• Home
  • Browse
    • Current Issue
    • By Issue
    • By Author
    • By Subject
    • Author Index
    • Keyword Index
  • Journal Info
    • About Journal
    • Aims and Scope
    • Editorial Board
    • Publication Ethics
    • Open Access Policy and Copyright
    • Indexing and Abstracting
    • Related Links
    • FAQ
    • Peer Review Process
    • News
  • Journal Metrics
  • Guide for Authors
  • Submit Manuscript
  • Reviewers
    • All Reviewers
    • Reviewrs 2019
    • Reviewers 2020
    • Reviewer2021
    • Reviewer2022
  • Contact Us
  • Login
  • Register
Volume & Issue: Volume 6, Issue 2, July 2019, Pages 43-80 
Number of Articles: 3

Research Article

eXtreme Modeling: an approach to agile model-based development

Pages 43-52

10.22108/jcs.2019.115445.1018

Shekoufeh Kolahdouz Rahimi; Kevin Lano; Hessa Alfraihi; Howard P.Haughton

  • View Article
  • PDF 1.72 M

CSE: A Novel Dynamic Obfuscation Based on Control Flow, Signals and Encryption

Pages 53-63

10.22108/jcs.2020.115402.1017

Bahare Hashemzade; Majid Abdolrazzagh-Nezhad

  • View Article
  • PDF 914.87 K

BLProM: A black-box approach for detecting business-layer processes in the web applications

Pages 65-80

10.22108/jcs.2020.117223.1028

Mitra Alidoosti; Alireza Nowroozi; Ahmad Nickabadi

  • View Article
  • PDF 704.34 K

Journal of Computing and Security
  • Articles in Press
  • Current Issue

Journal Archive

Volume 10 (2023)
Volume 9 (2022)
Volume 8 (2021)
Volume 7 (2020)
Volume 6 (2019)
Issue 2
Issue 1
Volume 5 (2018)
Volume 4 (2017)
Volume 3 (2016)
Volume 2 (2015)
Volume 1 (2014)

Explore Journal

  • Home
  • About Journal
  • Editorial Board
  • Submit Manuscript
  • Contact Us
  • Glossary
  • Sitemap

Latest News

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Journal of Computing and Security

Newsletter Subscription

Subscribe to the journal newsletter and receive the latest news and updates

  • © Journal Management System. Powered by Sinaweb