Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic L. - Science and Technology of Learning
Topic L.4 - SECURITY/TRUST
Topic L.4.0 - Security and Trust

C. Blanco, I. García-Rodríguez de Guzmán, E. Fernández-Medina, J. Trujillo:
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
/jucs_20_2/showing_the_benefits_of
page 79 - 106
Vol.20 / Issue 2
R. Kozik, M. Choras, J. Keller:
Balanced Efficient Lifelong Learning (B-ELLA) for Cyber Attack Detection
/jucs_25_1/balanced_efficient_lifelong_learning
page 2 - 15
Vol.25 / Issue 1
Y. Lakhdhar, S. Rekhis, N. Boudriga:
A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios
/jucs_25_9/a_context_based_defense
page 1066 - 1088
Vol.25 / Issue 9
S.M. Lee, D.S. Kim, J.S. Park:
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection
/jucs_17_6/cost_sensitive_spam_detection
page 944 - 960
Vol.17 / Issue 6
A. Mihelič, M. Jevšček, S. Vrhovec, I. Bernik:
Testing the Human Backdoor: Organizational Response to a Phishing Campaign
/jucs_25_11/testing_the_human_backdoor
page 1458 - 1477
Vol.25 / Issue 11
J.R. Mühlbacher, C. Praher:
DS RBAC - Dynamic Sessions in Role Based Access Control
/jucs_15_3/ds_rbac_dynamic
page 538 - 554
Vol.15 / Issue 3
K. Shankar, M. Elhoseny:
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES
/jucs_25_10/trust_based_cluster_head
page 1221 - 1239
Vol.25 / Issue 10
N. Theera-Umpon, K.-H. Han, W.-S. Bae, S. Lee, V.H. Pham:
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
/jucs_24_9/verifying_secure_authentication_protocol
page 1258 - 1270
Vol.24 / Issue 9
X. Wang, Y. Zhang, B.B. Gupta, H. Zhu, D. Liu:
An Identity-Based Signcryption on Lattice without Trapdoor
/jucs_25_3/an_identity_based_signcryption
page 282 - 293
Vol.25 / Issue 3
F.L. de Mello, J.A.M. Xexéo:
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
/jucs_24_1/identifying_encryption_algorithms_in
page 25 - 42
Vol.24 / Issue 1