Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2689)
Editorial
(408)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Smart healthcare: developing a pattern to predict the stress and anxiety among university students using machine learning technology
Farhad Lotfi
,
Branka Rodić
,
Aleksandra Labus
,
Zorica Bogdanović
10.3897/jucs.116174
28-09-2024
Unique: 519 | Total: 710
| Access Period:
1316-1342
HTML
PDF
Research Article
Automatic Detection of Systemic Diseases to Recognize Mpox Virus using GPLNet Based on Skin Lesions
Panji Bintoro
,
Zulkifli Zulkifli
,
Yaya Heryadi
,
Fitriana Fitriana
,
Nopi Anggista Putri
,
Dwi Yana Ayu Andini
10.3897/jucs.119234
28-09-2024
Unique: 527 | Total: 739
| Access Period:
1286-1315
HTML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.137611
28-09-2024
Unique: 243 | Total: 303
| Access Period:
1284-1285
HTML
PDF
Research Article
Recognition of genuine and phishing emails may not be associated with response to phishing attacks
Alex Crgol
,
Simon Vrhovec
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.132113
14-09-2024
Unique: 536 | Total: 737
| Access Period:
1265-1283
HTML
PDF
Research Article
Using CVSS scores can make more informed and more adapted Intrusion Detection Systems
Robin Duraz
,
David Espes
,
Julien Francq
,
Sandrine Vaton
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131659
14-09-2024
Unique: 412 | Total: 542
| Access Period:
1244-1264
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 440 | Total: 592
| Access Period:
1224-1243
HTML
PDF
Research Article
„Stop it, Fridge!“ – Legally Secure and Interest-Based Data Sharing in the Age of Modern (Cyber) Technology
Dagmar Gesmann-Nuissl
,
Ines Maria Tacke
,
Stefanie Meyer
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.132132
14-09-2024
Unique: 377 | Total: 508
| Access Period:
1205-1223
HTML
PDF
Research Article
A Flexible Multilevel System for Mitre ATT&CK Model-driven Alerts and Events Correlation in Cyberattacks Detection
Javier Muñoz-Calle
,
Rafael Estepa Alonso
,
Antonio Estepa Alonso
,
Jesús E. Díaz-Verdejo
,
Elvira Castillo Fernández
,
Germán Madinabeitia
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131686
14-09-2024
Unique: 545 | Total: 700
| Access Period:
1184-1204
HTML
PDF
Research Article
An Empirical Evaluation of Large Language Models in Static Code Analysis for PHP Vulnerability Detection
Orçun Çetin
,
Emre Ekmekcioglu
,
Budi Arief
,
Julio Hernandez-Castro
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134739
14-09-2024
Unique: 561 | Total: 830
| Access Period:
1163-1183
HTML
PDF
Research Article
Exploiting TTPs to Design an Extensible and Explainable Malware Detection System
Yashovardhan Sharma
,
Simon Birnbach
,
Ivan Martinovic
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131753
14-09-2024
Unique: 334 | Total: 422
| Access Period:
1140-1162
HTML
PDF
Editorial
Editorial: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
Steffen Wendzel
,
Aleksandra Mileva
,
Virginia N. L. Franqueira
,
Martin Gilje Jaatun
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131628
14-09-2024
Unique: 457 | Total: 577
| Access Period:
1137-1139
HTML
PDF
Research Article
Interaction and Fusion of Rich Textual Information Network for Document-level Relation Extraction
Yu Zhong
,
Bo Shen
,
Tao Wang
,
Jinglin Zhang
,
Yun Liu
10.3897/jucs.130588
28-08-2024
Unique: 559 | Total: 675
| Access Period:
1112-1136
HTML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK