Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
28 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: L.4 - SECURITY/TRUST
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection
Rafał Kozik
,
Michał Choraś
,
Jörg Keller
10.3217/jucs-025-01-0002
28-01-2019
Unique: 987 | Total: 1610
| Access Period:
2-15
HTML
XML
PDF
Research Article
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
Nipon Theera-Umpon
,
Kun-Hee Han
,
Woo-Sik Bae
,
Sanghyuk Lee
,
Van Pham
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1258
28-09-2018
Unique: 522 | Total: 723
| Access Period:
1258-1270
HTML
XML
PDF
Research Article
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
Flavio De Mello
,
José A. M. Xexéo
10.3217/jucs-024-01-0025
28-01-2018
Unique: 605 | Total: 849
| Access Period:
25-42
HTML
XML
PDF
Research Article
On the Analysis and Detection of Mobile Botnet Applications
Ahmad Karim
,
Muhammad Khan
,
Aisha Siddiqa
,
Kim-Kwang Choo
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0567
01-04-2016
Unique: 457 | Total: 569
| Access Period:
567-588
HTML
XML
PDF
Research Article
An Anonymization Algorithm for (α, β, γ, δ)-Social Network Privacy Considering Data Utility
Mehri Rajaei
,
Mostafa Haghjoo
,
Eynollah Miyaneh
10.3217/jucs-021-02-0268
01-02-2015
Unique: 424 | Total: 520
| Access Period:
268-305
HTML
XML
PDF
Research Article
Some Aspects of the Reliability of Information on the Web
Narayanan Kulathuramaiyer
,
Hermann Maurer
,
Rizwan Mehmood
10.3217/jucs-020-09-1284
01-09-2014
Unique: 516 | Total: 663
| Access Period:
1284-1303
HTML
XML
PDF
Research Article
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
Carlos Blanco
,
Ignacio De Guzmán
,
Eduardo Fernández-Medina
,
Juan Trujillo
10.3217/jucs-020-02-0079
01-02-2014
Unique: 645 | Total: 889
| Access Period:
79-106
HTML
XML
PDF
Research Article
Engineering Security into Distributed Systems: A Survey of Methodologies
Anton Uzunov
,
Eduardo Fernandez
,
Katrina Falkner
10.3217/jucs-018-20-2920
01-12-2012
Unique: 538 | Total: 675
| Access Period:
2920-3006
HTML
XML
PDF
Research Article
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management
Ismael Caballero
,
Luis Sánchez
,
Alberto Freitas
,
Eduardo Fernández-Medina
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1703
28-06-2012
Unique: 449 | Total: 581
| Access Period:
1703-1720
HTML
XML
PDF
Research Article
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection
Sang Lee
,
Dong Kim
,
Jong Park
10.3217/jucs-017-06-0944
28-03-2011
Unique: 278 | Total: 329
| Access Period:
944-960
HTML
XML
PDF
Research Article
Developing a Secure Mobile Grid System through a UML Extension
David G. Rosado
,
Eduardo Fernández-Medina
,
Javier López
,
Mario Piattini
10.3217/jucs-016-17-2333
01-09-2010
Unique: 348 | Total: 430
| Access Period:
2333-2352
HTML
XML
PDF
Research Article
Performance Optimizations for DAA Signatures on Java enabled Platforms
Kurt Dietrich
,
Franz Röck
10.3217/jucs-016-04-0519
28-02-2010
Unique: 306 | Total: 347
| Access Period:
519-530
HTML
XML
PDF
1
2
3
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK