default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 7
Volume 7, Number 1, March 2016
- Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers. 1-22 - Tomotaka Kimura, Chinthaka Premachandra:
Optimal Relay Node Selection in Two-Hop Routing for Intermittently Connected MANETs. 23-38 - Chika Eze, Jason R. C. Nurse, Jassim Happa:
Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices. 39-57 - Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, Igor V. Kotenko:
Technique of Data Visualization: Example of Network Topology Display for Security Monitoring. 58-78 - Bharat K. Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, Pelin Angin:
A Systematic Approach for Attack Analysis and Mitigation in V2V Networks. 79-96 - William Casey, Jose Andre Morales, Bud Mishra:
Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model. 97-117
Volume 7, Number 2, June 2016
- Igor V. Kotenko:
Guest Editorial: Advances in Secure Distributed and Network-Based Computing. 1-2 - Huihui Yang, Vladimir A. Oleshchuk, Andreas Prinz:
Verifying Group Authentication Protocols by Scyther. 3-19 - István Hegedüs, Árpád Berta, Márk Jelasity:
Robust Decentralized Differentially Private Stochastic Gradient Descent. 20-40 - Fabrizio Baiardi, Federico Tonelli, Lorenzo Isoni:
Application Vulnerabilities in Risk Assessment and Management. 41-59 - Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko:
Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System. 60-80
Volume 7, Number 3, September 2016
- Sébastien Faye, Nicolas Louveton, Gabriela Gheorghe, Thomas Engel:
A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data. 1-21 - Subhashree V. K., Tharini C.:
Real-Time Implementation of Locality Sensitive Hashing Using NI WSN and LabVIEW for Outlier Detection in Wireless Sensor Networks. 22-39 - Kyeonghwan Lim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han:
An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks. 40-52 - Sumeet Thombre, Raihan Ul Islam, Karl Andersson, Mohammad Shahadat Hossain:
IP based Wireless Sensor Networks: Performance Analysis using Simulations and Experiments. 53-76 - Hassan Sbeyti, Mohamad Malli, Khalid Suliman Al-Tahat, Ahmad Fadlallah, Mohamad Youssef:
Scalable extensible middleware framework for context-aware mobile applications (SCAMMP). 77-98
Volume 7, Number 4, December 2016
- Fábio Correia, Artur Mariano, Alberto Proença, Christian H. Bischof, Erik Agrell:
Parallel Improved Schnorr-Euchner Enumeration SE++ on Shared and Distributed Memory Systems, With and Without Extreme Pruning. 1-19 - Enrico Carniani, Gianpiero Costantino, Francesco Marino, Fabio Martinelli, Paolo Mori:
Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions. 20-40 - Borja Bordel Sánchez, Ramón Alcarria, Diego Sánchez de Rivera, Álvaro Sánchez-Picot:
Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems. 41-64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.