1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2018

Experimental large-scale review of attractors for detection of potentially unwanted applications

Stavova, V., Dedkova, L., Matyas, V., Just, M., Smahel, D. & Ukrop, M., Jul 2018, In : Computers and Security. 76, p. 92-100 9 p.

Research output: Contribution to journalArticle

Open Access
File
23 Downloads (Pure)

Hardware-Assisted Secure Communication in Embedded and Multi-Core Computing Systems

Saeed, A., Ahmadinia, A. & Just, M., 15 May 2018, In : Computers. 7, 2, 31.

Research output: Contribution to journalArticle

Open Access
File
19 Downloads (Pure)
2017

Factors influencing the purchase of security software for mobile devices - Case study

Stavova, V., Matyas, V., Just, M. & Ukrop, M., Mar 2017, In : Infocommunications Journal. 9, 1, p. 18-23 6 p.

Research output: Contribution to journalArticle

2016

Secure On-Chip Communication Architecture for Reconfigurable Multi-Core Systems

Saeed, A., Ahmadinia, A. & Just, M., 14 Apr 2016, In : Journal of Circuits, Systems and Computers. 1650089.

Research output: Contribution to journalArticle

Open Access
File
204 Downloads (Pure)
Open Access
File
124 Downloads (Pure)
2015

Investigating the work practices of network security professionals

Adnan, M., Just, M., Baillie, L. & Kayacik, H. G., 2015, In : Information and Computer Security. 23, 3, p. 347-367 21 p.

Research output: Contribution to journalArticle

Open Access
File
91 Downloads (Pure)
2010

Challenging challenge questions: an experimental analysis of authentication technologies and user behaviour

Just, M. & Aspinall, D., Apr 2010, In : Policy and Internet. 2, 1, p. 95-111

Research output: Contribution to journalArticle

2004

Designing and evaluating challenge-question systems

Just, M., Sep 2004, In : IEEE Security and Privacy Magazine. 2, 5, p. 32-39

Research output: Contribution to journalArticle