default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 93 matches
- 2019
- Jörg Keller, Wojciech Mazurczyk, Béla Genge, Lothar Fritsch, Simon Vrhovec:
Cyberattack Detection and Response. J. Univers. Comput. Sci. 25(11): 1394-1395 (2019) - K. Shankar, Mohamed Elhoseny:
Trust Based Cluster Head Election of Secure Message Transmission in MANET Using Multi Secure Protocol with TDES. J. Univers. Comput. Sci. 25(10): 1221-1239 (2019) - Mohammed I. Al-Saleh, Hanan M. Hamdan:
Precise Performance Characterization of Antivirus on the File System Operations. J. Univers. Comput. Sci. 25(9): 1089-1108 (2019) - Ziad A. Al-Sharif, Mohammed I. Al-Saleh, Yaser Jararweh, Luay Alawneh, Ahmed S. Shatnawi:
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach. J. Univers. Comput. Sci. 25(9): 1174-1198 (2019) - Akhtar Ali, Imran Sarwar Bajwa, Rafaqut Kazmi:
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform. J. Univers. Comput. Sci. 25(10): 1261-1278 (2019) - Lukasz Apiecionek, Marcel Großmann, Udo R. Krieger:
Harmonizing IoT-Architectures with Advanced Security Features - A Survey and Case Study. J. Univers. Comput. Sci. 25(6): 571-590 (2019) - Tomás Bajtos, Pavol Sokol, Andrej Gajdos, Katarína Lucivjanská, Terézia Mézesová:
Analysis of the Infection and the Injection Phases of the Telnet Botnets. J. Univers. Comput. Sci. 25(11): 1417-1436 (2019) - Imran Sarwar Bajwa, Fairouz Kamareddine, Pamini Thangarajah:
Intelligent Computing for Society. J. Univers. Comput. Sci. 25(10): 1219-1220 (2019) - Nelson Baloian, Yanling Chen, Ashot N. Harutyunyan:
Collaborative Technologies and Data Science in Smart City Applications. J. Univers. Comput. Sci. 25(8): 865-867 (2019) - Jedrzej Bieniasz, Krzysztof Szczypiorski:
Methods for Information Hiding in Open Social Networks. J. Univers. Comput. Sci. 25(2): 74-97 (2019) - Jedrzej Bieniasz, Monika Stepkowska, Artur Janicki, Krzysztof Szczypiorski:
Mobile Agents for Detecting Network Attacks Using Timing Covert Channels. J. Univers. Comput. Sci. 25(9): 1109-1130 (2019) - Guillermo Santamaría Bonfil, G. Escobedo-Briones, Miguel Pérez-Ramírez, Gustavo Arroyo-Figueroa:
A Learning Ecosystem for Linemen Training based on Big Data Components and Learning Analytics. J. Univers. Comput. Sci. 25(5): 541-568 (2019) - François Bouchaud, Gilles Grimaud, Thomas Vantroys, Pierrick Buret:
Digital Investigation of IoT Devices in the Criminal Scene. J. Univers. Comput. Sci. 25(9): 1199-1218 (2019) - Slawomir Bujnowski, Tomasz Marciniak, Beata Marciniak, Zbigniew Lutowski:
Impact of Resource Control in Irregular Networks on their Transmission Properties. J. Univers. Comput. Sci. 25(6): 591-610 (2019) - Robert Burduk, Jedrzej Biedrzycki:
Integration and Selection of Linear SVM Classifiers in Geometric Space. J. Univers. Comput. Sci. 25(6): 718-730 (2019) - Antonio Calvo-Morata, Cristina Alonso-Fernández, Iván J. Pérez-Colado, Manuel Freire, Iván Martínez-Ortiz, Baltasar Fernández-Manjón:
Improving Teacher Game Learning Analytics Dashboards through ad-hoc Development. J. Univers. Comput. Sci. 25(12): 1507-1530 (2019) - Carlos Vaz de Carvalho, Pedro Cano, José María Roa, Anna Wanka, Franz Kolland:
Overcoming the Silver Generation Digital Gap. J. Univers. Comput. Sci. 25(12): 1625-1643 (2019) - Yuan Chen, Qingkuan Dong, Yannan Li, Qiqi Lai, Zhedong Wang:
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms. J. Univers. Comput. Sci. 25(3): 158-181 (2019) - Yanling Chen, Onur Ozan Koyluoglu, A. J. Han Vinck:
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation. J. Univers. Comput. Sci. 25(8): 904-924 (2019) - George-Petru Ciordas-Hertel, Jan Schneider, Stefaan Ternier, Hendrik Drachsler:
Adopting Trust in Learning Analytics Infrastructure: A Structured Literature Review. J. Univers. Comput. Sci. 25(13): 1668-1686 (2019) - Vladimir M. Ciric, Ivan Z. Milentijevic, Oliver M. Vojinovic, Nemanja S. Manic:
Cost Estimation of Blended Learning Course Delivery Through Public Cloud. J. Univers. Comput. Sci. 25(4): 310-333 (2019) - Sonia Contreras, Miguel Ángel Manzanedo, Álvaro Herrero:
A Hybrid Neural System to Study the Interplay between Economic Crisis and Workplace Accidents in Spain. J. Univers. Comput. Sci. 25(6): 667-682 (2019) - Adi Darliansyah, M. Asif Naeem, Farhaan Mirza, Russel Pears:
SENTIPEDE: A Smart System for Sentiment-based Personality Detection from Short Texts. J. Univers. Comput. Sci. 25(10): 1323-1352 (2019) - Namik Delilovic, Hermann Maurer:
A Note Concerning Feedback and Queries for Web Pages. J. Univers. Comput. Sci. 25(7): 733-739 (2019) - Samet Dinçer, Yiltan Bitirim:
A Smart Hydroponics-Based System for Child Education. J. Univers. Comput. Sci. 25(10): 1279-1300 (2019) - Xiuze Dong, Yunchuan Guo, Fenghua Li, Liju Dong, Arshad Khan:
Combination Model of Heterogeneous Data for Security Measurement. J. Univers. Comput. Sci. 25(3): 270-281 (2019) - Pedro G. Espejo, Eva Gibaja, Víctor H. Menéndez, Alfredo Zapata, Cristóbal Romero:
Improving Multi-Label Classification for Learning Objects Categorization by Taking into Consideration Usage Information. J. Univers. Comput. Sci. 25(13): 1687-1716 (2019) - Jaroslaw Fastowicz, Krzysztof Okarma:
Quality Assessment of Photographed 3D Printed Flat Surfaces Using Hough Transform and Histogram Equalization. J. Univers. Comput. Sci. 25(6): 701-717 (2019) - Andrey Fedorchenko, Elena Doynikova, Igor V. Kotenko:
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits. J. Univers. Comput. Sci. 25(9): 1043-1065 (2019) - Rogerio C. P. Fragoso, Roberto H. W. Pinheiro, George D. C. Cavalcanti:
Data-driven Feature Selection Methods for Text Classification: an Empirical Evaluation. J. Univers. Comput. Sci. 25(4): 334-360 (2019)
skipping 63 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-30 18:33 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint