Content of Issue 3
DOI: 10.3217/jucs-025-03
|
Advances of Provable Security Techniques |
Y. Yu, Y. Mu |
154 |
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms |
Y. Chen, Q. Dong, Y. Li, Q. Lai, Z. Wang |
158 |
Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption |
Y.-F. Tseng, C.-I. Fan, C.-W. Lin |
182 |
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method |
X. Tao, L. Liu, F. Zhao, Y. Huang, S. Zhu, Y. Liang |
203 |
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption |
Y. Wang, J. Wang, S.-F. Sun, J.K. Liu, W. Susilo, J. Baek, I. You, X. Chen |
222 |
CCA-Secure Deterministic Identity-Based Encryption Scheme |
M. Huang, B. Yang, Y. Zhao, K. Liang, L. Xue, X. Yang |
245 |
Combination Model of Heterogeneous Data for Security Measurement |
X. Dong, Y. Guo, F. Li, L. Dong, A. Khan |
270 |
An Identity-Based Signcryption on Lattice without Trapdoor |
X. Wang, Y. Zhang, B.B. Gupta, H. Zhu, D. Liu |
282 |
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries |
B. Santoso, C. Su |
294 |
Content of Issue 4
DOI: 10.3217/jucs-025-04
|
Managing Editor's Column |
C. Gütl |
309 |
Cost Estimation of Blended Learning Course Delivery Through Public Cloud |
V.M. Ciric, I.Z. Milentijevic, O.M. Vojinovic, N.S. Manic |
310 |
Data-driven Feature Selection Methods for Text Classification: an Empirical Evaluation |
R.C.P. Fragoso, R.H.W. Pinheiro, G.D.C. Cavalcanti |
334 |
Survey on Ranking Functions in Keyword Search over Graph-Structured Data |
A. Ghanbarpour, H. Naderi |
361 |
Scheduling Mandatory-Optional Real-Time Tasks in Homogeneous Multi-Core Systems with Energy Constraints Using Bio-Inspired Meta-Heuristics |
M. Micheletto, R. Santos, J. Orozco |
390 |
A Probabilistic Multi-Objective Artificial Bee Colony Algorithm for Gene Selection |
Z.B. Ozger, B. Bolat, B. Diri |
418 |
Content of Issue 6
DOI: 10.3217/jucs-025-06
|
Recent Advances, Emerging Methods and Applications of Pattern Recognition |
J. Keller, M. Grana, R. Kozik, T. Andrysiak, M. Choraś |
569 |
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study |
Ł. Apiecionek, M. Großmann, U.R. Krieger |
571 |
Impact of Resource Control in Irregular Networks on their Transmission Properties |
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski |
591 |
Improving Person Re-identification by Segmentation-Based Detection Bounding Box Filtering |
D. Pieczyński, M. Kraft, M. Fularz |
611 |
Fast Binarization of Unevenly Illuminated Document Images Based on Background Estimation for Optical Character Recognition Purposes |
H. Michalak, K. Okarma |
627 |
Hybrid Stochastic GA-Bayesian Search for Deep Convolutional Neural Network Model Selection |
W. Rawat, Z. Wang |
647 |
A Hybrid Neural System to Study the Interplay between Economic Crisis and Workplace Accidents in Spain |
S. Contreras, M.Á. Manzanedo, Á. Herrero |
667 |
Synthetic Image Translation for Football Players Pose Estimation |
M. Sypetkowski, G. Sarwas, T. Trzciński |
683 |
Quality Assessment of Photographed 3D Printed Flat Surfaces Using Hough Transform and Histogram Equalization |
J. Fastowicz, K. Okarma |
701 |
Integration and Selection of Linear SVM Classifiers in Geometric Space |
R. Burduk, J. Biedrzycki |
718 |
Content of Issue 7
DOI: 10.3217/jucs-025-07
|
Managing Editor's Column |
C. Gütl |
731 |
A Note Concerning Feedback and Queries for Web Pages |
N. Delilovic, H. Maurer |
733 |
Mobile Applications for People with Parkinson's Disease: A Systematic Search in App Stores and Content Review |
S. Estévez, M.E. Cambronero, Y. García-Ruiz, L. Llana |
740 |
Micro-business Requirements Patterns in Practice: Remote Communities in Developing Nations |
R. Macasaet, M. Noguera, M.L. Rodríguez, J.L. Garrido, S. Supakkul, L. Chung |
764 |
On the Automated and Reactive Optimization of Highly-Dynamic Communication Network Infrastructures |
R. Mueller-Bady, M. Kappes, I. Medina-Bulo, F. Palomo-Lozano |
788 |
Improving Ontology Matching Using Application Requirements for Segmenting Ontologies |
D. Pessoa, A.C. Salgado, B. Farias Lóscio |
816 |
Effectiveness of Games in Software Project Management Education: An Experimental Study |
G. Petri, C. Gresse von Wangenheim, J.C. Rossa Hauck, A. Ferreti Borgatto |
840 |
Content of Issue 8
DOI: 10.3217/jucs-025-08
|
Collaborative Technologies and Data Science in Smart City Applications |
N. Baloian, Y. Chen, A. Harutyunyan |
865 |
Towards Secure and Efficient "white-box" Encryption |
G. Khachatrian, S. Abrahamyan |
868 |
A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms |
M. Haroutunian, K. Mkhitaryan, J. Mothe |
887 |
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation |
Y. Chen, O.O. Koyluoglu, A.J.H. Vinck |
904 |
On Machine Learning Approaches for Automated Log Management |
A.N. Harutyunyan, A.V. Poghosyan, N.M. Grigoryan, N.A. Hovhannisyan, N. Kushmerick |
925 |
Planning of Urban Public Transportation Networks in a Smart City |
J. Frez, N. Baloian, J.A. Pino, G. Zurita, F. Basso |
946 |
The Role of Verification and Validation Techniques within Visual Analytics |
B. Weyers, E. Auer, W. Luther |
967 |
Identifying Groupware Requirements in People-Driven Mobile Collaborative Processes |
V. Herskovic, S.F. Ochoa, J.A. Pino |
988 |
A Model for Resource Management in Smart Cities Based on Crowdsourcing and Gamification |
R. Barbosa Sousa Orrego, J.L.V. Barbosa |
1018 |
Content of Issue 9
DOI: 10.3217/jucs-025-09
|
Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes |
A. Janicki, W. Mazurczyk, X. Luo, D. Ye |
1039 |
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits |
A. Fedorchenko, E. Doynikova, I. Kotenko |
1043 |
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios |
Y. Lakhdhar, S. Rekhis, N. Boudriga |
1066 |
Precise Performance Characterization of Antivirus on the File System Operations |
M.I. Al-Saleh, H.M. Hamdan |
1089 |
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels |
J. Bieniasz, M. Stępkowska, A. Janicki, K. Szczypiorski |
1109 |
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay |
H. Tian, M. Huang, C.-C. Chang, Y. Huang, J. Lu, Y. Du |
1131 |
Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images |
M. Huang, M. Xu, T. Qiao, T. Wu, N. Zheng |
1151 |
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach |
Z.A. Al-Sharif, M.I. Al-Saleh, Y. Jararweh, L. Alawneh, A.S. Shatnawi |
1174 |
Digital Investigation of IoT Devices in the Criminal Scene |
F. Bouchaud, G. Grimaud, T. Vantroys, P. Buret |
1199 |
Content of Issue 10
DOI: 10.3217/jucs-025-10
|
Intelligent Computing for Society |
I.S. Bajwa, F.D. Kamareddine, P. Thangarajah |
1219 |
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES |
K. Shankar, M. Elhoseny |
1221 |
Research on Fair Trading Mechanism of Surplus Power Based on Blockchain |
Z. Xia, J. Tan, J. Wang, R. Zhu, H. Xiao, A.K. Sangaiah |
1240 |
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform |
A. Ali, I.S. Bajwa, R. Kazmi |
1261 |
A Smart Hydroponics-Based System for Child Education |
S. Dinçer, Y. Bitirim |
1279 |
Decision-making Model at Higher Educational Institutions based on Machine Learning |
Y.V. Nieto, V. García-Díaz, C.E. Montenegro |
1301 |
SENTIPEDE: A Smart System for Sentiment-based Personality Detection from Short Texts |
A. Darliansyah, M.A. Naeem, F. Mirza, R. Pears |
1323 |
An Intelligent Data Analytics based Model Driven Recommendation System |
B. Ramzan, I. Sarwar Bajwa, R. Kazmi, S. Ramzan |
1353 |
A Web3.0-based Intelligent Learning System Supporting Education in the 21st Century |
K. Halimi, H. Seridi-Bouchelaghem |
1373 |
Content of Issue 11
DOI: 10.3217/jucs-025-11
|
Cyberattack Detection and Response |
J. Keller, W. Mazurczyk, B. Genge, L. Fritsch, S. Vrhovec |
1394 |
Detection of Size Modulation Covert Channels Using Countermeasure Variation |
S. Wendzel, F. Link, D. Eller, W. Mazurczyk |
1396 |
Analysis of the Infection and the Injection Phases of the Telnet Botnets |
T. Bajtoš, P. Sokol, A. Gajdoš, K. Lučivjanská, T. Mézešová |
1417 |
Cyberattack Response Model for the Nuclear Regulator in Slovenia |
S. Tomažič, I. Bernik |
1437 |
Testing the Human Backdoor: Organizational Response to a Phishing Campaign |
A. Mihelič, M. Jevšček, S. Vrhovec, I. Bernik |
1458 |
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure |
H.I. Kure, S. Islam |
1478 |
Content of Issue 12
DOI: 10.3217/jucs-025-12
|
Advances in Web-Based Learning |
R. Klamma, M. Spaniol, S. Unankard |
1503 |
Improving Teacher Game Learning Analytics Dashboards through ad-hoc Development |
A. Calvo-Morata, C. Alonso-Fernández, I.J. Pérez-Colado, M. Freire, I. Martínez-Ortiz, B. Fernández-Manjón |
1507 |
Implementing Flipped Classroom that Used a Context Aware Mobile Learning System into Learning Process |
M. Lamia, M. Hafidi, A. Tricot, O. Benmesbah |
1531 |
STEM Oriented Online Platforms Embracing the Community of Practice Model: A Comparative Study and Design Guidelines |
O. Fragou, C. Goumopoulos, C. Tsompanos |
1554 |
Badges for Peer Assessment of Teamwork in Organized Education |
Z. Kubincová, D. Šuníková, M. Homola |
1589 |
Integrating 3D Objects in Collaborative Non-Linear Storytelling on the Web |
P. de Lange, P. Nicolaescu, J. Benscheid, R. Klamma |
1608 |
Overcoming the Silver Generation Digital Gap |
C. Vaz de Carvalho, P. Cano, J.M. Roa, A. Wanka, F. Kolland |
1625 |
Gamification Support for Learning in Spatial Computing Environments |
B. Hensen, I. Koren, R. Klamma |
1644 |
Content of Issue 13
DOI: 10.3217/jucs-025-13
|
Managing Editor's Column |
C. Gütl |
1666 |
Adopting Trust in Learning Analytics Infrastructure: A Structured Literature Review |
G.-P. Ciordas-Hertel, J. Schneider, S. Ternier, H. Drachsler |
1668 |
Improving Multi-Label Classification for Learning Objects Categorization by Taking into Consideration Usage Information |
P.G. Espejo, E. Gibaja, V.H. Menéndez, A. Zapata, C. Romero |
1687 |
Applicability of User Experience and Usability Questionnaires |
A. Hinderks, D. Winter, M. Schrepp, J. Thomaschewski |
1717 |
A Revised Framework for the Governance and Management of Green IT |
J.D. Patón-Romero, M.T. Baldassarre, M. Rodríguez, M. Piattini |
1736 |
MulseOnto: a Reference Ontology to Support the Design of Mulsemedia Systems |
E.B. Saleme, C.A.S. Santos, R.A. Falbo, G. Ghinea, F. Andres |
1761 |
|