C. Blanco, I. García-Rodríguez de Guzmán, E. Fernández-Medina, J. Trujillo: Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications /jucs_20_2/showing_the_benefits_of
Y. Lakhdhar, S. Rekhis, N. Boudriga: A Context-based Defense Model for Assessing Cyber Systems' Ability To Defend Against Known And Unknown Attack Scenarios /jucs_25_9/a_context_based_defense
A. Mihelič, M. Jevšček, S. Vrhovec, I. Bernik: Testing the Human Backdoor: Organizational Response to a Phishing Campaign /jucs_25_11/testing_the_human_backdoor
K. Shankar, M. Elhoseny: Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES /jucs_25_10/trust_based_cluster_head
S. Vrhovec, D. Fujs, L. Jelovčan, A. Mihelič: Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity /jucs_26_7/evaluating_case_study_and