Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic L. - Science and Technology of Learning
Topic L.4 - SECURITY/TRUST
Topic L.4.0 - Security and Trust

C. Blanco, I. García-Rodríguez de Guzmán, E. Fernández-Medina, J. Trujillo:
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
/jucs_20_2/showing_the_benefits_of
page 79 - 106
Vol.20 / Issue 2
R. Kozik, M. Choras, J. Keller:
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection
/jucs_25_1/balanced_efficient_lifelong_learning
page 2 - 15
Vol.25 / Issue 1
S.M. Lee, D.S. Kim, J.S. Park:
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection
/jucs_17_6/cost_sensitive_spam_detection
page 944 - 960
Vol.17 / Issue 6
J.R. Mühlbacher, C. Praher:
DS RBAC - Dynamic Sessions in Role Based Access Control
/jucs_15_3/ds_rbac_dynamic
page 538 - 554
Vol.15 / Issue 3
N. Theera-Umpon, K.-H. Han, W.-S. Bae, S. Lee, V.H. Pham:
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
/jucs_24_9/verifying_secure_authentication_protocol
page 1258 - 1270
Vol.24 / Issue 9
F.L. de Mello, J.A.M. Xexéo:
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
/jucs_24_1/identifying_encryption_algorithms_in
page 25 - 42
Vol.24 / Issue 1