Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic D. - Software
Topic D.4 - OPERATING SYSTEMS
Topic D.4.9 - Systems Programs and Utilities

M.I. Al-Saleh, E. Qawasmeh, Z.A. Al-Sharif:
Utilizing Debugging Information of Applications in Memory Forensics
/jucs_26_7/utilizing_debugging_information_of
page 805 - 826
Vol.26 / Issue 7
O.A. Alzubi, T.M. Chen, J.A. Alzubi, H. Rashaideh, N. Al-Najdawi:
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves
/jucs_22_4/secure_channel_coding_schemes
page 552 - 566
Vol.22 / Issue 4
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
/jucs_17_11/performance_evaluation_of_snort
page 1605 - 1622
Vol.17 / Issue 11