default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 8
Volume 8, Number 1, March 2017
- Jason R. C. Nurse, Elisa Bertino:
Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality. 1-3 - Peter Mell, James M. Shook, Richard E. Harang, Serban I. Gavrila:
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems. 4-25 - Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese:
Formalising Policies for Insider-threat Detection: A Tripwire Grammar. 26-43 - Florian Kammüller, Manfred Kerber, Christian W. Probst:
Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation. 44-78 - Fulvio Valenza, Tao Su, Serena Spinoso, Antonio Lioy, Riccardo Sisto, Marco Vallini:
A formal approach for network security policy validation. 79-100
Volume 8, Number 2, June 2017
- Ryo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
A Simply Energy-efficient Migration Algorithm of Processes with Virtual Machines in Server Clusters. 1-18 - Elena Torroglosa-García, Antonio F. Skarmeta-Gómez:
Towards Interoperabilty in Identity Federation Systems. 19-43 - Giovanni Pau, Mario Collotta, Salvatore Tirrito, Riccardo Caponetto:
An Innovative Approach for the Management of Cross-Coupling Interference in Street Lighting Networks. 44-63 - Meriem Guerar, Alessio Merlo, Mauro Migliardi:
ClickPattern: A Pattern Lock System Resilient to Smudge and Side-channel Attacks. 64-78
Volume 8, Number 3, September 2017
- Kazy Noor E. Alam Siddiquee, Karl Andersson, Faria Farjana Khan, Mohammad Shahadat Hossain:
A Scalable and Secure MANET for an i-Voting System. 1-17 - Yang-Wai Chow, Willy Susilo, James G. Phillips, Joonsang Baek, Elena Vlahu-Gjorgievska:
Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview. 18-35 - Amjed Majeed, Tanveer A. Zia:
Multi-Layer Network Architecture for Supporting Multiple Applications in Wireless Sensor Networks. 36-56 - Noriki Uchida, Shoma Takeuchi, Tomoyuki Ishida, Yoshitaka Shibata:
Mobile Traffic Accident Prevention System based on Chronological Changes of Wireless Signals and Sensors. 57-66
Volume 8, Number 4, December 2017
- Abhishta, Reinoud Joosten, Lambert J. M. Nieuwenhuis:
Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices. 1-18 - Vincenzo Conti, Leonardo Rundo, Carmelo Militello, Giancarlo Mauri, Salvatore Vitabile:
Resource-Efficient Hardware Implementation of a Neural-based Node for Automatic Fingerprint Classification. 19-36 - Eyad Taqieddin, Fahed Awad, Hani Ahmad:
Location-Aware and Mobility-Based Performance Optimization for Wireless Sensor Networks. 37-59 - Igor V. Kotenko, Igor Saenko, Alexey Kushnerevich:
Parallel big data processing system for security monitoring in Internet of Things networks. 60-74
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.