Content of Issue 3
DOI: 10.3217/jucs-025-03
|
| Advances of Provable Security Techniques |
Y. Yu, Y. Mu |
154 |
| Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms |
Y. Chen, Q. Dong, Y. Li, Q. Lai, Z. Wang |
158 |
| Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption |
Y.-F. Tseng, C.-I. Fan, C.-W. Lin |
182 |
| Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method |
X. Tao, L. Liu, F. Zhao, Y. Huang, S. Zhu, Y. Liang |
203 |
| Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption |
Y. Wang, J. Wang, S.-F. Sun, J.K. Liu, W. Susilo, J. Baek, I. You, X. Chen |
222 |
| CCA-Secure Deterministic Identity-Based Encryption Scheme |
M. Huang, B. Yang, Y. Zhao, K. Liang, L. Xue, X. Yang |
245 |
| Combination Model of Heterogeneous Data for Security Measurement |
X. Dong, Y. Guo, F. Li, L. Dong, A. Khan |
270 |
| An Identity-Based Signcryption on Lattice without Trapdoor |
X. Wang, Y. Zhang, B.B. Gupta, H. Zhu, D. Liu |
282 |
| A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries |
B. Santoso, C. Su |
294 |
Content of Issue 4
DOI: 10.3217/jucs-025-04
|
| Managing Editor's Column |
C. Gütl |
309 |
| Cost Estimation of Blended Learning Course Delivery Through Public Cloud |
V.M. Ciric, I.Z. Milentijevic, O.M. Vojinovic, N.S. Manic |
310 |
| Data-driven Feature Selection Methods for Text Classification: an Empirical Evaluation |
R.C.P. Fragoso, R.H.W. Pinheiro, G.D.C. Cavalcanti |
334 |
| Survey on Ranking Functions in Keyword Search over Graph-Structured Data |
A. Ghanbarpour, H. Naderi |
361 |
| Scheduling Mandatory-Optional Real-Time Tasks in Homogeneous Multi-Core Systems with Energy Constraints Using Bio-Inspired Meta-Heuristics |
M. Micheletto, R. Santos, J. Orozco |
390 |
| A Probabilistic Multi-Objective Artificial Bee Colony Algorithm for Gene Selection |
Z.B. Ozger, B. Bolat, B. Diri |
418 |
Content of Issue 6
DOI: 10.3217/jucs-025-06
|
| Recent Advances, Emerging Methods and Applications of Pattern Recognition |
J. Keller, M. Grana, R. Kozik, T. Andrysiak, M. Choraś |
569 |
| Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study |
Ł. Apiecionek, M. Großmann, U.R. Krieger |
571 |
| Impact of Resource Control in Irregular Networks on their Transmission Properties |
S. Bujnowski, T. Marciniak, B. Marciniak, Z. Lutowski |
591 |
| Improving Person Re-identification by Segmentation-Based Detection Bounding Box Filtering |
D. Pieczyński, M. Kraft, M. Fularz |
611 |
| Fast Binarization of Unevenly Illuminated Document Images Based on Background Estimation for Optical Character Recognition Purposes |
H. Michalak, K. Okarma |
627 |
| Hybrid Stochastic GA-Bayesian Search for Deep Convolutional Neural Network Model Selection |
W. Rawat, Z. Wang |
647 |
| A Hybrid Neural System to Study the Interplay between Economic Crisis and Workplace Accidents in Spain |
S. Contreras, M.Á. Manzanedo, Á. Herrero |
667 |
| Synthetic Image Translation for Football Players Pose Estimation |
M. Sypetkowski, G. Sarwas, T. Trzciński |
683 |
| Quality Assessment of Photographed 3D Printed Flat Surfaces Using Hough Transform and Histogram Equalization |
J. Fastowicz, K. Okarma |
701 |
| Integration and Selection of Linear SVM Classifiers in Geometric Space |
R. Burduk, J. Biedrzycki |
718 |
Content of Issue 7
DOI: 10.3217/jucs-025-07
|
| Managing Editor's Column |
C. Gütl |
731 |
| A Note Concerning Feedback and Queries for Web Pages |
N. Delilovic, H. Maurer |
733 |
| Mobile Applications for People with Parkinson's Disease: A Systematic Search in App Stores and Content Review |
S. Estévez, M.E. Cambronero, Y. García-Ruiz, L. Llana |
740 |
| Micro-business Requirements Patterns in Practice: Remote Communities in Developing Nations |
R. Macasaet, M. Noguera, M.L. Rodríguez, J.L. Garrido, S. Supakkul, L. Chung |
764 |
| On the Automated and Reactive Optimization of Highly-Dynamic Communication Network Infrastructures |
R. Mueller-Bady, M. Kappes, I. Medina-Bulo, F. Palomo-Lozano |
788 |
| Improving Ontology Matching Using Application Requirements for Segmenting Ontologies |
D. Pessoa, A.C. Salgado, B. Farias Lóscio |
816 |
| Effectiveness of Games in Software Project Management Education: An Experimental Study |
G. Petri, C. Gresse von Wangenheim, J.C. Rossa Hauck, A. Ferreti Borgatto |
840 |
Content of Issue 8
DOI: 10.3217/jucs-025-08
|
| Collaborative Technologies and Data Science in Smart City Applications |
N. Baloian, Y. Chen, A. Harutyunyan |
865 |
| Towards Secure and Efficient "white-box" Encryption |
G. Khachatrian, S. Abrahamyan |
868 |
| A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms |
M. Haroutunian, K. Mkhitaryan, J. Mothe |
887 |
| Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation |
Y. Chen, O.O. Koyluoglu, A.J.H. Vinck |
904 |
| On Machine Learning Approaches for Automated Log Management |
A.N. Harutyunyan, A.V. Poghosyan, N.M. Grigoryan, N.A. Hovhannisyan, N. Kushmerick |
925 |
| Planning of Urban Public Transportation Networks in a Smart City |
J. Frez, N. Baloian, J.A. Pino, G. Zurita, F. Basso |
946 |
| The Role of Verification and Validation Techniques within Visual Analytics |
B. Weyers, E. Auer, W. Luther |
967 |
| Identifying Groupware Requirements in People-Driven Mobile Collaborative Processes |
V. Herskovic, S.F. Ochoa, J.A. Pino |
988 |
| A Model for Resource Management in Smart Cities Based on Crowdsourcing and Gamification |
R. Barbosa Sousa Orrego, J.L.V. Barbosa |
1018 |
Content of Issue 9
DOI: 10.3217/jucs-025-09
|
| Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes |
A. Janicki, W. Mazurczyk, X. Luo, D. Ye |
1039 |
| Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits |
A. Fedorchenko, E. Doynikova, I. Kotenko |
1043 |
| A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios |
Y. Lakhdhar, S. Rekhis, N. Boudriga |
1066 |
| Precise Performance Characterization of Antivirus on the File System Operations |
M.I. Al-Saleh, H.M. Hamdan |
1089 |
| Mobile Agents for Detecting Network Attacks Using Timing Covert Channels |
J. Bieniasz, M. Stępkowska, A. Janicki, K. Szczypiorski |
1109 |
| Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay |
H. Tian, M. Huang, C.-C. Chang, Y. Huang, J. Lu, Y. Du |
1131 |
| Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images |
M. Huang, M. Xu, T. Qiao, T. Wu, N. Zheng |
1151 |
| The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach |
Z.A. Al-Sharif, M.I. Al-Saleh, Y. Jararweh, L. Alawneh, A.S. Shatnawi |
1174 |
| Digital Investigation of IoT Devices in the Criminal Scene |
F. Bouchaud, G. Grimaud, T. Vantroys, P. Buret |
1199 |
Content of Issue 10
DOI: 10.3217/jucs-025-10
|
| Intelligent Computing for Society |
I.S. Bajwa, F.D. Kamareddine, P. Thangarajah |
1219 |
| Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES |
K. Shankar, M. Elhoseny |
1221 |
| Research on Fair Trading Mechanism of Surplus Power Based on Blockchain |
Z. Xia, J. Tan, J. Wang, R. Zhu, H. Xiao, A.K. Sangaiah |
1240 |
| High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform |
A. Ali, I.S. Bajwa, R. Kazmi |
1261 |
| A Smart Hydroponics-Based System for Child Education |
S. Dinçer, Y. Bitirim |
1279 |
| Decision-making Model at Higher Educational Institutions based on Machine Learning |
Y.V. Nieto, V. García-Díaz, C.E. Montenegro |
1301 |
| SENTIPEDE: A Smart System for Sentiment-based Personality Detection from Short Texts |
A. Darliansyah, M.A. Naeem, F. Mirza, R. Pears |
1323 |
| An Intelligent Data Analytics based Model Driven Recommendation System |
B. Ramzan, I. Sarwar Bajwa, R. Kazmi, S. Ramzan |
1353 |
| A Web3.0-based Intelligent Learning System Supporting Education in the 21st Century |
K. Halimi, H. Seridi-Bouchelaghem |
1373 |
Content of Issue 11
DOI: 10.3217/jucs-025-11
|
| Cyberattack Detection and Response |
J. Keller, W. Mazurczyk, B. Genge, L. Fritsch, S. Vrhovec |
1394 |
| Detection of Size Modulation Covert Channels Using Countermeasure Variation |
S. Wendzel, F. Link, D. Eller, W. Mazurczyk |
1396 |
| Analysis of the Infection and the Injection Phases of the Telnet Botnets |
T. Bajtoš, P. Sokol, A. Gajdoš, K. Lučivjanská, T. Mézešová |
1417 |
| Cyberattack Response Model for the Nuclear Regulator in Slovenia |
S. Tomažič, I. Bernik |
1437 |
| Testing the Human Backdoor: Organizational Response to a Phishing Campaign |
A. Mihelič, M. Jevšček, S. Vrhovec, I. Bernik |
1458 |
| Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure |
H.I. Kure, S. Islam |
1478 |
Content of Issue 12
DOI: 10.3217/jucs-025-12
|
| Advances in Web-Based Learning |
R. Klamma, M. Spaniol, S. Unankard |
1503 |
| Improving Teacher Game Learning Analytics Dashboards through ad-hoc Development |
A. Calvo-Morata, C. Alonso-Fernández, I.J. Pérez-Colado, M. Freire, I. Martínez-Ortiz, B. Fernández-Manjón |
1507 |
| Implementing Flipped Classroom that Used a Context Aware Mobile Learning System into Learning Process |
M. Lamia, M. Hafidi, A. Tricot, O. Benmesbah |
1531 |
| STEM Oriented Online Platforms Embracing the Community of Practice Model: A Comparative Study and Design Guidelines |
O. Fragou, C. Goumopoulos, C. Tsompanos |
1554 |
| Badges for Peer Assessment of Teamwork in Organized Education |
Z. Kubincová, D. Šuníková, M. Homola |
1589 |
| Integrating 3D Objects in Collaborative Non-Linear Storytelling on the Web |
P. de Lange, P. Nicolaescu, J. Benscheid, R. Klamma |
1608 |
| Overcoming the Silver Generation Digital Gap |
C. Vaz de Carvalho, P. Cano, J.M. Roa, A. Wanka, F. Kolland |
1625 |
| Gamification Support for Learning in Spatial Computing Environments |
B. Hensen, I. Koren, R. Klamma |
1644 |
Content of Issue 13
DOI: 10.3217/jucs-025-13
|
| Managing Editor's Column |
C. Gütl |
1666 |
| Adopting Trust in Learning Analytics Infrastructure: A Structured Literature Review |
G.-P. Ciordas-Hertel, J. Schneider, S. Ternier, H. Drachsler |
1668 |
| Improving Multi-Label Classification for Learning Objects Categorization by Taking into Consideration Usage Information |
P.G. Espejo, E. Gibaja, V.H. Menéndez, A. Zapata, C. Romero |
1687 |
| Applicability of User Experience and Usability Questionnaires |
A. Hinderks, D. Winter, M. Schrepp, J. Thomaschewski |
1717 |
| A Revised Framework for the Governance and Management of Green IT |
J.D. Patón-Romero, M.T. Baldassarre, M. Rodríguez, M. Piattini |
1736 |
| MulseOnto: a Reference Ontology to Support the Design of Mulsemedia Systems |
E.B. Saleme, C.A.S. Santos, R.A. Falbo, G. Ghinea, F. Andres |
1761 |
|