default search action
Search dblp for Publications
export results for "stream:journals/jowua:"
@article{DBLP:journals/jowua/AlsmadiMAJASAAA24, author = {Mutasem K. Alsmadi and Rami Mustafa A. Mohammad and Malek Alzaqebah and Sana Jawarneh and Muath AlShaikh and Ahmad Al Smadi and Fahad A. Alghamdi and Jehad Saad Alqurni and Hayat Alfagham}, title = {Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {73--93}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.006}, doi = {10.58346/JOWUA.2024.I2.006}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AlsmadiMAJASAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AzourySS24, author = {Nehme Azoury and Satya Subrahmanyam and Nada Sarkis}, title = {The Influence of a Data-Driven Culture on Product Development and Organizational Success through the Use of Business Analytics}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {123--134}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.009}, doi = {10.58346/JOWUA.2024.I2.009}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AzourySS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BhilavadeSPA24, author = {Milind B. Bhilavade and K. S. Shivaprakasha and Meenakshi R. Patil and Lalita S. Admuthe}, title = {Fingerprint Reconstruction: Approaches to Improve Fingerprint Images}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {75--87}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.006}, doi = {10.58346/JOWUA.2024.I1.006}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BhilavadeSPA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChowdaryUJMV24, author = {P. Bharath Kumar Chowdary and R. Udayakumar and Chaya Jadhav and B. Mohanraj and V. R. Vimal}, title = {An Efficient Intrusion Detection Solution for Cloud Computing Environments Using Integrated Machine Learning Methodologies}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {14--26}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.002}, doi = {10.58346/JOWUA.2024.I2.002}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChowdaryUJMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DasariB24, author = {Deepthi Reddy Dasari and G. Hima Bindu}, title = {Feature Selection Model-based Intrusion Detection System for Cyberattacks on the Internet of Vehicles Using Cat and Mouse Optimizer}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {251--269}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.017}, doi = {10.58346/JOWUA.2024.I2.017}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/DasariB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DeviJSV24, author = {B. Aruna Devi and S. Jaganathan and Parag K. Shah and Narendran Venkatapathy}, title = {Prediction of Premature Retinopathy Fundus Images Using Dense Network Model for Intelligent Portable Screening Device}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {170--182}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.012}, doi = {10.58346/JOWUA.2024.I2.012}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/DeviJSV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EscobedoCGSRF24, author = {Fernando Escobedo and Henry Bernardo Garay Canales and Fernando Willy Morillo Galarza and Carlos Miguel Aguilar Salda{\~{n}}a and Eddy Miguel Aguirre Reyes and C{\'{e}}sar Augusto Flores{-}Tananta}, title = {Energy Efficient Business Management System for Improving QoS in Network Model}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {42--52}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.004}, doi = {10.58346/JOWUA.2024.I1.004}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EscobedoCGSRF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Fakiha24, author = {Bandr Fakiha}, title = {Investigating the Secrets, New Challenges, and Best Forensic Methods for Securing Critical Infrastructure Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {104--114}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.008}, doi = {10.58346/JOWUA.2024.I1.008}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Fakiha24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FarisMA24, author = {Rawaa A. Faris and Qusay Mosa and Mustafa Albdairi}, title = {Robust Classification for Sub Brain Tumors by Using an Ant Colony Algorithm with a Neural Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {270--285}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.018}, doi = {10.58346/JOWUA.2024.I2.018}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FarisMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Flores-Fernandez24, author = {Gustavo A. Flores{-}Fernandez and Miguel Jimenez{-}Carrion and Flabio Guti{\'{e}}rrez and Ra{\'{u}}l A. S{\'{a}}nchez{-}Ancajima}, title = {Genetic Algorithm and {LSTM} Artificial Neural Network for Investment Portfolio Optimization}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {27--46}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.003}, doi = {10.58346/JOWUA.2024.I2.003}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Flores-Fernandez24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HernandezCTVOMM24, author = {Ronald M. Hern{\'{a}}ndez and Walter Antonio Campos{-}Ugaz and Segundo Juan S{\'{a}}nchez Tarrillo and Silvia Josefina Aguinaga Vasquez and Sara Esther Liza Ordo{\~{n}}ez and Ronald Avellaneda Montenegro and Dora Elisa El{\'{\i}}as Mart{\'{\i}}nez and Doris E. Fuster{-}Guill{\'{e}}n}, title = {Exploring Software Infrastructures for Enhanced Learning Environments to Empowering Education}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {231--243}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.016}, doi = {10.58346/JOWUA.2024.I1.016}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HernandezCTVOMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Ismail24, author = {Walaa Saber Ismail}, title = {Emotion Detection in Text: Advances in Sentiment Analysis Using Deep Learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {17--26}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.002}, doi = {10.58346/JOWUA.2024.I1.002}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Ismail24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Ismail24a, author = {Walaa Saber Ismail}, title = {Human-Centric {AI} : Enhancing User Experience through Natural Language Interfaces}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {172--183}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.012}, doi = {10.58346/JOWUA.2024.I1.012}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Ismail24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KPSN24, author = {Afnaan. K and Peeta Basa Pati and Tripty Singh and Bhanu Prakash K. N.}, title = {Comparative Analysis for Feature Extraction and Prediction of {CKD} Using Machine Learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {202--225}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.014}, doi = {10.58346/JOWUA.2024.I2.014}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KPSN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KareemullaNPLRA24, author = {N. R. Mohamed Kareemulla and G. S. Nijaguna and Pushpa and N. Dayananda Lal and M. Naga Raju and Zameer Ahmed Adhoni}, title = {A Comprehensive Approach to a Hybrid Blockchain Framework for Multimedia Data Processing and Analysis in IoT-Healthcare}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {94--108}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.007}, doi = {10.58346/JOWUA.2024.I2.007}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KareemullaNPLRA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KhalifeSF24, author = {Danielle Khalife and Satya Subrahmanyam and Assaad Farah}, title = {A Sustainable Circular Business Model to Improve the Performance of Small and Medium-sized Enterprises Using Blockchain Technology}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {240--250}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.016}, doi = {10.58346/JOWUA.2024.I2.016}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KhalifeSF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KimS24, author = {Ha Rang Kim and Hyun Min Song}, title = {Lightweight {IDS} Framework Using Word Embeddings for In-Vehicle Network Security}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {1--13}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.001}, doi = {10.58346/JOWUA.2024.I2.001}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KimS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Lakshmi24, author = {Vimitha R. Vidhya Lakshmi}, title = {VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks in Opportunistic Mobile Social Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {154--171}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.011}, doi = {10.58346/JOWUA.2024.I1.011}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Lakshmi24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MalathiNMSSP24, author = {K. Malathi and Shruthi S. Nair and N. Madhumitha and S. Sreelakshmi and U. Sathya and M. Sangeetha Priya}, title = {Medical Data Integration and Interoperability through Remote Monitoring of Healthcare Devices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {60--72}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.005}, doi = {10.58346/JOWUA.2024.I2.005}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MalathiNMSSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MansouriBC24, author = {Sofiene Mansouri and Souhaila Boulares and Souhir Chabchoub}, title = {Machine Learning for Early Diabetes Detection and Diagnosis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {216--230}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.015}, doi = {10.58346/JOWUA.2024.I1.015}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MansouriBC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Monita24, author = {Vivi Monita}, title = {Rainfall Prediction from Himawari-8 Data Using the Deep Learning Method}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {47--59}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.004}, doi = {10.58346/JOWUA.2024.I2.004}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Monita24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MonratS024, author = {Ahmed Afif Monrat and Olov Schel{\'{e}}n and Karl Andersson}, title = {A Taxonomy Guideline for Blockchain Platforms}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {286--308}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.019}, doi = {10.58346/JOWUA.2024.I2.019}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MonratS024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NugrahaAE24, author = {I Gde Dharma Nugraha and Edwiansyah Zaky Ashadi and Ardiansyah Musa Efendi}, title = {Performance Evaluation of Collision Avoidance for Multi-node LoRa Networks based on {TDMA} and {CSMA} Algorithm}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {53--74}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.005}, doi = {10.58346/JOWUA.2024.I1.005}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NugrahaAE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NugrohoWWS24, author = {Arief Kelik Nugroho and Retantyo Wardoyo and Moh Edi Wibowo and Hardyanto Soebono}, title = {Thresholding Segmentation of Skin Lesions with Modified Ant Colony Optimization Algorithm}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {226--239}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.015}, doi = {10.58346/JOWUA.2024.I2.015}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NugrohoWWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Putra24, author = {Taufiq Odhi Dwi Putra}, title = {Container Load Placement for Deep Learning Application Using Whale Optimization}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {183--201}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.013}, doi = {10.58346/JOWUA.2024.I2.013}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Putra24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RajeshNS24, author = {M. Rajesh and S. R. Nagaraja and P. Suja}, title = {Multi - Robot Exploration Supported by Enhanced Localization with Reduction of Localization Error Using Particle Swarm Optimization}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {202--215}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.014}, doi = {10.58346/JOWUA.2024.I1.014}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RajeshNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RaoS24, author = {H. V. Ramana Rao and V. Ravi Sankar}, title = {Precision in Prostate Cancer Diagnosis: {A} Comprehensive Study on Neural Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {109--122}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.008}, doi = {10.58346/JOWUA.2024.I2.008}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RaoS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RizaYR24, author = {Bob Subhan Riza and Rina Yunita and Rika Rosnelly}, title = {Comparative Analysis of {LSTM} and BiLSTM in Image Detection Processing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {244--260}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.017}, doi = {10.58346/JOWUA.2024.I1.017}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RizaYR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Sathyanarayanan24, author = {S. Sathyanarayanan and K. Srikanta Murthy}, title = {Heart Sound Analysis Using SAINet Incorporating {CNN} and Transfer Learning for Detecting Heart Diseases}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {152--169}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.011}, doi = {10.58346/JOWUA.2024.I2.011}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Sathyanarayanan24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SmadiAAA24, author = {Ahmad Al Smadi and Ahed Abugabah and Mutasem K. Alsmadi and Ahmad Alsmadi}, title = {Smart Medical Application of Deep Learning (MUNet) for Detection of {COVID-19} from Chest Images}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {133--153}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.010}, doi = {10.58346/JOWUA.2024.I1.010}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SmadiAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SonPKY24, author = {Daehyeon Son and Youngshin Park and Bonam Kim and Ilsun You}, title = {A Study on the Implementation of a Network Function for Real-time False Base Station Detection for the Next Generation Mobile Communication Environment}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {184--201}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.013}, doi = {10.58346/JOWUA.2024.I1.013}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SonPKY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SongY24, author = {Hyunwoo Song and Jaeho Yu}, title = {Effects of Augmented Reality based Dual-Task Proprioceptive Training on Postural Stability, Positioning Sensation and Cognition}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {88--103}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.007}, doi = {10.58346/JOWUA.2024.I1.007}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SongY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SreevidyaS24, author = {B. Sreevidya and M. Supriya}, title = {Trust based Routing - {A} Novel Approach for Data Security in {WSN} based Data Critical Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {27--41}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.003}, doi = {10.58346/JOWUA.2024.I1.003}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SreevidyaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TalebO24, author = {Anas Abu Taleb and Ammar Odeh}, title = {Effective Routing of Mobile Sink in Wireless Sensor Networks Using Steiner Trees}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {2}, pages = {135--151}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i2.010}, doi = {10.58346/JOWUA.2024.I2.010}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TalebO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TriayudiAS24, author = {Agung Triayudi and Rima Tamara Aldisa and S. Sumiati}, title = {New Framework of Educational Data Mining to Predict Student Learning Performance}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {15}, number = {1}, pages = {115--132}, year = {2024}, url = {https://doi.org/10.58346/jowua.2024.i1.009}, doi = {10.58346/JOWUA.2024.I1.009}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TriayudiAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Abugabah23, author = {Ahed Abugabah}, title = {Smart Medical Systems Based IoT: Exploring the Relationship Between Essential Algorithms and Service Orientation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {115--127}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.009}, doi = {10.58346/JOWUA.2023.I4.009}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Abugabah23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AdrianiDSHSSR23, author = {Dessy Adriani and Ratna Dewi and Leni Saleh and D. Yadi Heryadi and Fatma Sarie and I Gede Iwan Sudipa and Robbi Rahim}, title = {Using Distance Measure to Perform Optimal Mapping with the K-Medoids Method on Medicinal Plants, Aromatics, and Spices Export}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {103--111}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.008}, doi = {10.58346/JOWUA.2023.I3.008}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AdrianiDSHSSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AjwadAKJM23, author = {Asmaa Abbas Ajwad and Ammar Abdulrahman Ahmed and Muntaha Kamal and Refed Adnan Jaleel and Marium Basheer Mahmood}, title = {Improved Secure IoTs-Based Visual Computing with Image Processing and Artificial Intelligence Techniques for Accurate Predicting of Novel {COVID}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {1--14}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.001}, doi = {10.58346/JOWUA.2023.I1.001}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AjwadAKJM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Alanazi23, author = {Jazem Mutared Alanazi}, title = {Effective Machine-Learning Based Traffic Surveillance Moving Vehicle Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {95--105}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.008}, doi = {10.58346/JOWUA.2023.I1.008}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Alanazi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AlharbiA23, author = {Mada Alharbi and Abdulatif Alabdulatif}, title = {Intelligent Transport System based Blockchain to Preventing Routing Attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {126--143}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.011}, doi = {10.58346/JOWUA.2023.I1.011}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AlharbiA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ArunaSV23, author = {Orchu Aruna and Sk. Sameerunnisa and Ramachandran Vedantham}, title = {Routing in Mobile ad Hoc Networks Using Machine Learning Techniques}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {84--95}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.007}, doi = {10.58346/JOWUA.2023.I4.007}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ArunaSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BabuB23, author = {Gopatoti John Samuel Babu and Manickam Baskar}, title = {Location Aware {DFS} Scheduling Based Improved Quality of Service Maximization with IoT Devices in Cloud}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {37--49}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.003}, doi = {10.58346/JOWUA.2023.I1.003}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BabuB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BharathiR23, author = {C. Bharathi and Duraisamy Rekha}, title = {Load Forecasting for Demand Side Management in Smart Grid using Non-Linear Machine Learning Technique}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {200--214}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.016}, doi = {10.58346/JOWUA.2023.I1.016}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BharathiR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BharathiSH23, author = {S. Bharathi and M. Senthilarasi and K. Hari}, title = {Key Frame Extraction Based on Real-Time Person Availability Using {YOLO}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {31--40}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.003}, doi = {10.58346/JOWUA.2023.I2.003}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BharathiSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BouhamedMZ23, author = {Emna Bouhamed and Hend Marouane and Faouzi Zerai}, title = {Dynamic Resource Allocation Approach for Interference Mitigation based on {NOMA} in Network Operating in Both Uplink and Downlink}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {23--44}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.003}, doi = {10.58346/JOWUA.2023.I4.003}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BouhamedMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BurhanAHJ23, author = {Iman Mohammed Burhan and Qusay Abboodi Ali and Inass Shahadha Hussein and Refed Adnan Jaleel}, title = {Mobile-computer Vision Model with Deep Learning for Testing Classification and Status of Flowers Images by using IoTs Devices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {82--94}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.007}, doi = {10.58346/JOWUA.2023.I1.007}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BurhanAHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ClavijoLopezVNFMVF23, author = {Rosa Clavijo{-}L{\'{o}}pez and Jes{\'{u}}s Merino Vel{\'{a}}squez and Wayky Alfredo Luy Navarrete and C{\'{e}}sar Augusto Flores{-}Tananta and Dorothy Luisa Mel{\'{e}}ndez Morote and Maria Aurora Gonzales Vigo and Doris E. Fuster{-}Guill{\'{e}}n}, title = {Energy-aware and Context-aware Fault Detection Framework for Wireless Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {1--13}, year = {2023}, url = {https://doi.org/10.58346/jowua.2023.i3.001}, doi = {10.58346/JOWUA.2023.I3.001}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ClavijoLopezVNFMVF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ElfarraSRAA23, author = {Belal K. Elfarra and Mamoun A. Salha and Raed S. Rasheed and Jehad Aldahdooh and Aiman Ahmed AbuSamra}, title = {Enhancing the Lifetime of {WSN} Using a Modified Ant Colony Optimization Algorithm}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {143--155}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.011}, doi = {10.58346/JOWUA.2023.I3.011}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ElfarraSRAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FisenkoASACGP23, author = {Olga Fisenko and Larisa Adonina and Heriberto Solis Sosa and Shiguay Guizado Giomar Arturo and Ang{\'{e}}lica S{\'{a}}nchez Castro and Fernando Willy Morillo Galarza and David Aroni Palomino}, title = {Advancements in Flexible Antenna Design: Enabling Tri-Band Connectivity for WLAN, WiMAX, and 5G Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {156--168}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.012}, doi = {10.58346/JOWUA.2023.I3.012}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FisenkoASACGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Fuster-GuillenZ23, author = {Doris E. Fuster{-}Guill{\'{e}}n and Oscar Gustavo Guadalupe Zevallos and Segundo Juan S{\'{a}}nchez Tarrillo and Silvia Josefina Aguinaga Vasquez and Miguel A. Saavedra{-}L{\'{o}}pez and Ronald M. Hern{\'{a}}ndez}, title = {An Ensemble-based Machine Learning Model for Investigating Children Interaction with Robots in Childhood Education}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {60--68}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.005}, doi = {10.58346/JOWUA.2023.I1.005}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Fuster-GuillenZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HassanAA23, author = {Sudad Gharib Hassan and Sara Alshwani and Aras Al{-}Dawoodi}, title = {Design and Investigation of Modal Excitation in Tapered Optical Fiber for a Mode Division Multiplexed Transmission System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {1--9}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.001}, doi = {10.58346/JOWUA.2023.I4.001}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HassanAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HengAS23, author = {Sovannarith Heng and Phet Aimtongkham and Chakchai So{-}In}, title = {A Novel Video-on-Demand Caching Scheme using Hybrid Fuzzy Logic Least Frequency and Recently Used with Support Vector Machine}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {15--36}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.002}, doi = {10.58346/JOWUA.2023.I1.002}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HengAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Hermansyah23, author = {Yus Hermansyah}, title = {Assessing the Impact of Communicative Artificial Intelligence Based Accounting Information Systems on Small and Medium Enterprises}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {230--239}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.017}, doi = {10.58346/JOWUA.2023.I3.017}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Hermansyah23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HurriyatiASLS23, author = {Ratih Hurriyati and A. Ana and Sulastri and Lisnawati and Thosporn Sawangsang}, title = {Stock Market Trend Analysis and Machine Learning-based Predictive Evaluation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {267--281}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.020}, doi = {10.58346/JOWUA.2023.I3.020}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HurriyatiASLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/IndriyaniGSW23, author = {I. Indriyani and Ida Ayu Dwi Giriantari and Made Sudarma and I Made Oka Widyantara}, title = {Facial Skin Type Detection for Race Classification using Convolutional Neural Network and Haar Cascade Method}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {41--58}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.004}, doi = {10.58346/JOWUA.2023.I2.004}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/IndriyaniGSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KavithaK23, author = {S. Kavitha and R. Kaniezhil}, title = {Enhanced Wireless Network Usage and Loading on Network Delay using Cognitive Radio Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {10--22}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.002}, doi = {10.58346/JOWUA.2023.I4.002}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KavithaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KhasawnehK23, author = {Yusra Jadallah Abed Khasawneh and Mohamad Ahmad Saleem Khasawneh}, title = {Availability of Voice-Recognition Devices to Support Visually Impaired Students in Saudi Arabian Universities}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {186--193}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.014}, doi = {10.58346/JOWUA.2023.I3.014}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KhasawnehK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KhoeurtSMA23, author = {Sopha Khoeurt and Chakchai So{-}In and Pakarat Musikawan and Phet Aimtongkham}, title = {Multidirectional Trust-Based Security Mechanisms for Sinkhole Attack Detection in the {RPL} Routing Protocol for Internet of Things}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {48--76}, year = {2023}, url = {https://doi.org/10.58346/jowua.2023.i3.005}, doi = {10.58346/JOWUA.2023.I3.005}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KhoeurtSMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kim23, author = {Jongkil Kim}, title = {Studies on Inspecting Encrypted Data: Trends and Challenges}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {189--199}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.015}, doi = {10.58346/JOWUA.2023.I1.015}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kim23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KumaranTVSV23, author = {U. Kumaran and S. Thangam and Nidhin Prabhakar T. V and Jana Selvaganesan and H. N. Vishwas}, title = {Adversarial Defense: {A} {GAN-IF} Based Cyber-security Model for Intrusion Detection in Software Piracy}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {96--114}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.008}, doi = {10.58346/JOWUA.2023.I4.008}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KumaranTVSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LatifahWPC23, author = {E. Latifah and A. Fathjri Wisesa and N. Adi Pramono and T. Chusniyah}, title = {Optimization of Depression Level Detection Based on Noninvasive Parameters with Artificial Neural Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {74--83}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.006}, doi = {10.58346/JOWUA.2023.I4.006}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LatifahWPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LopezGJRH23, author = {Mirko Bruno Vela L{\'{o}}pez and Mar{\'{\i}}a Ysabel Arangur{\'{\i}} Garc{\'{\i}}a and Jessie Leila Bravo Jaico and {\'{A}}ngel Antonio Ruiz{-}Pico and Ronald M. Hern{\'{a}}ndez}, title = {Application of a Data Mining Model to Predict Customer Defection. Case of a Telecommunications Company in Peru}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {144--158}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.012}, doi = {10.58346/JOWUA.2023.I1.012}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LopezGJRH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MajjaruS23, author = {Chandrababu Majjaru and K. Senthilkumar}, title = {Strengthening IoT Intrusion Detection through the {HOPNET} Model}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {89--102}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.007}, doi = {10.58346/JOWUA.2023.I3.007}, timestamp = {Mon, 05 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MajjaruS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Mansouri23, author = {Sofiene Mansouri}, title = {Application of Neural Networks in the Medical Field}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {69--81}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.006}, doi = {10.58346/JOWUA.2023.I1.006}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Mansouri23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MansouriCAA23, author = {Sofiene Mansouri and Souhir Chabchoub and Yousef Alharbi and Abdulrahman Alqahtani}, title = {Blockchain Technology in Enhancing Health Care Ecosystem for Sustainable Development}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {240--252}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.018}, doi = {10.58346/JOWUA.2023.I3.018}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MansouriCAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MerinBRR23, author = {J. Brindha Merin and W. Aisha Banu and Akila R. and A. Radhika}, title = {Semantic Annotation Based Mechanism for Web Service Discovery and Recommendation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {169--185}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.013}, doi = {10.58346/JOWUA.2023.I3.013}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MerinBRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Modhugu23, author = {Venugopal Reddy Modhugu}, title = {Efficient Hybrid {CNN} Method to Classify the Liver Diseases}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {36--47}, year = {2023}, url = {https://doi.org/10.58346/jowua.2023.i3.004}, doi = {10.58346/JOWUA.2023.I3.004}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Modhugu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MohamedMN23, author = {Amira Mohamed and Mohamed H. Mousa and Hamed Nassar}, title = {Effectiveness of Guard Zone in Mitigating Interference in {D2D} Underlaid Cellular Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {112--124}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.021}, doi = {10.58346/JOWUA.2023.I3.021}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MohamedMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MohammedH23, author = {Salim Qadir Mohammed and Mohammed A. ElSheikh Hussein}, title = {Reducing False Negative Intrusions Rates of Ensemble Machine Learning Model based on Imbalanced Multiclass Datasets}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {12--30}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.002}, doi = {10.58346/JOWUA.2023.I2.002}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MohammedH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MustapaRCFPR23, author = {Mahmud Mustapa and Ummiati Rahmah and Pandu Adi Cakranegara and Winci Firdaus and Dendi Pratama and Robbi Rahim}, title = {Implementation of Feature Selection and Data Split using Brute Force to Improve Accuracy}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {50--59}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.004}, doi = {10.58346/JOWUA.2023.I1.004}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MustapaRCFPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Nirmala23, author = {M. S. Nirmala}, title = {Behavioural Analysis of Deaf and Mute People Using Gesture Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {125--142}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.010}, doi = {10.58346/JOWUA.2023.I3.010}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Nirmala23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Ocana-Fernandez23, author = {Yolvi J. Oca{\~{n}}a{-}Fern{\'{a}}ndez and Walter G{\'{o}}mez{-}Gonzales and Luis Alex Valenzuela Fern{\'{a}}ndez and Segundo Pio V{\'{a}}squez Ramos and Huguette Fortunata Due{\~{n}}as Z{\'{u}}{\~{n}}iga and Jackeline Roxana Huaman Fernandez and Marco Antonio Amapanqui Broncano}, title = {A Novel Approach to Predict the Early Childhood Special Education Learning Skills of Autistic Children Using Ensemble Machine Learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {59--65}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.005}, doi = {10.58346/JOWUA.2023.I2.005}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Ocana-Fernandez23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/OdehT23, author = {Ammar Odeh and Anas Abu Taleb}, title = {A Multi-Faceted Encryption Strategy for Securing Patient Information in Medical Imaging}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {164--176}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.012}, doi = {10.58346/JOWUA.2023.I4.012}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/OdehT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RMRB23, author = {Akila R. and J. Brindha Merin and A. Radhika and Niyati Kumari Behera}, title = {Human Activity Recognition Using Ensemble Neural Networks and The Analysis of Multi-Environment Sensor Data Within Smart Environments}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {218--229}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.016}, doi = {10.58346/JOWUA.2023.I3.016}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RMRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RahmatNPAFR23, author = {Abdul Rahmat and Ahmad Arif Nurrahman and Susatyo Adhi Pramono and Dadi Ahmadi and Winci Firdaus and Robbi Rahim}, title = {Data Optimization using {PSO} and K-Means Algorithm}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {14--24}, year = {2023}, url = {https://doi.org/10.58346/jowua.2023.i3.002}, doi = {10.58346/JOWUA.2023.I3.002}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RahmatNPAFR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RameshJ23, author = {R. Ramesh and M. Jeyakarthic}, title = {Fuzzy Support Vector Machine Based Outlier Detection for Financial Credit Score Prediction System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {60--73}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.005}, doi = {10.58346/JOWUA.2023.I4.005}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RameshJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RosnellyRS23, author = {Rika Rosnelly and Bob Subhan Riza and S. Suparni}, title = {Comparative Analysis of Support Vector Machine and Convolutional Neural Network for Malaria Parasite Classification and Feature Extraction}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {194--217}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.015}, doi = {10.58346/JOWUA.2023.I3.015}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RosnellyRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SinhaNM23, author = {Sourav Sinha and Revathi Sathiya Narayanan and Indrajit Mukherjee}, title = {A Novel Multi-Layer Sparse Regularizer based {GRU} Model for Consumer Reviews Summarization}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {159--173}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.013}, doi = {10.58346/JOWUA.2023.I1.013}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SinhaNM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SolikinD23, author = {Ikin Solikin and Deni Darmawan}, title = {Impact of Artificial Intelligence in Improving the Effectiveness of Accounting Information Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {82--93}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.007}, doi = {10.58346/JOWUA.2023.I2.007}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SolikinD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SomsukASKS23, author = {Kritsanapong Somsuk and Sarutte Atsawaraungsuk and Chanwit Suwannapong and Suchart Khummanee and Chalida Sanemueang}, title = {The Optimal Equations with Chinese Remainder Theorem for RSA's Decryption Process}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {109--120}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.009}, doi = {10.58346/JOWUA.2023.I2.009}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SomsukASKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SrinadiHJ23, author = {Ni Luh Putri Srinadi and Dadang Hermawan and Anak Agung Ngurah Adhi Jaya}, title = {Advancement of Banking and Financial Services Employing Artificial Intelligence and the Internet of Things}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {106--117}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.009}, doi = {10.58346/JOWUA.2023.I1.009}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SrinadiHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SubhashiniR23, author = {S. Subhashini and S. Revathi}, title = {A New Fusion Feature Selection Model {(FFSM)} based Feature Extraction System for Hand Gesture Recognition}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {149--163}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.011}, doi = {10.58346/JOWUA.2023.I4.011}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SubhashiniR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Suleiman23, author = {Husam Suleiman}, title = {{\unicode{119875}}c{\unicode{120576}}{\unicode{120581}}max-Means++: Adapt-{\unicode{119875}} Driven by Energy and Distance Quality Probabilities Based on {\unicode{120581}}-Means++ for the Stable Election Protocol {(SEP)}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {128--148}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.010}, doi = {10.58346/JOWUA.2023.I4.010}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Suleiman23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SunartoKMDAR23, author = {Ading Sunarto and Putri Nilam Kencana and Baliyah Munadjat and Iriana Kusuma Dewi and Ali Zaenal Abidin and Robbi Rahim}, title = {Application of Boosting Technique with {C4.5} Algorithm to Reduce the Classification Error Rate in Online Shoppers Purchasing Intention}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {1--11}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.001}, doi = {10.58346/JOWUA.2023.I2.001}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SunartoKMDAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SuprihartiniTAC23, author = {Yayuk Suprihartini and Taryana and Andiyan and Pandu Adi Cakranegara and Dani Dwiyandana}, title = {Utilization of Motion Sensors to Reduce Electricity Consumption in Buildings}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {94--108}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.008}, doi = {10.58346/JOWUA.2023.I2.008}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SuprihartiniTAC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TelloASMA23, author = {Alcides Bernardo Tello and Sohaib Alam and Archana Ravindra Salve and Kusuma Kumari B. M and Meena Arora}, title = {Quantitative Evaluation of Android Application Privacy Security Based on Privacy Policy and Behaviour}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {253--266}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.019}, doi = {10.58346/JOWUA.2023.I3.019}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TelloASMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ThiruvalarRPSS23, author = {V. Naren Thiruvalar and Yamini R. and Manimekalai M. A. P. and I Wayan Suryasa and Sugapriya S.}, title = {Enhancing User Experiences in Ubiquitous Soft Computing Environments with Fuzzy Agent Middleware}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {25--35}, year = {2023}, url = {https://doi.org/10.58346/jowua.2023.i3.003}, doi = {10.58346/JOWUA.2023.I3.003}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ThiruvalarRPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TranLT23, author = {Vinh Duc Tran and Phi Thuong Le and Viet Cuong Trinh}, title = {A Secure Proxy Re-Signature Scheme for IoT}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {174--188}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.014}, doi = {10.58346/JOWUA.2023.I1.014}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TranLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/UdayakumarKSE23, author = {R. Udayakumar and Muhammad Abul Kalam and R. Sugumar and R. Elankavi}, title = {Assessing Learning Behaviors Using Gaussian Hybrid Fuzzy Clustering {(GHFC)} in Special Education Classrooms}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {1}, pages = {118--125}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I1.010}, doi = {10.58346/JOWUA.2023.I1.010}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/UdayakumarKSE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/UdayakumarPGVS23, author = {R. Udayakumar and Suvarna Yogesh Pansambal and Yogesh Manohar Gajmal and V. R. Vimal and R. Sugumar}, title = {User Activity Analysis Via Network Traffic Using {DNN} and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {66--81}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.006}, doi = {10.58346/JOWUA.2023.I2.006}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/UdayakumarPGVS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VargasLAPCPG23, author = {Isabel Menacho Vargas and Carlos Luy{-}Montejo and Lourdes Ivonne del Carmen Alcaide{-}Aranda and Doris Isabel Goicochea Parks and Yoni Magali Maita Cruz and Jessica Paola Palacios{-}Garay and Aracelli del Carmen Gonzales{-}S{\'{a}}nchez}, title = {Improved Butterfly Optimization Algorithm for Energy Efficient Antenna Selection Over Wireless Cellular Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {121--136}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.010}, doi = {10.58346/JOWUA.2023.I2.010}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VargasLAPCPG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VeerasamyF23, author = {K. Veerasamy and E. J. Thomson Fredrik}, title = {Intelligence System towards Identify Weeds in Crops and Vegetables Plantation Using Image Processing and Deep Learning Techniques}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {4}, pages = {45--59}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I4.004}, doi = {10.58346/JOWUA.2023.I4.004}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VeerasamyF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VladaSRCBHP23, author = {Nikitina Vlada and Ra{\'{u}}l A. S{\'{a}}nchez{-}Ancajima and Miguel {\'{A}}ngel Torres Rubio and Walter Antonio Campos{-}Ugaz and An{\'{\i}}bal Mej{\'{\i}}a Benavides and Mar{\'{\i}}a Del Roc{\'{\i}}o Hende{-}Santolaya and Jacqueline C. Ponce{-}Meza}, title = {Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {3}, pages = {77--88}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I3.006}, doi = {10.58346/JOWUA.2023.I3.006}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VladaSRCBHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WangYQ23, author = {Lixin Wang and Jianhua Yang and Maochang Qin}, title = {Analyzing Distribution of Packet Round-Trip Times using Fast Fourier Transformation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {14}, number = {2}, pages = {137--149}, year = {2023}, url = {https://doi.org/10.58346/JOWUA.2023.I2.011}, doi = {10.58346/JOWUA.2023.I2.011}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WangYQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/00010A22, author = {Gabriele Costa and Enrico Russo and Alessandro Armando}, title = {Automating the Generation of Cyber Range Virtual Scenarios with {VSDL}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {61--80}, year = {2022}, url = {https://doi.org/10.58346/JOWUA.2022.I4.004}, doi = {10.58346/JOWUA.2022.I4.004}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/00010A22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/0001M22, author = {J{\"{o}}rg Keller and Ewelina Marciniszyn}, title = {Improved Concept and Implementation of a Fountain Code Covert Channel}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {3}, pages = {25--36}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.09.30.025}, doi = {10.22667/JOWUA.2022.09.30.025}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/0001M22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AyubRSAAS22, author = {Aqsa Ayub and Muhammad Rizwan and Shivanshu Shrivastava and Adeel Anjum and Pelin Angin and Yigit Sever}, title = {Securely Offloading Computation to the Edge with the Tangle Cache}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {40--60}, year = {2022}, url = {https://doi.org/10.58346/JOWUA.2022.I4.003}, doi = {10.58346/JOWUA.2022.I4.003}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AyubRSAAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BakhtinaM22, author = {Mariia Bakhtina and Raimundas Matulevicius}, title = {Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {1}, pages = {87--111}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.03.31.087}, doi = {10.22667/JOWUA.2022.03.31.087}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BakhtinaM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BoualemRA22, author = {Adda Boualem and Cyril De Runz and Marwane Ayaida}, title = {Partial Paving Strategy: Application to optimize the Area Coverage Problem in Mobile Wireless Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {2}, pages = {1--22}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.06.30.001}, doi = {10.22667/JOWUA.2022.06.30.001}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BoualemRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CabraPMA22, author = {Jose{-}Luis Cabra and Carlos Parra and Diego Mendez and Luis Carlos Trujillo Arboleda}, title = {Mechanisms of Authentication toward Habitude Pattern Lock and {ECG:} An overview}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {2}, pages = {23--67}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.06.30.023}, doi = {10.22667/JOWUA.2022.06.30.023}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CabraPMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CassaviaC00Z22, author = {Nunziato Cassavia and Luca Caviglione and Massimo Guarascio and Giuseppe Manco and Marco Zuppelli}, title = {Detection of Steganographic Threats Targeting Digital Images in Heterogeneous Ecosystems Through Machine Learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {3}, pages = {50--67}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.09.30.050}, doi = {10.22667/JOWUA.2022.09.30.050}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CassaviaC00Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DayiRNPG22, author = {Arif Kerem Dayi and Volkan Rodoplu and Mert Nakip and Buse Pehlivan and C{\"{u}}neyt G{\"{u}}zelis}, title = {Multi-Channel Subset Iteration with Minimal Loss in Available Capacity {(MC-SIMLAC)} Algorithm for Joint Forecasting-Scheduling in the Internet of Things}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {2}, pages = {68--95}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.06.30.068}, doi = {10.22667/JOWUA.2022.06.30.068}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/DayiRNPG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DoigRUHOFL22, author = {Silvia Georgina Aguinaga Doig and Jessica Natal{\'{\i}} Gallardo Ram{\'{\i}}rez and Osmer Campo Ugaz and Ronald M. Hern{\'{a}}ndez and Janeth Benedicta Falla Ortiz and Lizzeth Aimee Garci Flores and Yen Marvin Bravo Larrea}, title = {Educational Scenarios Using Technology: Challenges and Proposals During the Pandemic}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {182--195}, year = {2022}, url = {https://doi.org/10.58346/jowua.2022.i4.012}, doi = {10.58346/JOWUA.2022.I4.012}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/DoigRUHOFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EmuraKNOO22, author = {Keita Emura and Kaisei Kajita and Ryo Nojima and Kazuto Ogawa and Go Ohtake}, title = {Providing Membership Privacy to the Asynchronous Ratcheting Trees Protocol without losing Scalability}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {105--123}, year = {2022}, url = {https://doi.org/10.58346/JOWUA.2022.I4.007}, doi = {10.58346/JOWUA.2022.I4.007}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EmuraKNOO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GiorgiAS22, author = {Giacomo Giorgi and Wisam Abbasi and Andrea Saracino}, title = {Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {1}, pages = {112--136}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.03.31.112}, doi = {10.22667/JOWUA.2022.03.31.112}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GiorgiAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GrammatopoulosP22, author = {Athanasios Vasileios Grammatopoulos and Ilias Politis and Christos Xenakis}, title = {Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {2}, pages = {96--127}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.06.30.096}, doi = {10.22667/JOWUA.2022.06.30.096}, timestamp = {Wed, 03 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GrammatopoulosP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HartmannW22, author = {Laura Hartmann and Steffen Wendzel}, title = {Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {3}, pages = {4--24}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.09.30.004}, doi = {10.22667/JOWUA.2022.09.30.004}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HartmannW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Jung22, author = {Seung Wook Jung}, title = {Universal Redactable Blockchain}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {81--93}, year = {2022}, url = {https://doi.org/10.58346/JOWUA.2022.I4.005}, doi = {10.58346/JOWUA.2022.I4.005}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Jung22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KiesebergT22, author = {Peter Kieseberg and Simon Tjoa}, title = {Guest Editorial: Special Issue on the ARES-Workshops 2021}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {1}, pages = {1--3}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.03.31.001}, doi = {10.22667/JOWUA.2022.03.31.001}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/KiesebergT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KioskliDFM22, author = {Kitty Kioskli and Daniele Dellagiacoma and Theofanis Fotis and Haralambos Mouratidis}, title = {The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {2}, pages = {147--182}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.06.30.147}, doi = {10.22667/JOWUA.2022.06.30.147}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KioskliDFM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KomisarekPKMKC22, author = {Mikolaj Komisarek and Marek Pawlicki and Mikolaj Kowalski and Adrian Marzecki and Rafal Kozik and Michal Choras}, title = {Hunting cyberattacks: experience from the real backbone network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {2}, pages = {128--146}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.06.30.128}, doi = {10.22667/JOWUA.2022.06.30.128}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/KomisarekPKMKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ManfrediCSR22, author = {Salvatore Manfredi and Mariano Ceccato and Giada Sciarretta and Silvio Ranise}, title = {Empirical Validation on the Usability of Security Reports for Patching {TLS} Misconfigurations: User- and Case-Studies on Actionable Mitigations}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {1}, pages = {56--86}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.03.31.056}, doi = {10.22667/JOWUA.2022.03.31.056}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/ManfrediCSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MegiasKRCM22, author = {David Meg{\'{\i}}as and Minoru Kuribayashi and Andrea Rosales and Krzysztof Cabaj and Wojciech Mazurczyk}, title = {Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {1}, pages = {33--55}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.03.31.033}, doi = {10.22667/JOWUA.2022.03.31.033}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MegiasKRCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MihelicVBDFHOPV22, author = {Anze Mihelic and Simon Vrhovec and Igor Bernik and Andrej Domej and Damjan Fujs and Tomaz Hovelja and Sanja Kerznar Osolnik and Patrik Pucer and Damjan Vavpotic and Bostjan Zvanut and Kaja Prislan}, title = {Use of smart devices by the elderly: Nursing home residents in Slovenia}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {3}, pages = {68--80}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.09.30.068}, doi = {10.22667/JOWUA.2022.09.30.068}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MihelicVBDFHOPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MilevaT22, author = {Aleksandra Mileva and Jordan Tikvesanski}, title = {Hiding Data in a Switched Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {3}, pages = {37--49}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.09.30.037}, doi = {10.22667/JOWUA.2022.09.30.037}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MilevaT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MuthuswamyRR22, author = {Prema Muthuswamy and V. Raju and M. Ramya}, title = {Natural Language Processing for Data Science Workforce Analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {225--232}, year = {2022}, url = {https://doi.org/10.58346/jowua.2022.i4.015}, doi = {10.58346/JOWUA.2022.I4.015}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MuthuswamyRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ParkJ22, author = {Jungsoo Park and Souhwan Jung}, title = {Android Adware Detection using Soot and {CFG}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {94--104}, year = {2022}, url = {https://doi.org/10.58346/JOWUA.2022.I4.006}, doi = {10.58346/JOWUA.2022.I4.006}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ParkJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PuysTMGS22, author = {Maxime Puys and Pierre{-}Henri Thevenon and St{\'{e}}phane Mocanu and Mathieu Gallissot and Camille Sivelle}, title = {{SCADA} Cybersecurity Awareness and Teaching with Hardware-In-The-Loop Platforms}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {1}, pages = {4--32}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.03.31.004}, doi = {10.22667/JOWUA.2022.03.31.004}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/PuysTMGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RatnadewiHPP22, author = {R. Ratnadewi and Aan Darmawan Hangkawidjaja and Agus Prijono and Ariesa Pandanwang}, title = {Design of Robot Plotter Software for Making Pattern with Turtle Graphics Algorithm}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {137--154}, year = {2022}, url = {https://doi.org/10.58346/jowua.2022.i4.009}, doi = {10.58346/JOWUA.2022.I4.009}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RatnadewiHPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RosnellyRWHP22, author = {Rika Rosnelly and Bob Subhan Riza and Linda Wahyuni and S. Edy Victor Haryanto and Annas Prasetio}, title = {Vehicle Detection Using Machine Learning Model with the Gaussian Mixture Model {(GMM)}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {233--243}, year = {2022}, url = {https://doi.org/10.58346/jowua.2022.i4.016}, doi = {10.58346/JOWUA.2022.I4.016}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RosnellyRWHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SchmidbauerW22, author = {Tobias Schmidbauer and Steffen Wendzel}, title = {Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {1}, pages = {137--166}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.03.31.137}, doi = {10.22667/JOWUA.2022.03.31.137}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SchmidbauerW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShadadiA22, author = {Ebtesam Shadadi and Latifah Alamer}, title = {Hierarchical Parallel Processing for Data Clustering in {GPU} Using Deep Nearest Neighbor Searching}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {155--168}, year = {2022}, url = {https://doi.org/10.58346/jowua.2022.i4.010}, doi = {10.58346/JOWUA.2022.I4.010}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShadadiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SinghRYAK022, author = {Kunwar Singh and C. Pandu Rangan and Ilsun You and Amalan Joseph Antony and S. K. Karthika and Jiyoon Kim}, title = {Efficient Lattice based {(H)IB-DRE}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {1--23}, year = {2022}, url = {https://doi.org/10.58346/JOWUA.2022.I4.001}, doi = {10.58346/JOWUA.2022.I4.001}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SinghRYAK022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SudipaAY22, author = {I Gede Iwan Sudipa and Putu Wirayudi Aditama and Christina Purnama Yanti}, title = {Developing Augmented Reality Lontar Prasi Bali as an E-learning Material to Preserve Balinese Culture}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {169--181}, year = {2022}, url = {https://doi.org/10.58346/jowua.2022.i4.011}, doi = {10.58346/JOWUA.2022.I4.011}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SudipaAY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/UnisaG22, author = {Syeda Ayesha Unisa and K. S. Jagadeesh Gowda}, title = {Estimating {CSI} for Future Generation {MIMO} Networks Using Deep Learning Techniques and its Applicability to Varied Environments}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {124--136}, year = {2022}, url = {https://doi.org/10.58346/jowua.2022.i4.008}, doi = {10.58346/JOWUA.2022.I4.008}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/UnisaG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/UtomoL22, author = {Fajar Cahyo Utomo and Tatag Herbayu Latukismo}, title = {Trends and Patterns in Workforce Agility Literature: {A} Scopus-based Bibliometric Analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {211--224}, year = {2022}, url = {https://doi.org/10.58346/jowua.2022.i4.014}, doi = {10.58346/JOWUA.2022.I4.014}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/UtomoL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VrhovecGJ22, author = {Simon Vrhovec and B{\'{e}}la Genge and Martin Gilje Jaatun}, title = {Guest Editorial: Special Issue on Interdisciplinary Cybersecurity}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {3}, pages = {1--3}, year = {2022}, url = {https://doi.org/10.22667/JOWUA.2022.09.30.001}, doi = {10.22667/JOWUA.2022.09.30.001}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VrhovecGJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YangWLW22, author = {Jianhua Yang and Lixin Wang and Austin Lee and Peng{-}Jun Wan}, title = {Stepping-Stone Intrusion Detection via Estimating Numbers of Upstream and Downstream Connections using Packet Crossover}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {24--39}, year = {2022}, url = {https://doi.org/10.58346/JOWUA.2022.I4.002}, doi = {10.58346/JOWUA.2022.I4.002}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YangWLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YudistiraAS22, author = {Bagus Gede Krishna Yudistira and Radityo Anggoro and Ary Mazharuddin Shiddiqi}, title = {Addition of Neighbors in the Number of Vanets Node Factors: {DSR-PNT} Performance Study}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {13}, number = {4}, pages = {196--210}, year = {2022}, url = {https://doi.org/10.58346/jowua.2022.i4.013}, doi = {10.58346/JOWUA.2022.I4.013}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YudistiraAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AgrafiotisK21, author = {Ioannis Agrafiotis and G{\"{o}}khan Kul}, title = {Guest Editorial: Special Issue on Advances in Insider Threat Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {2}, pages = {1--2}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.06.30.001}, doi = {10.22667/JOWUA.2021.06.30.001}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AgrafiotisK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BorchertH21, author = {Angela Borchert and Maritta Heisel}, title = {Conflict Identification and Resolution for Trust-Related Requirements Elicitation {A} Goal Modeling Approach}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {1}, pages = {111--131}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.03.31.111}, doi = {10.22667/JOWUA.2021.03.31.111}, timestamp = {Mon, 17 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BorchertH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BoucheAK21, author = {Johannes Bouch{\'{e}} and Lukas Atkinson and Martin Kappes}, title = {ShadowHeap: Memory Safety through Efficient Heap Metadata Validation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {4}, pages = {4--21}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.12.31.004}, doi = {10.22667/JOWUA.2021.12.31.004}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/BoucheAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CasolareDIMMS21, author = {Rosangela Casolare and Carlo De Dominicis and Giacomo Iadarola and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, title = {Dynamic Mobile Malware Detection through System Call-based Image representation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {1}, pages = {44--63}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.03.31.044}, doi = {10.22667/JOWUA.2021.03.31.044}, timestamp = {Mon, 17 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CasolareDIMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CaviglioneWMV21, author = {Luca Caviglione and Steffen Wendzel and Aleksandra Mileva and Simon Vrhovec}, title = {Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {4}, pages = {1--3}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.12.31.001}, doi = {10.22667/JOWUA.2021.12.31.001}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/CaviglioneWMV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChowSBKZ21, author = {Yang{-}Wai Chow and Willy Susilo and Joonsang Baek and Jongkil Kim and Wei Zong}, title = {Exploiting {QR} Code Error Correction for Digital Image Watermarking}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {2}, pages = {114--140}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.06.30.114}, doi = {10.22667/JOWUA.2021.06.30.114}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChowSBKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DominguesNFF21, author = {Patr{\'{\i}}cio Domingues and Ruben Nogueira and Jos{\'{e}} Carlos Francisco and Miguel Frade}, title = {Analyzing TikTok from a Digital Forensics Perspective}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {3}, pages = {87--115}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.09.30.087}, doi = {10.22667/JOWUA.2021.09.30.087}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/DominguesNFF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FerreiraGIF21, author = {Andr{\'{e}} Prata Ferreira and Chetna Gupta and Pedro R. M. In{\'{a}}cio and M{\'{a}}rio M. Freire}, title = {Behaviour-based Malware Detection in Mobile AndroidPlatforms Using Machine Learning Algorithms}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {4}, pages = {62--88}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.12.31.062}, doi = {10.22667/JOWUA.2021.12.31.062}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/FerreiraGIF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GreitzerPSYL21, author = {Frank L. Greitzer and Justin Purl and Paul J. Sticha and Martin C. Yu and James D. Lee}, title = {Use of Expert Judgments to Inform Bayesian Models of Insider Threat Risk}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {2}, pages = {3--47}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.06.30.003}, doi = {10.22667/JOWUA.2021.06.30.003}, timestamp = {Fri, 30 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GreitzerPSYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HeinzZC21, author = {Corinna Heinz and Marco Zuppelli and Luca Caviglione}, title = {Covert Channels in Transport Layer Security: Performance and Security Assessment}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {4}, pages = {22--36}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.12.31.022}, doi = {10.22667/JOWUA.2021.12.31.022}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HeinzZC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KiesebergT21, author = {Peter Kieseberg and Simon Tjoa}, title = {Guest Editorial: Special Issue on the ARES-Workshops 2020}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {1}, pages = {1--2}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.03.31.001}, doi = {10.22667/JOWUA.2021.03.31.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KiesebergT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KolomeetsCK21, author = {Maxim Kolomeets and Andrey Chechulin and Igor V. Kotenko}, title = {Bot detection by friends graph in social networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {2}, pages = {141--159}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.06.30.141}, doi = {10.22667/JOWUA.2021.06.30.141}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KolomeetsCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KomisarekPKC21, author = {Mikolaj Komisarek and Marek Pawlicki and Rafal Kozik and Michal Choras}, title = {Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {1}, pages = {3--19}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.03.31.003}, doi = {10.22667/JOWUA.2021.03.31.003}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/KomisarekPKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KumarDWR21, author = {Arun Kumar and Sanjay K. Dhurandher and Isaac Woungang and Joel J. P. C. Rodrigues}, title = {Securing Opportunistic Networks: An Encounter-based Trust-driven Barter Mechanism}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {2}, pages = {99--113}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.06.30.099}, doi = {10.22667/JOWUA.2021.06.30.099}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KumarDWR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LacavaMMSMGV21, author = {Giovanni Lacava and Angelica Marotta and Fabio Martinelli and Andrea Saracino and Antonio La Marra and Endika Gil{-}Uriarte and Victor Mayoral Vilches}, title = {Cybsersecurity Issues in Robotics}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {3}, pages = {1--28}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.09.30.001}, doi = {10.22667/JOWUA.2021.09.30.001}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/LacavaMMSMGV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeitnerFLLSSAHK21, author = {Maria Leitner and Maximilian Frank and Gregor Langner and Max Landauer and Florian Skopik and Paul Smith and Benjamin Akhras and Wolfgang Hotwagner and Stela Kucek and Timea Pahi and Lenhard Reuter and Manuel Warum}, title = {Enabling exercises, education and research with a comprehensive cyber range}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {4}, pages = {37--61}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.12.31.037}, doi = {10.22667/JOWUA.2021.12.31.037}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeitnerFLLSSAHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NowakowskiZCM21, author = {Piotr Nowakowski and Piotr Z{\'{o}}rawski and Krzysztof Cabaj and Wojciech Mazurczyk}, title = {Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {1}, pages = {20--43}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.03.31.020}, doi = {10.22667/JOWUA.2021.03.31.020}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NowakowskiZCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PaganoVM21, author = {Francesco Pagano and Luca Verderame and Alessio Merlo}, title = {Understanding Fuchsia Security}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {3}, pages = {47--64}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.09.30.047}, doi = {10.22667/JOWUA.2021.09.30.047}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PaganoVM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PohnH21, author = {Daniela P{\"{o}}hn and Wolfgang Hommel}, title = {Universal Identity and Access Management Framework for Future Ecosystems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {1}, pages = {64--84}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.03.31.064}, doi = {10.22667/JOWUA.2021.03.31.064}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PohnH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RibaltaLSL21, author = {Claudia Negri{-}Ribalta and Marius Lombard{-}Platet and Camille Salinesi and Pascal Lafourcade}, title = {Blockchain Mirage or Silver Bullet? {A} Requirements-driven Comparative Analysis of Business and Developers' Perceptions in the Accountancy Domain}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {1}, pages = {85--110}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.03.31.085}, doi = {10.22667/JOWUA.2021.03.31.085}, timestamp = {Thu, 05 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/RibaltaLSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SoelistijantoM21, author = {Bambang Soelistijanto and Geraldev Manoah}, title = {Network Size Estimation in Opportunistic Mobile Networks: The Mark-Recapture Method}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {3}, pages = {29--46}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.09.30.029}, doi = {10.22667/JOWUA.2021.09.30.029}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SoelistijantoM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SuleimanH21, author = {Husam Suleiman and Mohammad Hamdan}, title = {Adaptive Probabilistic Model for Energy-Efficient Distance-based Clustering in WSNs (Adapt-P): {A} LEACH-based Analytical Study}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {3}, pages = {65--86}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.09.30.065}, doi = {10.22667/JOWUA.2021.09.30.065}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SuleimanH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SundararajK21, author = {Akash Sundararaj and G{\"{o}}khan Kul}, title = {Impact Analysis of Training Data Characteristics for Phishing Email Classification}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {2}, pages = {85--98}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.06.30.085}, doi = {10.22667/JOWUA.2021.06.30.085}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SundararajK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WallsA21, author = {Alexander Walls and Ioannis Agrafiotis}, title = {A Bayesian approach to insider threat detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {2}, pages = {48--84}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.06.30.048}, doi = {10.22667/JOWUA.2021.06.30.048}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WallsA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ZuppelliCR21, author = {Marco Zuppelli and Alessandro Carrega and Matteo Repetto}, title = {An Effective and Efficient Approach to Improve Visibility Over Network Communications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {12}, number = {4}, pages = {89--108}, year = {2021}, url = {https://doi.org/10.22667/JOWUA.2021.12.31.089}, doi = {10.22667/JOWUA.2021.12.31.089}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/ZuppelliCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AbhishtaHJNJ20, author = {Abhishta Abhishta and Wouter van Heeswijk and Marianne Junger and Lambert J. M. Nieuwenhuis and Reinoud Joosten}, title = {Why would we get attacked? An analysis of attacker's aims behind DDoS attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {3--22}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.003}, doi = {10.22667/JOWUA.2020.06.30.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AbhishtaHJNJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AnginAGGB20, author = {Pelin Angin and Mohammad Hossein Anisi and Furkan G{\"{o}}ksel and Ceren G{\"{u}}rsoy and Asaf B{\"{u}}y{\"{u}}kg{\"{u}}lc{\"{u}}}, title = {AgriLoRa: {A} Digital Twin Framework for Smart Agriculture}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {4}, pages = {77--96}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.12.31.077}, doi = {10.22667/JOWUA.2020.12.31.077}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AnginAGGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BaranovSSZ20, author = {Oleg V. Baranov and Nikolay V. Smirnov and Tatyana E. Smirnova and Yefim V. Zholobov}, title = {Design of a quadrocopter with PID-controlled fail-safe algorithm}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {23--33}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.023}, doi = {10.22667/JOWUA.2020.06.30.023}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BaranovSSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BembenikF20, author = {Robert Bembenik and Krzysztof Falcman}, title = {{BLE} Indoor Positioning System Using RSSI-based Trilateration}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {3}, pages = {50--69}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.09.30.050}, doi = {10.22667/JOWUA.2020.09.30.050}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BembenikF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BerbecaruLC20, author = {Diana Berbecaru and Antonio Lioy and Cesare Cameroni}, title = {Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {34--54}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.034}, doi = {10.22667/JOWUA.2020.06.30.034}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BerbecaruLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CaputoVRMC20, author = {Davide Caputo and Luca Verderame and Andrea Ranieri and Alessio Merlo and Luca Caviglione}, title = {Fine-hearing Google Home: why silence will not protect your privacy}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {1}, pages = {35--53}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.03.31.035}, doi = {10.22667/JOWUA.2020.03.31.035}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CaputoVRMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DuongST20, author = {Dung Hoang Duong and Willy Susilo and Viet Cuong Trinh}, title = {Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {74--86}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.074}, doi = {10.22667/JOWUA.2020.06.30.074}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/DuongST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JamilHIA20, author = {Mohammad Newaj Jamil and Mohammad Shahadat Hossain and Raihan Ul Islam and Karl Andersson}, title = {Technological Innovation Capability Evaluation of High-Tech Firms Using Conjunctive and Disjunctive Belief Rule-Based Expert System: {A} Comparative Study}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {3}, pages = {29--49}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.09.30.029}, doi = {10.22667/JOWUA.2020.09.30.029}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/JamilHIA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JasimOMA20, author = {Al{-}Hussein Hameed Jasim and Niclas {\"{O}}gren and Dimitar Minovski and Karl Andersson}, title = {Packet Probing Study to Assess Sustainability in Available Bandwidth Measurements: Case of High-Speed Cellular Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {106--125}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.106}, doi = {10.22667/JOWUA.2020.06.30.106}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/JasimOMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JohnsonKBD20, author = {Clayton Johnson and Bishal Khadka and Ram B. Basnet and Tenzin Doleck}, title = {Towards Detecting and Classifying Malicious URLs Using Deep Learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {4}, pages = {31--48}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.12.31.031}, doi = {10.22667/JOWUA.2020.12.31.031}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/JohnsonKBD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KasturiJS20, author = {G. S. Kasturi and Ansh Jain and Jagdeep Singh}, title = {Detection and Classification of Radio Frequency Jamming Attacks using Machine learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {4}, pages = {49--62}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.12.31.049}, doi = {10.22667/JOWUA.2020.12.31.049}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/KasturiJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KhamaysehMAM20, author = {Yaser M. Khamayseh and Wail Mardini and Monther Aldwairi and Hussein T. Mouftah}, title = {On the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {87--105}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.087}, doi = {10.22667/JOWUA.2020.06.30.087}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KhamaysehMAM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KhedrRA20, author = {Ahmed M. Khedr and P. V. Pravija Raj and Amal Al Ali}, title = {An Energy-Efficient Data Acquisition Technique for Hierarchical Cluster-Based Wireless Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {3}, pages = {70--86}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.09.30.070}, doi = {10.22667/JOWUA.2020.09.30.070}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KhedrRA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KholodSG20, author = {Ivan Kholod and Andrey Shorov and Sergei Gorlatch}, title = {Efficient Distribution and Processing of Data for Parallelizing Data Mining in Mobile Clouds}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {1}, pages = {2--17}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.03.31.002}, doi = {10.22667/JOWUA.2020.03.31.002}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KholodSG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kotenko20, author = {Igor V. Kotenko}, title = {Guest Editorial: Intelligent Distributed Computing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {1--2}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.001}, doi = {10.22667/JOWUA.2020.06.30.001}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kotenko20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LaouamerEZM20, author = {Lamri Laouamer and Jalel Euchi and Salah Zidi and Alaeddine Mihoub}, title = {Image-to-Tree to Select Significant Blocks for Image Watermarking}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {1}, pages = {81--115}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.03.31.081}, doi = {10.22667/JOWUA.2020.03.31.081}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LaouamerEZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LiuYZS20, author = {Naiwei Liu and Meng Yu and Wanyu Zang and Ravi S. Sandhu}, title = {Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on {ARM} Platform}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {4}, pages = {1--15}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.12.31.001}, doi = {10.22667/JOWUA.2020.12.31.001}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/LiuYZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LohHTK20, author = {Jia{-}Ch'ng Loh and Swee{-}Huay Heng and Syh{-}Yuan Tan and Kaoru Kurosawa}, title = {On the Invisibility and Anonymity of Undeniable Signature Schemes}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {1}, pages = {18--34}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.03.31.018}, doi = {10.22667/JOWUA.2020.03.31.018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LohHTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MarraMMSS20, author = {Antonio La Marra and Fabio Martinelli and Francesco Mercaldo and Andrea Saracino and Mina Sheikhalishahi}, title = {{D-BRIDEMAID:} {A} Distributed Framework for Collaborative and Dynamic Analysis of Android Malware}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {3}, pages = {1--28}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.09.30.001}, doi = {10.22667/JOWUA.2020.09.30.001}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/MarraMMSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NowaczewskiM20, author = {Slawomir Nowaczewski and Wojciech Mazurczyk}, title = {Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and {DNSSEC}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {3}, pages = {87--106}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.09.30.087}, doi = {10.22667/JOWUA.2020.09.30.087}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NowaczewskiM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ParkKK20, author = {Myungseo Park and Soram Kim and Jongsung Kim}, title = {Research on Note-Taking Apps with Security Features}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {4}, pages = {63--76}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.12.31.063}, doi = {10.22667/JOWUA.2020.12.31.063}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/ParkKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RealinhoRD20, author = {Valentim Realinho and Teresa Rom{\~{a}}o and A. Eduardo Dias}, title = {A Language for the End-user Development of Mobile Context-Aware Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {1}, pages = {54--80}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.03.31.054}, doi = {10.22667/JOWUA.2020.03.31.054}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RealinhoRD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SchachtK20, author = {Birger Schacht and Peter Kieseberg}, title = {An Analysis of 5 Million OpenPGP Keys}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {3}, pages = {107--140}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.09.30.107}, doi = {10.22667/JOWUA.2020.09.30.107}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SchachtK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShichkinaKIS20, author = {Yulia A. Shichkina and Galina V. Kataeva and Yulia A. Irishina and Elizaveta S. Stanevich}, title = {The use of mobile phones to monitor the status of patients with Parkinson's disease}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {2}, pages = {55--73}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.06.30.055}, doi = {10.22667/JOWUA.2020.06.30.055}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShichkinaKIS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WongY20, author = {Shing Ki Wong and Siu{-}Ming Yiu}, title = {Location spoofing attack detection with pre-installed sensors in mobile devices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {4}, pages = {16--30}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.12.31.016}, doi = {10.22667/JOWUA.2020.12.31.016}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/WongY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/You20, author = {Ilsun You}, title = {2020 Letter from the Editor-in-Chief}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {1}, pages = {1}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.03.31.001}, doi = {10.22667/JOWUA.2020.03.31.001}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/You20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AlmathamiAVW19, author = {Hassan Khader Almathami and Majed A. Alrafiee and Elena Vlahu{-}Gjorgievska and Khin Than Win}, title = {An Analytical Approach to Using and Implementing Beacons: Opportunities and Challenges}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {58--74}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.058}, doi = {10.22667/JOWUA.2019.03.31.058}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AlmathamiAVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BaekSK19, author = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Guest Editorial: Security and Privacy for Contemporary Network Computing Environment}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {1--3}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.001}, doi = {10.22667/JOWUA.2019.03.31.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BaekSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChoiV19, author = {Gwangbae Choi and Serge Vaudenay}, title = {Timed-Release Encryption With Master Time Bound Key (Extended)}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {88--108}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.088}, doi = {10.22667/JOWUA.2019.12.31.088}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChoiV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EslamiNB19, author = {Ziba Eslami and Mahnaz Noroozi and Joonsang Baek}, title = {On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {75--85}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.075}, doi = {10.22667/JOWUA.2019.03.31.075}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EslamiNB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FiorinoCF19, author = {Davide Fiorino and Mario Collotta and Renato Ferrero}, title = {Usability evaluation of touch gestures for Mobile Augmented Reality applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {2}, pages = {22--36}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.06.30.022}, doi = {10.22667/JOWUA.2019.06.30.022}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FiorinoCF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FungRM19, author = {Carol J. Fung and Bahman Rashidi and Vivian Genaro Motti}, title = {Multi-View Permission Risk Notification for Smartphone System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {42--57}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.042}, doi = {10.22667/JOWUA.2019.03.31.042}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FungRM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GilibertoA019, author = {Mario Giliberto and Fabio Arena and Giovanni Pau}, title = {A fuzzy-based Solution for Optimized Management of Energy Consumption in e-bikes}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {3}, pages = {45--64}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.09.30.045}, doi = {10.22667/JOWUA.2019.09.30.045}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GilibertoA019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HelslootTE19, author = {Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin}, title = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {23--41}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.023}, doi = {10.22667/JOWUA.2019.03.31.023}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HelslootTE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HossainSNA19, author = {Mohammad Shahadat Hossain and Zinnia Sultana and Lutfun Nahar and Karl Andersson}, title = {An Intelligent System to Diagnose Chikungunya under Uncertainty}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {2}, pages = {37--54}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.06.30.037}, doi = {10.22667/JOWUA.2019.06.30.037}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HossainSNA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KimORLKL19, author = {Aram Kim and Junhyoung Oh and Jinho Ryu and Jemin Lee and Kookheui Kwon and Kyungho Lee}, title = {SoK: {A} Systematic Review of Insider Threat Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {46--67}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.046}, doi = {10.22667/JOWUA.2019.12.31.046}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KimORLKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KolomeetsBBCSK19, author = {Maxim Kolomeets and Amira Benachour and Didier El Baz and Andrey Chechulin and Martin Strecker and Igor V. Kotenko}, title = {Reference architecture for social networks graph analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {109--125}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.109}, doi = {10.22667/JOWUA.2019.12.31.109}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KolomeetsBBCSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KolomeetsCK19, author = {Maxim Kolomeets and Andrey Chechulin and Igor V. Kotenko}, title = {Social networks analysis by graph algorithms on the example of the VKontakte social network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {2}, pages = {55--75}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.06.30.055}, doi = {10.22667/JOWUA.2019.06.30.055}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KolomeetsCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KorzhukGMS19, author = {Viktoriia Korzhuk and Anton Groznykh and Alexander Menshikov and Martin Strecker}, title = {Identification of Attacks against Wireless Sensor Networks Based on Behaviour Analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {2}, pages = {1--21}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.06.30.001}, doi = {10.22667/JOWUA.2019.06.30.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KorzhukGMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LiuKKTL19, author = {Jui{-}Chun Liu and Yi{-}Quan Ke and Yi{-}Chih Kao and Shi{-}Chun Tsai and Yi{-}Bing Lin}, title = {A Dual-Stack Authentication Mechanism Through {SNMP}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {31--45}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.031}, doi = {10.22667/JOWUA.2019.12.31.031}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LiuKKTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MavusA19, author = {Zeynep Mavus and Pelin Angin}, title = {A Secure Model For Efficient Live Migration of Containers}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {3}, pages = {21--44}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.09.30.021}, doi = {10.22667/JOWUA.2019.09.30.021}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MavusA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ParkYCPH19, author = {Minjae Park and Geunha You and Seong{-}je Cho and Minkyu Park and Sangchul Han}, title = {A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {22--30}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.022}, doi = {10.22667/JOWUA.2019.12.31.022}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ParkYCPH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShihHK19, author = {Chi{-}Sheng Shih and Wei{-}Yu Hsieh and Chia{-}Lung Kao}, title = {Traceability for Vehicular Network Real-Time Messaging Based on Blockchain Technology}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {1--21}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.001}, doi = {10.22667/JOWUA.2019.12.31.001}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShihHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Thorncharoensri19, author = {Pairat Thorncharoensri and Willy Susilo and Joonsang Baek}, title = {Efficient Controlled Signature for a Large Network with Multi Security-level Setting}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {3}, pages = {1--20}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.09.30.001}, doi = {10.22667/JOWUA.2019.09.30.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Thorncharoensri19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WangSBKK19, author = {Yang Wang and Willy Susilo and Joonsang Baek and Jongkil Kim and Intae Kim}, title = {Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {4}, pages = {68--87}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.12.31.068}, doi = {10.22667/JOWUA.2019.12.31.068}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WangSBKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WongY19, author = {Shing Ki Wong and Siu{-}Ming Yiu}, title = {Detection on auto clickers in mobile games}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {3}, pages = {65--80}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.09.30.065}, doi = {10.22667/JOWUA.2019.09.30.065}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WongY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Yang019, author = {Zheng Yang and Kimmo J{\"{a}}rvinen}, title = {Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its Application}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {10}, number = {1}, pages = {4--22}, year = {2019}, url = {https://doi.org/10.22667/JOWUA.2019.03.31.004}, doi = {10.22667/JOWUA.2019.03.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Yang019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AtapourAC18, author = {Cheyenne Atapour and Ioannis Agrafiotis and Sadie Creese}, title = {Modeling Advanced Persistent Threats to enhance anomaly detection techniques}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {4}, pages = {71--102}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.12.31.071}, doi = {10.22667/JOWUA.2018.12.31.071}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AtapourAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BuhovRS18, author = {Damjan Buhov and Julian Rauchberger and Sebastian Schrittwieser}, title = {{FLASH:} Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage {\&} Its Security and Privacy Implications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {4}, pages = {26--40}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.12.31.026}, doi = {10.22667/JOWUA.2018.12.31.026}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BuhovRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChoLHKPH18, author = {Seong{-}je Cho and Kyeonghwan Lim and Jungkyu Han and Byoung{-}chir Kim and Minkyu Park and Sangchul Han}, title = {Open-Source Android App Detection considering the Effects of Code Obfuscation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {3}, pages = {50--61}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.09.30.050}, doi = {10.22667/JOWUA.2018.09.30.050}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChoLHKPH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChoudharyKS18, author = {Gaurav Choudhary and Jiyoon Kim and Vishal Sharma}, title = {Security of 5G-Mobile Backhaul Networks: {A} Survey}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {4}, pages = {41--70}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.12.31.041}, doi = {10.22667/JOWUA.2018.12.31.041}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChoudharyKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DruckerG18, author = {Nir Drucker and Shay Gueron}, title = {Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {1}, pages = {86--99}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.03.31.086}, doi = {10.22667/JOWUA.2018.03.31.086}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/DruckerG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GrittiOMSP18, author = {Cl{\'{e}}mentine Gritti and Melek {\"{O}}nen and Refik Molva and Willy Susilo and Thomas Plantard}, title = {Device Identification and Personal Data Attestation in Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {4}, pages = {1--25}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.12.31.001}, doi = {10.22667/JOWUA.2018.12.31.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GrittiOMSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HarilalTHCGMO18, author = {Athul Harilal and Flavio Toffalini and Ivan Homoliak and John Henry Castellanos and Juan Guarnizo and Soumik Mondal and Mart{\'{\i}}n Ochoa}, title = {The Wolf Of {SUTD} {(TWOS):} {A} Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {1}, pages = {54--85}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.03.31.054}, doi = {10.22667/JOWUA.2018.03.31.054}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/HarilalTHCGMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HartlAZ18, author = {Alexander Hartl and Robert Annessi and Tanja Zseby}, title = {Subliminal Channels in High-Speed Signatures}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {1}, pages = {30--53}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.03.31.030}, doi = {10.22667/JOWUA.2018.03.31.030}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HartlAZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HossainHGA18, author = {Mohammad Shahadat Hossain and Abdullah Al Hasan and Sunanda Guha and Karl Andersson}, title = {A Belief Rule Based Expert System to Predict Earthquake under Uncertainty}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {2}, pages = {26--41}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.06.30.026}, doi = {10.22667/JOWUA.2018.06.30.026}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HossainHGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kotenko18, author = {Igor V. Kotenko}, title = {Guest Editorial: Managing Insider Security Threats}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {1}, pages = {1--3}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.03.31.001}, doi = {10.22667/JOWUA.2018.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kotenko18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KotenkoKCC18, author = {Igor V. Kotenko and Maxim Kolomeets and Andrey Chechulin and Yannick Chevalier}, title = {A visual analytics approach for the cyber forensics based on different views of the network traffic}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {2}, pages = {57--73}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.06.30.057}, doi = {10.22667/JOWUA.2018.06.30.057}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KotenkoKCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LiZLFA18, author = {Guanglei Li and Huachun Zhou and Guanwen Li and Bohao Feng and Hyo{-}Beom Ahn}, title = {Towards Traffic-Driven {VNF} Scaling: {A} Preliminary Case Study based on Container}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {3}, pages = {1--10}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.09.30.001}, doi = {10.22667/JOWUA.2018.09.30.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LiZLFA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LimSLKY18, author = {Jongsu Lim and Yonggu Shin and Sunjun Lee and Kyuho Kim and Jeong Hyun Yi}, title = {Survey of Dynamic Anti-Analysis Schemes for Mobile Malware}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {3}, pages = {39--49}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.09.30.039}, doi = {10.22667/JOWUA.2018.09.30.039}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LimSLKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MorianoPRC18, author = {Pablo Moriano and Jared Pendleton and Steven Rich and L. Jean Camp}, title = {Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {1}, pages = {4--29}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.03.31.004}, doi = {10.22667/JOWUA.2018.03.31.004}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MorianoPRC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ParkSHOL18, author = {Mookyu Park and Junwoo Seo and Jaehyeok Han and Haengrok Oh and Kyungho Lee}, title = {Situational Awareness Framework for Threat Intelligence Measurement of Android Malware}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {3}, pages = {25--38}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.09.30.025}, doi = {10.22667/JOWUA.2018.09.30.025}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ParkSHOL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RahmanBNTK18, author = {Mohammad Shahriar Rahman and Anirban Basu and Toru Nakamura and Haruo Takasaki and Shinsaku Kiyomoto}, title = {{PPM:} Privacy Policy Manager for Home Energy Management System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {2}, pages = {42--56}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.06.30.042}, doi = {10.22667/JOWUA.2018.06.30.042}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RahmanBNTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SiddiqueeAAAH18, author = {Kazy Noor E. Alam Siddiquee and Karl Andersson and Francisco Javier Moreno Arrebola and Zainal Abedin and Mohammad Shahadat Hossain}, title = {Estimation of Signal Coverage and Localization in Wi-Fi Networks with {AODV} and {OLSR}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {3}, pages = {11--24}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.09.30.011}, doi = {10.22667/JOWUA.2018.09.30.011}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SiddiqueeAAAH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ViticchieBVL18, author = {Alessio Viticchi{\'{e}} and Cataldo Basile and Fulvio Valenza and Antonio Lioy}, title = {On the impossibility of effectively using likely-invariants for software attestation purposes}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {9}, number = {2}, pages = {1--25}, year = {2018}, url = {https://doi.org/10.22667/JOWUA.2018.06.30.001}, doi = {10.22667/JOWUA.2018.06.30.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ViticchieBVL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/0002CTC17, author = {Giovanni Pau and Mario Collotta and Salvatore Tirrito and Riccardo Caponetto}, title = {An Innovative Approach for the Management of Cross-Coupling Interference in Street Lighting Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {2}, pages = {44--63}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.06.31.044}, doi = {10.22667/JOWUA.2017.06.31.044}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/0002CTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AbhishtaJN17, author = {Abhishta and Reinoud Joosten and Lambert J. M. Nieuwenhuis}, title = {Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {4}, pages = {1--18}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.12.31.001}, doi = {10.22667/JOWUA.2017.12.31.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AbhishtaJN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AgrafiotisEGC17, author = {Ioannis Agrafiotis and Arnau Erola and Michael Goldsmith and Sadie Creese}, title = {Formalising Policies for Insider-threat Detection: {A} Tripwire Grammar}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {1}, pages = {26--43}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.03.31.026}, doi = {10.22667/JOWUA.2017.03.31.026}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AgrafiotisEGC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChowSPBV17, author = {Yang{-}Wai Chow and Willy Susilo and James G. Phillips and Joonsang Baek and Elena Vlahu{-}Gjorgievska}, title = {Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {3}, pages = {18--35}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.09.30.018}, doi = {10.22667/JOWUA.2017.09.30.018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChowSPBV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ContiRMMV17, author = {Vincenzo Conti and Leonardo Rundo and Carmelo Militello and Giancarlo Mauri and Salvatore Vitabile}, title = {Resource-Efficient Hardware Implementation of a Neural-based Node for Automatic Fingerprint Classification}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {4}, pages = {19--36}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.12.31.019}, doi = {10.22667/JOWUA.2017.12.31.019}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/ContiRMMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GuerarMM17, author = {Meriem Guerar and Alessio Merlo and Mauro Migliardi}, title = {ClickPattern: {A} Pattern Lock System Resilient to Smudge and Side-channel Attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {2}, pages = {64--78}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.06.31.064}, doi = {10.22667/JOWUA.2017.06.31.064}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GuerarMM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KammullerKP17, author = {Florian Kamm{\"{u}}ller and Manfred Kerber and Christian W. Probst}, title = {Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {1}, pages = {44--78}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.03.31.044}, doi = {10.22667/JOWUA.2017.03.31.044}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KammullerKP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KotenkoSK17, author = {Igor V. Kotenko and Igor Saenko and Alexey Kushnerevich}, title = {Parallel big data processing system for security monitoring in Internet of Things networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {4}, pages = {60--74}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.12.31.060}, doi = {10.22667/JOWUA.2017.12.31.060}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/KotenkoSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MajeedZ17, author = {Amjed Majeed and Tanveer A. Zia}, title = {Multi-Layer Network Architecture for Supporting Multiple Applications in Wireless Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {3}, pages = {36--56}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.09.30.036}, doi = {10.22667/JOWUA.2017.09.30.036}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MajeedZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MellSHG17, author = {Peter Mell and James M. Shook and Richard E. Harang and Serban I. Gavrila}, title = {Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {1}, pages = {4--25}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.03.31.004}, doi = {10.22667/JOWUA.2017.03.31.004}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/MellSHG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NurseB17, author = {Jason R. C. Nurse and Elisa Bertino}, title = {Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {1}, pages = {1--3}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.03.31.001}, doi = {10.22667/JOWUA.2017.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NurseB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SiddiqueeAKH17, author = {Kazy Noor E. Alam Siddiquee and Karl Andersson and Faria Farjana Khan and Mohammad Shahadat Hossain}, title = {A Scalable and Secure {MANET} for an i-Voting System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {3}, pages = {1--17}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.09.30.001}, doi = {10.22667/JOWUA.2017.09.30.001}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SiddiqueeAKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TaqieddinAA17, author = {Eyad Taqieddin and Fahed Awad and Hani Ahmad}, title = {Location-Aware and Mobility-Based Performance Optimization for Wireless Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {4}, pages = {37--59}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.12.31.037}, doi = {10.22667/JOWUA.2017.12.31.037}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TaqieddinAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Torroglosa-Garcia17, author = {Elena Torroglosa{-}Garc{\'{\i}}a and Antonio F. Skarmeta{-}G{\'{o}}mez}, title = {Towards Interoperabilty in Identity Federation Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {2}, pages = {19--43}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.06.31.019}, doi = {10.22667/JOWUA.2017.06.31.019}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Torroglosa-Garcia17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/UchidaTIS17, author = {Noriki Uchida and Shoma Takeuchi and Tomoyuki Ishida and Yoshitaka Shibata}, title = {Mobile Traffic Accident Prevention System based on Chronological Changes of Wireless Signals and Sensors}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {3}, pages = {57--66}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.09.30.057}, doi = {10.22667/JOWUA.2017.09.30.057}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/UchidaTIS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ValenzaSSLSV17, author = {Fulvio Valenza and Tao Su and Serena Spinoso and Antonio Lioy and Riccardo Sisto and Marco Vallini}, title = {A formal approach for network security policy validation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {1}, pages = {79--100}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.03.31.079}, doi = {10.22667/JOWUA.2017.03.31.079}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ValenzaSSLSV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WatanabeDET17, author = {Ryo Watanabe and Dilawaer Duolikun and Tomoya Enokido and Makoto Takizawa}, title = {A Simply Energy-efficient Migration Algorithm of Processes with Virtual Machines in Server Clusters}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {8}, number = {2}, pages = {1--18}, year = {2017}, url = {https://doi.org/10.22667/JOWUA.2017.06.31.001}, doi = {10.22667/JOWUA.2017.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WatanabeDET17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BaiardiTI16, author = {Fabrizio Baiardi and Federico Tonelli and Lorenzo Isoni}, title = {Application Vulnerabilities in Risk Assessment and Management}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {41--59}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.041}, doi = {10.22667/JOWUA.2016.06.31.041}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BaiardiTI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BhargavaJMA16, author = {Bharat K. Bhargava and Amber M. Johnson and Gisele Izera Munyengabe and Pelin Angin}, title = {A Systematic Approach for Attack Analysis and Mitigation in {V2V} Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {79--96}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.079}, doi = {10.22667/JOWUA.2016.03.31.079}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BhargavaJMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CarnianiCMMM16, author = {Enrico Carniani and Gianpiero Costantino and Francesco Marino and Fabio Martinelli and Paolo Mori}, title = {Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {4}, pages = {20--40}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.12.31.020}, doi = {10.22667/JOWUA.2016.12.31.020}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CarnianiCMMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CarnianiCMMM16a, author = {Borja Bordel S{\'{a}}nchez and Ram{\'{o}}n Alcarria and Diego S{\'{a}}nchez de Rivera and {\'{A}}lvaro S{\'{a}}nchez{-}Picot}, title = {Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {4}, pages = {41--64}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.12.31.041}, doi = {10.22667/JOWUA.2016.12.31.041}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CarnianiCMMM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CaseyMM16, author = {William Casey and Jose Andre Morales and Bud Mishra}, title = {Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {97--117}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.097}, doi = {10.22667/JOWUA.2016.03.31.097}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CaseyMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChakrabortyRR16, author = {Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan}, title = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {1--22}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.001}, doi = {10.22667/JOWUA.2016.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChakrabortyRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CorreiaMPBA16, author = {F{\'{a}}bio Correia and Artur Mariano and Alberto Proen{\c{c}}a and Christian H. Bischof and Erik Agrell}, title = {Parallel Improved Schnorr-Euchner Enumeration {SE++} on Shared and Distributed Memory Systems, With and Without Extreme Pruning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {4}, pages = {1--19}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.12.31.001}, doi = {10.22667/JOWUA.2016.12.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CorreiaMPBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DesnitskyLCK16, author = {Vasily Desnitsky and Dmitry Levshun and Andrey Chechulin and Igor V. Kotenko}, title = {Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {60--80}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.060}, doi = {10.22667/JOWUA.2016.06.31.060}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/DesnitskyLCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EzeNH16, author = {Chika Eze and Jason R. C. Nurse and Jassim Happa}, title = {Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {39--57}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.039}, doi = {10.22667/JOWUA.2016.03.31.039}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EzeNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FayeLGE16, author = {S{\'{e}}bastien Faye and Nicolas Louveton and Gabriela Gheorghe and Thomas Engel}, title = {A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {1--21}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.001}, doi = {10.22667/JOWUA.2016.09.31.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FayeLGE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HegedusBJ16, author = {Istv{\'{a}}n Heged{\"{u}}s and {\'{A}}rp{\'{a}}d Berta and M{\'{a}}rk Jelasity}, title = {Robust Decentralized Differentially Private Stochastic Gradient Descent}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {20--40}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.020}, doi = {10.22667/JOWUA.2016.06.31.020}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HegedusBJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KC16, author = {Subhashree V. K. and Tharini C.}, title = {Real-Time Implementation of Locality Sensitive Hashing Using {NI} {WSN} and LabVIEW for Outlier Detection in Wireless Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {22--39}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.022}, doi = {10.22667/JOWUA.2016.09.31.022}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KimuraP16, author = {Tomotaka Kimura and Chinthaka Premachandra}, title = {Optimal Relay Node Selection in Two-Hop Routing for Intermittently Connected MANETs}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {23--38}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.023}, doi = {10.22667/JOWUA.2016.03.31.023}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KimuraP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KolomeecCPK16, author = {Maxim Kolomeec and Andrey Chechulin and Anton Pronoza and Igor V. Kotenko}, title = {Technique of Data Visualization: Example of Network Topology Display for Security Monitoring}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {58--78}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.058}, doi = {10.22667/JOWUA.2016.03.31.058}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KolomeecCPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kotenko16, author = {Igor V. Kotenko}, title = {Guest Editorial: Advances in Secure Distributed and Network-Based Computing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.001}, doi = {10.22667/JOWUA.2016.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kotenko16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LimJCPH16, author = {Kyeonghwan Lim and Younsik Jeong and Seong{-}je Cho and Minkyu Park and Sangchul Han}, title = {An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {40--52}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.040}, doi = {10.22667/JOWUA.2016.09.31.040}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LimJCPH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SbeytiMAFY16, author = {Hassan Sbeyti and Mohamad Malli and Khalid Suliman Al{-}Tahat and Ahmad Fadlallah and Mohamad Youssef}, title = {Scalable extensible middleware framework for context-aware mobile applications {(SCAMMP)}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {77--98}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.077}, doi = {10.22667/JOWUA.2016.09.31.077}, timestamp = {Fri, 19 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SbeytiMAFY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ThombreIAH16, author = {Sumeet Thombre and Raihan Ul Islam and Karl Andersson and Mohammad Shahadat Hossain}, title = {{IP} based Wireless Sensor Networks: Performance Analysis using Simulations and Experiments}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {53--76}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.053}, doi = {10.22667/JOWUA.2016.09.31.053}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ThombreIAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YangOP16, author = {Huihui Yang and Vladimir A. Oleshchuk and Andreas Prinz}, title = {Verifying Group Authentication Protocols by Scyther}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {3--19}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.003}, doi = {10.22667/JOWUA.2016.06.31.003}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YangOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AramKP15, author = {Siamak Aram and Ikramullah Khosa and Eros Pasero}, title = {Conserving Energy Through Neural Prediction of Sensed Data}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {1}, pages = {74--97}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.03.31.074}, doi = {10.22667/JOWUA.2015.03.31.074}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AramKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BaiardiTBB15, author = {Fabrizio Baiardi and Federico Tonelli and Alessandro Bertolini and Roberto Bertolotti}, title = {Selecting Countermeasures for {ICT} Systems Before They are Attacked}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {58--77}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.058}, doi = {10.22667/JOWUA.2015.06.31.058}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BaiardiTBB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CicottiCDR15, author = {Giuseppe Cicotti and Luigi Coppolino and Salvatore D'Antonio and Luigi Romano}, title = {Runtime Model Checking for {SLA} Compliance Monitoring and QoS Prediction}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {4--20}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.004}, doi = {10.22667/JOWUA.2015.06.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CicottiCDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FedorchenkoKC15, author = {Andrey Fedorchenko and Igor V. Kotenko and Andrey Chechulin}, title = {Integrated Repository of Security Information for Network Security Evaluation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {41--57}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.041}, doi = {10.22667/JOWUA.2015.06.31.041}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FedorchenkoKC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GavaiSGHSR15, author = {Gaurang Gavai and Kumar Sricharan and Dave Gunning and John Hanley and Mudita Singhal and Rob Rolleston}, title = {Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {4}, pages = {47--63}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.12.31.047}, doi = {10.22667/JOWUA.2015.12.31.047}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GavaiSGHSR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GiangIKJK15, author = {Nam Ky Giang and Janggwan Im and Daeyoung Kim and Markus Jung and Wolfgang Kastner}, title = {Integrating the {EPCIS} and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {1}, pages = {56--73}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.03.31.056}, doi = {10.22667/JOWUA.2015.03.31.056}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GiangIKJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JimenezG15, author = {David Guill{\'{e}}n Jim{\'{e}}nez and Franck Le Gall}, title = {Testing a Commercial Sensor Platform for Wideband Applications based on the 802.15.4 standard}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {1}, pages = {24--36}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.03.31.024}, doi = {10.22667/JOWUA.2015.03.31.024}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/JimenezG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kotenko15, author = {Igor V. Kotenko}, title = {Guest Editorial: Security in Distributed and Network-Based Computing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {1--3}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.001}, doi = {10.22667/JOWUA.2015.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kotenko15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KulU15, author = {G{\"{o}}khan Kul and Shambhu J. Upadhyaya}, title = {Towards a Cyber Ontology for Insider Threats in the Financial Sector}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {4}, pages = {64--85}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.12.31.064}, doi = {10.22667/JOWUA.2015.12.31.064}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KulU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MalikL15, author = {Sehrish Malik and Jong{-}Hyouk Lee}, title = {Privacy Enhancing Factors in People-Nearby Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {113--121}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.113}, doi = {10.22667/JOWUA.2015.06.31.113}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MalikL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/McGoughAGWBFMAT15, author = {Andrew Stephen McGough and Budi Arief and Carl Gamble and David Wall and John Brennan and John S. Fitzgerald and Aad P. A. van Moorsel and Sujeewa Alwis and Georgios Theodoropoulos and Ed Ruck{-}Keene}, title = {Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {4}, pages = {3--46}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.12.31.003}, doi = {10.22667/JOWUA.2015.12.31.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/McGoughAGWBFMAT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NkenyereyeTPR15, author = {Lewis Nkenyereye and Bayu Adhi Tama and Youngho Park and Kyung Hyune Rhee}, title = {A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {98--112}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.098}, doi = {10.22667/JOWUA.2015.06.31.098}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NkenyereyeTPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ParkKJCHP15, author = {Jonghwa Park and Hyojung Kim and Younsik Jeong and Seong{-}je Cho and Sangchul Han and Minkyu Park}, title = {Effects of Code Obfuscation on Android App Similarity Analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {4}, pages = {86--98}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.12.31.086}, doi = {10.22667/JOWUA.2015.12.31.086}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ParkKJCHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PokricKDPRMKJ15, author = {Boris Pokric and Srdjan Krco and Dejan Drajic and Maja Pokric and Vladimir Rajs and Zivorad Mihajlovic and Petar Knezevic and Dejan Jovanovic}, title = {Augmented Reality Enabled IoT Services for Environmental Monitoring Utilising Serious Gaming Concept}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {1}, pages = {37--55}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.03.31.037}, doi = {10.22667/JOWUA.2015.03.31.037}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PokricKDPRMKJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RashidiF15, author = {Bahman Rashidi and Carol J. Fung}, title = {A Survey of Android Security Threats and Defenses}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {3}, pages = {3--35}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.09.31.003}, doi = {10.22667/JOWUA.2015.09.31.003}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RashidiF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RenugadeviM15, author = {N. Renugadevi and C. Mala}, title = {Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {3}, pages = {73--86}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.09.31.073}, doi = {10.22667/JOWUA.2015.09.31.073}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RenugadeviM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RiekeZR15, author = {Roland Rieke and Maria Zhdanova and J{\"{u}}rgen Repp}, title = {Security Compliance Tracking of Processes in Networked Cooperating Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {21--40}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.021}, doi = {10.22667/JOWUA.2015.06.31.021}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RiekeZR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RoblesAANCIL15, author = {Tom{\'{a}}s Robles and Ram{\'{o}}n Alcarria and Diego Mart{\'{\i}}n de Andr{\'{e}}s and Mariano Navarro de la Cruz and Rodrigo Calero and Sof{\'{\i}}a Iglesias and Manuel L{\'{o}}pez}, title = {An IoT based reference architecture for smart water management processes}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {1}, pages = {4--23}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.03.31.004}, doi = {10.22667/JOWUA.2015.03.31.004}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RoblesAANCIL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SantaFPS15, author = {Jos{\'{e}} Santa and Pedro J. Fern{\'{a}}ndez and Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and Antonio F. Skarmeta}, title = {Real Experience with IPv6 Communications in Highways}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {3}, pages = {36--53}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.09.31.036}, doi = {10.22667/JOWUA.2015.09.31.036}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SantaFPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SharmaKR15, author = {Vishal Sharma and Rajesh Kumar and Neeraj Rathore}, title = {Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {3}, pages = {54--72}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.09.31.054}, doi = {10.22667/JOWUA.2015.09.31.054}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SharmaKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SkarmetaCI15, author = {Antonio F. Skarmeta and Mar{\'{\i}}a Victoria Moreno Cano and Antonio Iera}, title = {Guest Editorial: Smart Things, Big Data Technology and Ubiquitous Computing solutions for the future Internet of Things}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {1}, pages = {1--3}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.03.31.001}, doi = {10.22667/JOWUA.2015.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SkarmetaCI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SkovorodaG15, author = {Anastasia Skovoroda and Dennis Gamayunov}, title = {Securing mobile devices: malware mitigation methods}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {2}, pages = {78--97}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.06.31.078}, doi = {10.22667/JOWUA.2015.06.31.078}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SkovorodaG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VazquezKJ15, author = {Carlos Vazquez and Ram Krishnan and Eugene John}, title = {Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {3}, pages = {87--110}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.09.31.087}, doi = {10.22667/JOWUA.2015.09.31.087}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VazquezKJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/You15, author = {Ilsun You}, title = {Editorial}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {3}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.09.31.001}, doi = {10.22667/JOWUA.2015.09.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/You15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/You15a, author = {Ilsun You}, title = {Editorial}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {4}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.12.31.001}, doi = {10.22667/JOWUA.2015.12.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/You15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ArmandoCCMMM14, author = {Alessandro Armando and Giantonio Chiarelli and Gabriele Costa and Gabriele De Maglie and Rocco Mammoliti and Alessio Merlo}, title = {Mobile App Security Analysis with the MAVeriC Static Analysis Module}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {103--119}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.103}, doi = {10.22667/JOWUA.2014.12.31.103}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ArmandoCCMMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AzizH14, author = {Benjamin Aziz and Geoff W. Hamilton}, title = {Enforcing Reputation Constraints on Business Process Workflows}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {1}, pages = {101--121}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.03.31.101}, doi = {10.22667/JOWUA.2014.03.31.101}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AzizH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BaddarMM14, author = {Sherenaz W. Al{-}Haj Baddar and Alessio Merlo and Mauro Migliardi}, title = {Anomaly Detection in Computer Networks: {A} State-of-the-Art Review}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {29--64}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.029}, doi = {10.22667/JOWUA.2014.12.31.029}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BaddarMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BeckersHH14, author = {Kristian Beckers and Maritta Heisel and Denis Hatebur}, title = {Supporting Common Criteria Security Analysis with Problem Frames}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {1}, pages = {37--63}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.03.31.037}, doi = {10.22667/JOWUA.2014.03.31.037}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BeckersHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ClaycombLG14, author = {William R. Claycomb and Philip A. Legg and Dieter Gollmann}, title = {Guest Editorial: Emerging Trends in Research for Insider Threat Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {2}, pages = {1--6}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.06.31.001}, doi = {10.22667/JOWUA.2014.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ClaycombLG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EldardirySLHPBB14, author = {Hoda Eldardiry and Kumar Sricharan and Juan Liu and John Hanley and Bob Price and Oliver Brdiczka and Eugene Bart}, title = {Multi-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {2}, pages = {39--58}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.06.31.039}, doi = {10.22667/JOWUA.2014.06.31.039}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EldardirySLHPBB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Goriac14, author = {Iulian Goriac}, title = {Plausibilistic Entropy and Anonymity}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {1}, pages = {64--83}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.03.31.064}, doi = {10.22667/JOWUA.2014.03.31.064}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Goriac14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GotzfriedM14, author = {Johannes G{\"{o}}tzfried and Tilo M{\"{u}}ller}, title = {Analysing Android's Full Disk Encryption Feature}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {1}, pages = {84--100}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.03.31.084}, doi = {10.22667/JOWUA.2014.03.31.084}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GotzfriedM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GrittiSPLW14, author = {Cl{\'{e}}mentine Gritti and Willy Susilo and Thomas Plantard and Kaitai Liang and Duncan S. Wong}, title = {Empowering Personal Health Records with Cloud Computing: How to encrypt with forthcoming fine-grained policies efficiently}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {3--28}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.003}, doi = {10.22667/JOWUA.2014.12.31.003}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GrittiSPLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HochreinerFMKSW14, author = {Christoph Hochreiner and Peter Fr{\"{u}}hwirt and Zhendong Ma and Peter Kieseberg and Sebastian Schrittwieser and Edgar R. Weippl}, title = {Genie in a Model? Why Model Driven Security will not secure your Web Application}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {44--62}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.044}, doi = {10.22667/JOWUA.2014.09.31.044}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HochreinerFMKSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/IslamSKA14, author = {Raihan Ul Islam and Mischa Schmidt and Hans{-}Joerg Kolbe and Karl Andersson}, title = {Secure and Scalable Multimedia Sharing between Smart Homes}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {79--93}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.079}, doi = {10.22667/JOWUA.2014.09.31.079}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/IslamSKA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JoseGP14, author = {Sangeetha Jose and Akash Gautam and Chandrasekaran Pandu Rangan}, title = {A New Certificateless Blind Signature Scheme}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {1}, pages = {122--141}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.03.31.122}, doi = {10.22667/JOWUA.2014.03.31.122}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/JoseGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KammullerP14, author = {Florian Kamm{\"{u}}ller and Christian W. Probst}, title = {Invalidating Policies using Structural Information}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {2}, pages = {59--79}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.06.31.059}, doi = {10.22667/JOWUA.2014.06.31.059}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KammullerP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KentLW14, author = {Alexander D. Kent and Lorie M. Liebrock and James Wernicke}, title = {Differentiating User Authentication Graphs}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {2}, pages = {24--38}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.06.31.024}, doi = {10.22667/JOWUA.2014.06.31.024}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KentLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KotenkoD14, author = {Igor V. Kotenko and Elena Doynikova}, title = {Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {14--29}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.014}, doi = {10.22667/JOWUA.2014.09.31.014}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KotenkoD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeuT14, author = {Fang{-}Yie Leu and A Min Tjoa}, title = {Guest Editorial: Emerging Software Reliability and System Security Technologies}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {1}, pages = {1--3}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.03.31.001}, doi = {10.22667/JOWUA.2014.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeuT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LindauerGRW14, author = {Brian Lindauer and Joshua Glasser and Mitch Rosen and Kurt C. Wallnau}, title = {Generating Test Data for Insider Threat Detectors}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {2}, pages = {80--94}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.06.31.080}, doi = {10.22667/JOWUA.2014.06.31.080}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LindauerGRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MundiePD14, author = {David A. Mundie and Samuel J. Perl and Carly Huth J. D.}, title = {Insider Threat Defined: Discovering the Prototypical Case}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {2}, pages = {7--23}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.06.31.007}, doi = {10.22667/JOWUA.2014.06.31.007}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MundiePD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PanditBT14, author = {Tapas Pandit and Rana Barua and Somanath Tripathy}, title = {eCK Secure Single Round ID-based Authenticated Key Exchange Protocols with Master Perfect Forward Secrecy (Extended Version)}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {65--85}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.065}, doi = {10.22667/JOWUA.2014.12.31.065}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PanditBT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PhamBD14, author = {Thanh{-}Trung Pham and Fran{\c{c}}ois Bonnet and Xavier D{\'{e}}fago}, title = {Reliability Prediction for Component-based Software Systems with Architectural-level Fault Tolerance Mechanisms (Extended Version)}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {1}, pages = {4--36}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.03.31.004}, doi = {10.22667/JOWUA.2014.03.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PhamBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SaenkoK14, author = {Igor Saenko and Igor V. Kotenko}, title = {Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {86--102}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.086}, doi = {10.22667/JOWUA.2014.12.31.086}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/SaenkoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/StenzelKBR14, author = {Kurt Stenzel and Kuzman Katkalov and Marian Borek and Wolfgang Reif}, title = {A Model-Driven Approach to Noninterference}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {30--43}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.030}, doi = {10.22667/JOWUA.2014.09.31.030}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/StenzelKBR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SunK14, author = {Kyoungjae Sun and Younghan Kim}, title = {Flow Mobility Management in PMIPv6-based {DMM} (Distributed Mobility Management) Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {120--127}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.120}, doi = {10.22667/JOWUA.2014.12.31.120}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/SunK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TanjoMMM14, author = {Tomoya Tanjo and Kazuhiro Minami and Ken Mano and Hiroshi Maruyama}, title = {Evaluating data utility of privacy-preserving pseudonymized location datasets}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {63--78}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.063}, doi = {10.22667/JOWUA.2014.09.31.063}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TanjoMMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YasudaTS14, author = {Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai}, title = {Efficient variant of Rainbow using sparse secret keys}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {3--13}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.003}, doi = {10.22667/JOWUA.2014.09.31.003}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YasudaTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/You14, author = {Ilsun You}, title = {Editorial}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.001}, doi = {10.22667/JOWUA.2014.09.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/You14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/You14a, author = {Ilsun You}, title = {Editorial}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {4}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.12.31.001}, doi = {10.22667/JOWUA.2014.12.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/You14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AbbasiCD13, author = {Sedigheh Abbasi and Stelvio Cimato and Ernesto Damiani}, title = {Clustering Models in Secure Clustered Multiparty Computation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {63--76}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.063}, doi = {10.22667/JOWUA.2013.06.31.063}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AbbasiCD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AnginB13, author = {Pelin Angin and Bharat K. Bhargava}, title = {An Agent-based Optimization Framework for Mobile-Cloud Computing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {1--17}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.001}, doi = {10.22667/JOWUA.2013.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AnginB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BabaE13, author = {Kensuke Baba and Serina Egawa}, title = {On the Order of Search for Personal Identification with Biometric Images}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {97--103}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.097}, doi = {10.22667/JOWUA.2013.06.31.097}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BabaE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BadiiCPPSTV13, author = {Atta Badii and Davide Carboni and Antonio Pintus and Andrea Piras and Alberto Serra and Marco Tiemann and Nagarajan Viswanathan}, title = {CityScripts: Unifying Web, IoT and Smart City Services in a Smart Citizen Workspace}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {58--78}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.058}, doi = {10.22667/JOWUA.2013.09.31.058}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BadiiCPPSTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BkakriaCCFG13, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jos{\'{e}} M. Fernandez and David Gross{-}Amblard}, title = {Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {39--62}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.039}, doi = {10.22667/JOWUA.2013.06.31.039}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BkakriaCCFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CadeB13, author = {David Cad{\'{e}} and Bruno Blanchet}, title = {From Computationally-Proved Protocol Specifications to Implementations and Application to {SSH}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {4--31}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.004}, doi = {10.22667/JOWUA.2013.03.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CadeB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChangLCHL13, author = {Chia{-}Hsuan Chang and Chia{-}Lung Liu and Hsi{-}Lu Chao and Kuei{-}Li Huang and Yi{-}Bing Lin}, title = {A Novel {LIPA} Scheme for {LTE} VoIP Services with Home eNBs}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {1--22}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.001}, doi = {10.22667/JOWUA.2013.09.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChangLCHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChenLMP13, author = {Xihui Chen and Gabriele Lenzini and Sjouke Mauw and Jun Pang}, title = {Design and Formal Analysis of {A} Group Signature Based Electronic Toll Pricing System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {55--75}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.055}, doi = {10.22667/JOWUA.2013.03.31.055}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChenLMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChoPSR13, author = {Wonjun Cho and Youngho Park and Chul Sur and Kyung Hyune Rhee}, title = {An Improved Privacy-Preserving Navigation Protocol in \{VANET\}s}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {80--92}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.080}, doi = {10.22667/JOWUA.2013.12.31.080}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChoPSR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ClaycombH13, author = {William R. Claycomb and Carly L. Huth}, title = {A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {1--19}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.001}, doi = {10.22667/JOWUA.2013.12.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ClaycombH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CrassDJKM13, author = {Stefan Cra{\ss} and Tobias D{\"{o}}nz and Gerson Joskowicz and Eva K{\"{u}}hn and Alexander Marek}, title = {Securing a Space-Based Service Architecture with Coordination-Driven Access Control}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {76--97}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.076}, doi = {10.22667/JOWUA.2013.03.31.076}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/CrassDJKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EbriBSV13, author = {Noura Al Ebri and Joonsang Baek and Abdulhadi Shoufan and Quang Hieu Vu}, title = {Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {32--54}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.032}, doi = {10.22667/JOWUA.2013.03.31.032}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EbriBSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GochhayatV13, author = {Sarada Prasad Gochhayat and Pallapa Venkataram}, title = {Performance Analysis of a Priority based Resource Allocation Scheme in Ubiquitous Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {23--40}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.023}, doi = {10.22667/JOWUA.2013.09.31.023}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GochhayatV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HouSUY13, author = {Shuhui Hou and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Siu{-}Ming Yiu}, title = {Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {104--113}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.104}, doi = {10.22667/JOWUA.2013.06.31.104}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HouSUY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HuaiQLLL13, author = {Weicheng Huai and Zhuzhong Qian and Xin Li and Gangyi Luo and Sanglu Lu}, title = {Energy Aware Task Scheduling in Data Centers}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {18--38}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.018}, doi = {10.22667/JOWUA.2013.06.31.018}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HuaiQLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JaraLG13, author = {Antonio J. Jara and Latif Ladid and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {97--118}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.097}, doi = {10.22667/JOWUA.2013.09.31.097}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/JaraLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeggMNHAGC13, author = {Philip A. Legg and Nick Moffat and Jason R. C. Nurse and Jassim Happa and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese}, title = {Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {20--37}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.020}, doi = {10.22667/JOWUA.2013.12.31.020}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeggMNHAGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LomoteyD13, author = {Richard K. Lomotey and Ralph Deters}, title = {Facilitating Multi-Device Usage in mHealth}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {77--96}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.077}, doi = {10.22667/JOWUA.2013.06.31.077}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LomoteyD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MatsunoY13, author = {Yutaka Matsuno and Shuichiro Yamamoto}, title = {A Framework for Dependability Consensus Building and In-Operation Assurance}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {118--134}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.118}, doi = {10.22667/JOWUA.2013.03.31.118}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MatsunoY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PoiselMT13, author = {Rainer Poisel and Erich Malzer and Simon Tjoa}, title = {Evidence and Cloud Computing: The Virtual Machine Introspection Approach}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {135--152}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.135}, doi = {10.22667/JOWUA.2013.03.31.135}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PoiselMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ProbstH13, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen}, title = {Reachability-based Impact as a Measure for Insiderness}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {38--48}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.038}, doi = {10.22667/JOWUA.2013.12.31.038}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ProbstH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SeoCKH13, author = {Jiwan Seo and Seungjin Choi and Mucheol Kim and Sangyong Han}, title = {The Method of Personalized Recommendation with Ensemble Combination}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {108--121}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.108}, doi = {10.22667/JOWUA.2013.12.31.108}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SeoCKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShahzadL13, author = {Raja Khurram Shahzad and Niklas Lavesson}, title = {Comparative Analysis of Voting Schemes for Ensemble-based Malware Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {98--117}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.098}, doi = {10.22667/JOWUA.2013.03.31.098}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShahzadL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShinY13, author = {Dongwan Shin and Huiping Yao}, title = {A User Study of Security Warnings for Detecting {QR} Code Based Attacks on Android Phone}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {49--64}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.049}, doi = {10.22667/JOWUA.2013.12.31.049}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShinY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SinghRB13, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, title = {Lattice Based Efficient Threshold Public Key Encryption Scheme}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {93--107}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.093}, doi = {10.22667/JOWUA.2013.12.31.093}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SinghRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TakayaTY13, author = {Mayumi Takaya and Yusuke Tsuruta and Akihiro Yamamura}, title = {Reverse Turing Test using Touchscreens and {CAPTCHA}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {41--57}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.041}, doi = {10.22667/JOWUA.2013.09.31.041}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TakayaTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ViragKE13, author = {L{\'{a}}szl{\'{o}} Vir{\'{a}}g and J{\'{o}}zsef Kov{\'{a}}cs and Andr{\'{a}}s Edelmayer}, title = {Interacting Advanced {ITS} Communications with Low-Power Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {79--96}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.079}, doi = {10.22667/JOWUA.2013.09.31.079}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ViragKE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WeipplTT13, author = {Edgar R. Weippl and A Min Tjoa and Simon Tjoa}, title = {Frontiers in Security and Dependability}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {1--3}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.001}, doi = {10.22667/JOWUA.2013.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WeipplTT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/XuLMZ13, author = {Jian Xu and Yuxi Li and Jingwei Miao and Fucai Zhou}, title = {The Electronic Cash Protocol Based on Dynamic Group Signature}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {65--79}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.065}, doi = {10.22667/JOWUA.2013.12.31.065}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/XuLMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AnderssonE12, author = {Karl Andersson and Muslim Elkotob}, title = {Rethinking {IP} Mobility Management}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {3}, pages = {41--49}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.09.31.041}, doi = {10.22667/JOWUA.2012.09.31.041}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AnderssonE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AndoTS12, author = {Ruo Ando and Kazushi Takahashi and Kuniyasu Suzaki}, title = {Inter-domain Communication Protocol for Real-time File Access Monitor of Virtual Machine}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {120--137}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.120}, doi = {10.22667/JOWUA.2012.03.31.120}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AndoTS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AzamLKNAE12, author = {Muhammad Awais Azam and Jonathan Loo and Sardar Kashif Ashraf Khan and Usman Naeem and Muhammad Adeel and Waleed Ejaz}, title = {Behavioural Patterns Analysis of Low Entropy People Using Proximity Data}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {3}, pages = {21--40}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.09.31.021}, doi = {10.22667/JOWUA.2012.09.31.021}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AzamLKNAE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChoiC12, author = {Byungha Choi and Kyungsan Cho}, title = {Detection of Insider Attacks to the Web Server}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {35--45}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.035}, doi = {10.22667/JOWUA.2012.12.31.035}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChoiC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ClaycombHFML12, author = {William R. Claycomb and Carly L. Huth and Lori Flynn and David M. McIntire and Todd B. Lewellen}, title = {Chronological Examination of Insider Threat Sabotage: Preliminary Observations}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {4--20}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.004}, doi = {10.22667/JOWUA.2012.12.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ClaycombHFML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ColombiniC12, author = {Clara Maria Colombini and Antonio Colella}, title = {Digital scene of crime: technique of profiling users}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {3}, pages = {50--73}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.09.31.050}, doi = {10.22667/JOWUA.2012.09.31.050}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ColombiniC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DowLHLH12, author = {Chyi{-}Ren Dow and Yu{-}Hong Lee and Pa Hsuan and Yi{-}Tung Lee and Shiow{-}Fen Hwang}, title = {Omnibone: An Efficient Service Data Circulation and Discovery Scheme in VANETs}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {3}, pages = {4--20}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.09.31.004}, doi = {10.22667/JOWUA.2012.09.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/DowLHLH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Gollmann12, author = {Dieter Gollmann}, title = {From Insider Threats to Business Processes that are Secure-by-Design}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {4--12}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.004}, doi = {10.22667/JOWUA.2012.03.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Gollmann12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HoL12, author = {Shuyuan Mary Ho and Hwajung Lee}, title = {A Thief among Us: The Use of Finite-State Machines to Dissect Insider Threat in Cloud Communications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {82--98}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.082}, doi = {10.22667/JOWUA.2012.03.31.082}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HoriCY12, author = {Yoshiaki Hori and William R. Claycomb and Kangbin Yim}, title = {Frontiers in Insider Threats and Data Leakage Prevention}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {1--3}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.001}, doi = {10.22667/JOWUA.2012.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HoriCY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, title = {Design of Categorization Mechanism for Disaster-Information-Gathering System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {21--34}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.021}, doi = {10.22667/JOWUA.2012.12.31.021}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeeLBLAY12, author = {Kangwon Lee and Kyungroul Lee and Jaecheon Byun and Sunghoon Lee and Hyobeom Ahn and Kangbin Yim}, title = {Extraction of Platform-unique Information as an Identifier}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {85--99}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.085}, doi = {10.22667/JOWUA.2012.12.31.085}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeeLBLAY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LingSM12, author = {Amy Poh Ai Ling and Kokichi Sugihara and Masao Mukaidono}, title = {Enhancing Smart Grid System Processes via Philosophy of Security - Case Study based on Information Security Systems -}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {3}, pages = {94--112}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.09.31.094}, doi = {10.22667/JOWUA.2012.09.31.094}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LingSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NishideMS12, author = {Takashi Nishide and Shingo Miyazaki and Kouichi Sakurai}, title = {Security Analysis of Offline E-cash Systems with Malicious Insider}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {55--71}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.055}, doi = {10.22667/JOWUA.2012.03.31.055}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NishideMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SakuraiG12, author = {Kouichi Sakurai and Dieter Gollmann}, title = {Managing Insider Security Threats {(MIST} 2012 Volume 1)}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {1--3}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.001}, doi = {10.22667/JOWUA.2012.12.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SakuraiG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SalemS12, author = {Malek Ben Salem and Salvatore J. Stolfo}, title = {Combining Baiting and User Search Profiling Techniques for Masquerade Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {13--29}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.013}, doi = {10.22667/JOWUA.2012.03.31.013}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SalemS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Sasaki12, author = {Takayuki Sasaki}, title = {A Framework for Detecting Insider Threats using Psychological Triggers}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {99--119}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.099}, doi = {10.22667/JOWUA.2012.03.31.099}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Sasaki12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/UchidaTSS12, author = {Noriki Uchida and Kazuo Takahata and Yoshitaka Shibata and Norio Shiratori}, title = {Never Die Network Based on Cognitive Wireless Network and Satellite System for Large Scale Disaster}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {3}, pages = {74--93}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.09.31.074}, doi = {10.22667/JOWUA.2012.09.31.074}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/UchidaTSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VivekSKR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Salini Selvaraj Kowsalya and C. Pandu Rangan}, title = {{PKI} Based Signcryption without Pairing: an Efficient Scheme with Tight Security Reduction}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {72--84}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.072}, doi = {10.22667/JOWUA.2012.12.31.072}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VivekSKR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VivekSVR12, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Ramarathnam Venkatesan and C. Pandu Rangan}, title = {A Special Purpose Signature Scheme for Secure Computation of Traffic in a Distributed Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {46--60}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.046}, doi = {10.22667/JOWUA.2012.12.31.046}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VivekSVR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WangMT0ZM012, author = {Jianfeng Wang and Hua Ma and Qiang Tang and Jin Li and Hui Zhu and Siqi Ma and Xiaofeng Chen}, title = {A New Efficient Verifiable Fuzzy Keyword Search Scheme}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {61--71}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.061}, doi = {10.22667/JOWUA.2012.12.31.061}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WangMT0ZM012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Xhafa12, author = {Fatos Xhafa}, title = {Advances in Mobility Services and Protocols for Cognitive and Ubiquitous Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {3}, pages = {1--3}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.09.31.001}, doi = {10.22667/JOWUA.2012.09.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Xhafa12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YanaiTMO12, author = {Naoto Yanai and Raylin Tso and Masahiro Mambo and Eiji Okamoto}, title = {A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {30--54}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.030}, doi = {10.22667/JOWUA.2012.03.31.030}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YanaiTMO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Zhao0MTZ12, author = {Yuanjie Zhao and Xiaofeng Chen and Hua Ma and Qiang Tang and Hui Zhu}, title = {A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {1/2}, pages = {72--81}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.03.31.072}, doi = {10.22667/JOWUA.2012.03.31.072}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Zhao0MTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CastiglioneDSP11, author = {Aniello Castiglione and Bonaventura D'Alessio and Alfredo De Santis and Francesco Palmieri}, title = {Hiding Information into {OOXML} Documents: New Steganographic Perspectives}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {4}, pages = {59--83}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.12.31.059}, doi = {10.22667/JOWUA.2011.12.31.059}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/CastiglioneDSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChenLSL11, author = {Hsiao{-}Han Chen and Yi{-}Bing Lin and Yingrong Coral Sung and Ren{-}Huang Liou}, title = {Direction-based Wireless Remote Controller: {A} Smartphone Application}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {2}, pages = {33--45}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.06.31.033}, doi = {10.22667/JOWUA.2011.06.31.033}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChenLSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ContrerasBS11, author = {Luis M. Contreras and Carlos Jesus Bernardos and Ignacio Soto}, title = {{RAMS:} {A} Protocol Extension to PMIPv6 for Improving Handover Performance of Multicast Traffic}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {2}, pages = {67--82}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.06.31.067}, doi = {10.22667/JOWUA.2011.06.31.067}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ContrerasBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CrescenzoGKTZ11, author = {Giovanni Di Crescenzo and Abhrajit Ghosh and Abhinay Kampasi and Rajesh Talpade and Yin Zhang}, title = {Detecting Anomalies in Active Insider Stepping Stone Attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {103--120}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.103}, doi = {10.22667/JOWUA.2011.03.31.103}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CrescenzoGKTZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EnokidoAT11, author = {Tomoya Enokido and Ailixier Aikebaier and Makoto Takizawa}, title = {Computation and Transmission Rate Based Algorithm for Reducing the Total Power Consumption}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {2}, pages = {1--18}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.06.31.001}, doi = {10.22667/JOWUA.2011.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EnokidoAT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Fung11, author = {Carol J. Fung}, title = {Collaborative Intrusion Detection Networks and Insider Attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {63--74}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.063}, doi = {10.22667/JOWUA.2011.03.31.063}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Fung11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HuangL11, author = {Yi{-}Li Huang and Fang{-}Yie Leu}, title = {Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman {PKDS} {RSA} and Stream Ciphering for Users Known to Each Other}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {3}, pages = {96--107}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.09.31.096}, doi = {10.22667/JOWUA.2011.09.31.096}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HuangL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HunkerP11, author = {Jeffrey Hunker and Christian W. Probst}, title = {Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {4--27}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.004}, doi = {10.22667/JOWUA.2011.03.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HunkerP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KiyomotoM11, author = {Shinsaku Kiyomoto and Keith M. Martin}, title = {Model for a Common Notion of Privacy Leakage on Public Database}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {50--62}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.050}, doi = {10.22667/JOWUA.2011.03.31.050}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KiyomotoM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeitnerMR11, author = {Maria Leitner and Juergen Mangler and Stefanie Rinderle{-}Ma}, title = {{SPRINT-} Responsibilities: Design and Development of Security Policies in Process-aware Information Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {4}, pages = {4--26}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.12.31.004}, doi = {10.22667/JOWUA.2011.12.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeitnerMR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Leu11, author = {Fang{-}Yie Leu}, title = {Emerging Security Technologies and Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {3}, pages = {1--3}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.09.31.001}, doi = {10.22667/JOWUA.2011.09.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Leu11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MiyajiRS11, author = {Atsuko Miyaji and Mohammad Shahriar Rahman and Masakazu Soshi}, title = {Efficient and Low-Cost {RFID} Authentication Schemes}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {3}, pages = {4--25}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.09.31.004}, doi = {10.22667/JOWUA.2011.09.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MiyajiRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MooreCCSST11, author = {Andrew P. Moore and Dawn M. Cappelli and Thomas C. Caron and Eric D. Shaw and Derrick Spooner and Randall F. Trzeciak}, title = {A Preliminary Model of Insider Theft of Intellectual Property}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {28--49}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.028}, doi = {10.22667/JOWUA.2011.03.31.028}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MooreCCSST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MouchaLP11, author = {Cornelius Moucha and Enrico Lovat and Alexander Pretschner}, title = {A virtualized usage control bus system}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {4}, pages = {84--101}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.12.31.084}, doi = {10.22667/JOWUA.2011.12.31.084}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MouchaLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NoblesAC11, author = {Philip Nobles and Shahid Ali and Howard Chivers}, title = {Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {93--102}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.093}, doi = {10.22667/JOWUA.2011.03.31.093}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NoblesAC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PakniatE11, author = {Nasrollah Pakniat and Ziba Eslami}, title = {A Proxy E-Raffle Protocol Based on Proxy Signatures}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {3}, pages = {74--84}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.09.31.074}, doi = {10.22667/JOWUA.2011.09.31.074}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PakniatE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Pieters11, author = {Wolter Pieters}, title = {Representing Humans in System Security Models: An Actor-Network Approach}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {75--92}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.075}, doi = {10.22667/JOWUA.2011.03.31.075}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Pieters11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PoiselTT11, author = {Rainer Poisel and Simon Tjoa and Paul Tavolato}, title = {Advanced File Carving Approaches for Multimedia Files}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {4}, pages = {42--58}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.12.31.042}, doi = {10.22667/JOWUA.2011.12.31.042}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PoiselTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ProbstYSS11, author = {Christian W. Probst and Ilsun You and Dongwan Shin and Kouichi Sakurai}, title = {Addressing Insider Threats and Information Leakage}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {1--3}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.001}, doi = {10.22667/JOWUA.2011.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ProbstYSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/RassWS11, author = {Stefan Rass and Raphael Wigoutschnigg and Peter Schartner}, title = {Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {4}, pages = {27--41}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.12.31.027}, doi = {10.22667/JOWUA.2011.12.31.027}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/RassWS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShahriarAI11, author = {Abu Zafar M. Shahriar and Mohammed Atiquzzaman and William D. Ivancic}, title = {Evaluation of the Route Optimization for {NEMO} in Satellite Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {2}, pages = {46--66}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.06.31.046}, doi = {10.22667/JOWUA.2011.06.31.046}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShahriarAI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShiraishiMF11, author = {Yoshiaki Shiraishi and Masami Mohri and Youji Fukuta}, title = {A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {2}, pages = {83--94}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.06.31.083}, doi = {10.22667/JOWUA.2011.06.31.083}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShiraishiMF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TalebiFardL11, author = {Peyman TalebiFard and Victor C. M. Leung}, title = {Context-Aware Mobility Management in Heterogeneous Network Environments}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {2}, pages = {19--32}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.06.31.019}, doi = {10.22667/JOWUA.2011.06.31.019}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TalebiFardL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WeipplTP11, author = {Edgar R. Weippl and A Min Tjoa and G{\"{u}}nther Pernul}, title = {Guest Editorial: Advances in Applied Security}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {4}, pages = {1--3}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.12.31.001}, doi = {10.22667/JOWUA.2011.12.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WeipplTP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YangLC11, author = {Fuw{-}Yi Yang and Zhen{-}Wei Liu and Su{-}Hui Chiu}, title = {Mobile Banking Payment System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {3}, pages = {85--95}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.09.31.085}, doi = {10.22667/JOWUA.2011.09.31.085}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YangLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YouHS11, author = {Ilsun You and Yoshiaki Hori and Kouichi Sakurai}, title = {Enhancing {SVO} Logic for Mobile IPv6 Security Protocols}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {3}, pages = {26--52}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.09.31.026}, doi = {10.22667/JOWUA.2011.09.31.026}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YouHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ZiaZ11, author = {Tanveer A. Zia and Albert Y. Zomaya}, title = {A Lightweight Security Framework for Wireless Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {3}, pages = {53--73}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.09.31.053}, doi = {10.22667/JOWUA.2011.09.31.053}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/ZiaZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/0002CC10, author = {Jie Zhang and Chen Chen and Robin Cohen}, title = {A Scalable and Effective Trust-Based Framework for Vehicular Ad-Hoc Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {3--15}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.003}, doi = {10.22667/JOWUA.2010.12.31.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/0002CC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BernardosGCCS10, author = {Carlos Jesus Bernardos and Marco Gramaglia and Luis M. Contreras and Mar{\'{\i}}a Calder{\'{o}}n and Ignacio Soto}, title = {Network-based Localized {IP} mobility Management: Proxy Mobile IPv6 and Current Trends in Standardization}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {16--35}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.016}, doi = {10.22667/JOWUA.2010.09.31.016}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BernardosGCCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BienPN10, author = {Van Quang Bien and R. Venkatesha Prasad and Ignas G. Niemegeers}, title = {Handoff in Radio over Fiber Indoor Networks at 60 GHz}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {71--82}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.071}, doi = {10.22667/JOWUA.2010.09.31.071}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BienPN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CostaLMMISDM10, author = {Gabriele Costa and Aliaksandr Lazouski and Fabio Martinelli and Ilaria Matteucci and Val{\'{e}}rie Issarny and Rachid Saadi and Nicola Dragoni and Fabio Massacci}, title = {Security-by-Contract-with-Trust for Mobile Devices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {75--91}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.075}, doi = {10.22667/JOWUA.2010.12.31.075}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CostaLMMISDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FuchsP10, author = {Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {14--28}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.014}, doi = {10.22667/JOWUA.2010.06.31.014}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FuchsP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Gal-OzGG10, author = {Nurit Gal{-}Oz and Tal Grinshpoun and Ehud Gudes}, title = {Privacy Issues with Sharing and Computing Reputation across Communities}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {16--34}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.016}, doi = {10.22667/JOWUA.2010.12.31.016}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Gal-OzGG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HanKG10, author = {Youn{-}Hee Han and Chan{-}Myung Kim and Joon{-}Min Gil}, title = {A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {96--106}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.096}, doi = {10.22667/JOWUA.2010.09.31.096}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HanKG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JaraZG10, author = {Antonio J. Jara and Miguel A. Zamora and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN {(HWSN6)}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {107--122}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.107}, doi = {10.22667/JOWUA.2010.09.31.107}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/JaraZG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KafleI10, author = {Ved P. Kafle and Masugi Inoue}, title = {Locator {ID} Separation for Mobility Management in the New Generation Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {3--15}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.003}, doi = {10.22667/JOWUA.2010.09.31.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KafleI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KimSNH10, author = {Mucheol Kim and Jiwan Seo and Sanhyun Noh and Sangyong Han}, title = {Reliable Social Trust Management with Mitigating Sparsity Problem}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {86--97}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.086}, doi = {10.22667/JOWUA.2010.06.31.086}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KimSNH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KiriyamaWXT10, author = {Sawako Kiriyama and Ryuji Wakikawa and Jinwei Xia and Fumio Teraoka}, title = {Context Reflector for Proxy Mobile IPv6}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {36--51}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.036}, doi = {10.22667/JOWUA.2010.09.31.036}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KiriyamaWXT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kofod-PetersenC10, author = {Anders Kofod{-}Petersen and J{\"{o}}rg Cassens}, title = {Proxies for Privacy in Ambient Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {62--74}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.062}, doi = {10.22667/JOWUA.2010.12.31.062}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kofod-PetersenC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeeT10, author = {Jong{-}Hyouk Lee and Fumio Teraoka}, title = {Guest Editorial: Advances in Wireless Mobile and Sensor Technologies}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.001}, doi = {10.22667/JOWUA.2010.09.31.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeeT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeeYCPYY10, author = {Kyungroul Lee and Hyeungjun Yeuk and Youngtae Choi and Sitha Pho and Ilsun You and Kangbin Yim}, title = {Safe Authentication Protocol for Secure {USB} Memories}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {46--55}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.046}, doi = {10.22667/JOWUA.2010.06.31.046}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeeYCPYY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LiuCWW10, author = {Debin Liu and L. Jean Camp and XiaoFeng Wang and Lusha Wang}, title = {Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {29--45}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.029}, doi = {10.22667/JOWUA.2010.06.31.029}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LiuCWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NagarajanJ10, author = {Anand Nagarajan and Christian Damsgaard Jensen}, title = {A Generic Role Based Access Control Model for Wind Power Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {35--49}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.035}, doi = {10.22667/JOWUA.2010.12.31.035}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NagarajanJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SalemS10, author = {Malek Ben Salem and Salvatore J. Stolfo}, title = {Detecting Masqueraders: {A} Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {3--13}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.003}, doi = {10.22667/JOWUA.2010.06.31.003}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SalemS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/StanierNBLW10, author = {James Stanier and Stephen Naicken and Anirban Basu and Jian Li and Ian Wakeman}, title = {Can We Use Trust in Online Dating?}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {50--61}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.050}, doi = {10.22667/JOWUA.2010.12.31.050}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/StanierNBLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Sun0SYS10, author = {Jingbo Sun and Yue Wang and Hongbo Si and Jian Yuan and Xiuming Shan}, title = {Aggregate Human Mobility Modeling Using Principal Component Analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {83--95}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.083}, doi = {10.22667/JOWUA.2010.09.31.083}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Sun0SYS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ThiD10, author = {Que Nguyet Tran Thi and Tran Khanh Dang}, title = {Towards Side-Effects-free Database Penetration Testing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {72--85}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.072}, doi = {10.22667/JOWUA.2010.06.31.072}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ThiD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TongCM10, author = {Val{\'{e}}rie Viet Triem Tong and Andrew J. Clark and Ludovic M{\'{e}}}, title = {Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {56--71}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.056}, doi = {10.22667/JOWUA.2010.06.31.056}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TongCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YanZY10, author = {Zhiwei Yan and Huachun Zhou and Ilsun You}, title = {{N-NEMO:} {A} Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {52--70}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.052}, doi = {10.22667/JOWUA.2010.09.31.052}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YanZY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Yim10, author = {Kangbin Yim}, title = {Guest Editorial: Advances in Trust Management}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.001}, doi = {10.22667/JOWUA.2010.12.31.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Yim10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/You10, author = {Ilsun You}, title = {Editorial}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.001}, doi = {10.22667/JOWUA.2010.06.31.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/You10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.