384
| Access Period:
556-576
HTML
XML
PDF
Research Article
Large Scale Mobility-based Behavioral Biometrics on the Example of the Trajectory-based Model for Anomaly Detection
Piotr Kałużny
,
Agata Filipowska
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0417
28-04-2018
Unique: 322 | Total: 433
| Access Period:
417-443
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK