Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2591)
Editorial
(392)
by Journal
by Funding Agency
Clear filters
Powered by
79 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: K.6.5 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence
Junho Choi
,
Chang Choi
,
Ilsun You
,
Pankoo Kim
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0369
01-03-2015
Unique: 338 | Total: 438
| Access Period:
369-383
HTML
XML
PDF
Research Article
An Anonymization Algorithm for (α, β, γ, δ)-Social Network Privacy Considering Data Utility
Mehri Rajaei
,
Mostafa Haghjoo
,
Eynollah Miyaneh
10.3217/jucs-021-02-0268
01-02-2015
Unique: 257 | Total: 323
| Access Period:
268-305
HTML
XML
PDF
Research Article
Automatic Authentication to Cloud-Based Services
Mircea Vleju
Part of: Conceptual Modelling with Specific Focus on Service-Oriented Systems
10.3217/jucs-020-03-0385
01-03-2014
Unique: 302 | Total: 421
| Access Period:
385-405
HTML
XML
PDF
Research Article
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
Carlos Blanco
,
Ignacio De Guzmán
,
Eduardo Fernández-Medina
,
Juan Trujillo
10.3217/jucs-020-02-0079
01-02-2014
Unique: 402 | Total: 555
| Access Period:
79-106
HTML
XML
PDF
Research Article
Toward a Module-centralized and Aspect-oriented Monitoring Framework in Clouds
Kun Ma
,
Runyuan Sun
,
Ajith Abraham
10.3217/jucs-019-15-2241
01-09-2013
Unique: 327 | Total: 430
| Access Period:
2241-2265
HTML
XML
PDF
Research Article
Engineering Security into Distributed Systems: A Survey of Methodologies
Anton Uzunov
,
Eduardo Fernandez
,
Katrina Falkner
10.3217/jucs-018-20-2920
01-12-2012
Unique: 342 | Total: 438
| Access Period:
2920-3006
HTML
XML
PDF
Research Article
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
Lin Ding
,
Jie Guan
,
Wen-long Sun
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1741
28-06-2012
Unique: 315 | Total: 405
| Access Period:
1741-1756
HTML
XML
PDF
Research Article
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management
Ismael Caballero
,
Luis Sánchez
,
Alberto Freitas
,
Eduardo Fernández-Medina
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1703
28-06-2012
Unique: 292 | Total: 386
| Access Period:
1703-1720
HTML
XML
PDF
Research Article
A Novel Identity-based Network Architecture for Next Generation Internet
Pedro Martinez-Julia
,
Antonio Skarmeta
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1643
28-06-2012
Unique: 313 | Total: 440
| Access Period:
1643-1661
HTML
XML
PDF
Research Article
Aligning Security and Privacy to Support the Development of Secure Information Systems
Haralambos Mouratidis
,
Christos Kalloniatis
,
Shareeful Islam
,
Marc-Philippe Huget
,
Stefanos Gritzalis
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1608
28-06-2012
Unique: 298 | Total: 394
| Access Period:
1608-1627
HTML
XML
PDF
Research Article
Interoperability Framework for Multimodal Biometry: Open Source in Action
Miloš Milovanović
,
Miroslav Minović
,
Starčević Dušan
Part of: Some Reflections about Service Oriented Architectures, Cloud Computing Applications, Services and Interoperability
10.3217/jucs-018-11-1558
01-06-2012
Unique: 295 | Total: 392
| Access Period:
1558-1575
HTML
XML
PDF
Research Article
Directed Path Based Authentication Scheme for the Internet of Things
Huansheng Ning
,
Hong Liu
,
Qing Liu
,
Genlin Ji
Part of: Internet of Things
10.3217/jucs-018-09-1112
01-05-2012
Unique: 303 | Total: 402
| Access Period:
1112-1131
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK