Search dblp for Publications

export results for "stream:journals/jowua:"

 download as .bib file

@article{DBLP:journals/jowua/AlsmadiMAJASAAA24,
  author       = {Mutasem K. Alsmadi and
                  Rami Mustafa A. Mohammad and
                  Malek Alzaqebah and
                  Sana Jawarneh and
                  Muath AlShaikh and
                  Ahmad Al Smadi and
                  Fahad A. Alghamdi and
                  Jehad Saad Alqurni and
                  Hayat Alfagham},
  title        = {Intrusion Detection Using an Improved Cuckoo Search Optimization Algorithm},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {73--93},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.006},
  doi          = {10.58346/JOWUA.2024.I2.006},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AlsmadiMAJASAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AzourySS24,
  author       = {Nehme Azoury and
                  Satya Subrahmanyam and
                  Nada Sarkis},
  title        = {The Influence of a Data-Driven Culture on Product Development and
                  Organizational Success through the Use of Business Analytics},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {123--134},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.009},
  doi          = {10.58346/JOWUA.2024.I2.009},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AzourySS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BhilavadeSPA24,
  author       = {Milind B. Bhilavade and
                  K. S. Shivaprakasha and
                  Meenakshi R. Patil and
                  Lalita S. Admuthe},
  title        = {Fingerprint Reconstruction: Approaches to Improve Fingerprint Images},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {75--87},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.006},
  doi          = {10.58346/JOWUA.2024.I1.006},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BhilavadeSPA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChowdaryUJMV24,
  author       = {P. Bharath Kumar Chowdary and
                  R. Udayakumar and
                  Chaya Jadhav and
                  B. Mohanraj and
                  V. R. Vimal},
  title        = {An Efficient Intrusion Detection Solution for Cloud Computing Environments
                  Using Integrated Machine Learning Methodologies},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {14--26},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.002},
  doi          = {10.58346/JOWUA.2024.I2.002},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChowdaryUJMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DasariB24,
  author       = {Deepthi Reddy Dasari and
                  G. Hima Bindu},
  title        = {Feature Selection Model-based Intrusion Detection System for Cyberattacks
                  on the Internet of Vehicles Using Cat and Mouse Optimizer},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {251--269},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.017},
  doi          = {10.58346/JOWUA.2024.I2.017},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/DasariB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DeviJSV24,
  author       = {B. Aruna Devi and
                  S. Jaganathan and
                  Parag K. Shah and
                  Narendran Venkatapathy},
  title        = {Prediction of Premature Retinopathy Fundus Images Using Dense Network
                  Model for Intelligent Portable Screening Device},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {170--182},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.012},
  doi          = {10.58346/JOWUA.2024.I2.012},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/DeviJSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EscobedoCGSRF24,
  author       = {Fernando Escobedo and
                  Henry Bernardo Garay Canales and
                  Fernando Willy Morillo Galarza and
                  Carlos Miguel Aguilar Salda{\~{n}}a and
                  Eddy Miguel Aguirre Reyes and
                  C{\'{e}}sar Augusto Flores{-}Tananta},
  title        = {Energy Efficient Business Management System for Improving QoS in Network
                  Model},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {42--52},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.004},
  doi          = {10.58346/JOWUA.2024.I1.004},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EscobedoCGSRF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Fakiha24,
  author       = {Bandr Fakiha},
  title        = {Investigating the Secrets, New Challenges, and Best Forensic Methods
                  for Securing Critical Infrastructure Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {104--114},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.008},
  doi          = {10.58346/JOWUA.2024.I1.008},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Fakiha24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FarisMA24,
  author       = {Rawaa A. Faris and
                  Qusay Mosa and
                  Mustafa Albdairi},
  title        = {Robust Classification for Sub Brain Tumors by Using an Ant Colony
                  Algorithm with a Neural Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {270--285},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.018},
  doi          = {10.58346/JOWUA.2024.I2.018},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FarisMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Flores-Fernandez24,
  author       = {Gustavo A. Flores{-}Fernandez and
                  Miguel Jimenez{-}Carrion and
                  Flabio Guti{\'{e}}rrez and
                  Ra{\'{u}}l A. S{\'{a}}nchez{-}Ancajima},
  title        = {Genetic Algorithm and {LSTM} Artificial Neural Network for Investment
                  Portfolio Optimization},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {27--46},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.003},
  doi          = {10.58346/JOWUA.2024.I2.003},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Flores-Fernandez24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HernandezCTVOMM24,
  author       = {Ronald M. Hern{\'{a}}ndez and
                  Walter Antonio Campos{-}Ugaz and
                  Segundo Juan S{\'{a}}nchez Tarrillo and
                  Silvia Josefina Aguinaga Vasquez and
                  Sara Esther Liza Ordo{\~{n}}ez and
                  Ronald Avellaneda Montenegro and
                  Dora Elisa El{\'{\i}}as Mart{\'{\i}}nez and
                  Doris E. Fuster{-}Guill{\'{e}}n},
  title        = {Exploring Software Infrastructures for Enhanced Learning Environments
                  to Empowering Education},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {231--243},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.016},
  doi          = {10.58346/JOWUA.2024.I1.016},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HernandezCTVOMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Ismail24,
  author       = {Walaa Saber Ismail},
  title        = {Emotion Detection in Text: Advances in Sentiment Analysis Using Deep
                  Learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {17--26},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.002},
  doi          = {10.58346/JOWUA.2024.I1.002},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Ismail24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Ismail24a,
  author       = {Walaa Saber Ismail},
  title        = {Human-Centric {AI} : Enhancing User Experience through Natural Language
                  Interfaces},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {172--183},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.012},
  doi          = {10.58346/JOWUA.2024.I1.012},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Ismail24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KPSN24,
  author       = {Afnaan. K and
                  Peeta Basa Pati and
                  Tripty Singh and
                  Bhanu Prakash K. N.},
  title        = {Comparative Analysis for Feature Extraction and Prediction of {CKD}
                  Using Machine Learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {202--225},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.014},
  doi          = {10.58346/JOWUA.2024.I2.014},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KPSN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KareemullaNPLRA24,
  author       = {N. R. Mohamed Kareemulla and
                  G. S. Nijaguna and
                  Pushpa and
                  N. Dayananda Lal and
                  M. Naga Raju and
                  Zameer Ahmed Adhoni},
  title        = {A Comprehensive Approach to a Hybrid Blockchain Framework for Multimedia
                  Data Processing and Analysis in IoT-Healthcare},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {94--108},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.007},
  doi          = {10.58346/JOWUA.2024.I2.007},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KareemullaNPLRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KhalifeSF24,
  author       = {Danielle Khalife and
                  Satya Subrahmanyam and
                  Assaad Farah},
  title        = {A Sustainable Circular Business Model to Improve the Performance of
                  Small and Medium-sized Enterprises Using Blockchain Technology},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {240--250},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.016},
  doi          = {10.58346/JOWUA.2024.I2.016},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KhalifeSF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KimS24,
  author       = {Ha Rang Kim and
                  Hyun Min Song},
  title        = {Lightweight {IDS} Framework Using Word Embeddings for In-Vehicle Network
                  Security},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {1--13},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.001},
  doi          = {10.58346/JOWUA.2024.I2.001},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KimS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Lakshmi24,
  author       = {Vimitha R. Vidhya Lakshmi},
  title        = {VADIA-Verkle Tree-based Approach for Dealing Data Integrity Attacks
                  in Opportunistic Mobile Social Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {154--171},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.011},
  doi          = {10.58346/JOWUA.2024.I1.011},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Lakshmi24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MalathiNMSSP24,
  author       = {K. Malathi and
                  Shruthi S. Nair and
                  N. Madhumitha and
                  S. Sreelakshmi and
                  U. Sathya and
                  M. Sangeetha Priya},
  title        = {Medical Data Integration and Interoperability through Remote Monitoring
                  of Healthcare Devices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {60--72},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.005},
  doi          = {10.58346/JOWUA.2024.I2.005},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MalathiNMSSP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MansouriBC24,
  author       = {Sofiene Mansouri and
                  Souhaila Boulares and
                  Souhir Chabchoub},
  title        = {Machine Learning for Early Diabetes Detection and Diagnosis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {216--230},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.015},
  doi          = {10.58346/JOWUA.2024.I1.015},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MansouriBC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Monita24,
  author       = {Vivi Monita},
  title        = {Rainfall Prediction from Himawari-8 Data Using the Deep Learning Method},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {47--59},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.004},
  doi          = {10.58346/JOWUA.2024.I2.004},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Monita24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MonratS024,
  author       = {Ahmed Afif Monrat and
                  Olov Schel{\'{e}}n and
                  Karl Andersson},
  title        = {A Taxonomy Guideline for Blockchain Platforms},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {286--308},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.019},
  doi          = {10.58346/JOWUA.2024.I2.019},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MonratS024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NugrahaAE24,
  author       = {I Gde Dharma Nugraha and
                  Edwiansyah Zaky Ashadi and
                  Ardiansyah Musa Efendi},
  title        = {Performance Evaluation of Collision Avoidance for Multi-node LoRa
                  Networks based on {TDMA} and {CSMA} Algorithm},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {53--74},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.005},
  doi          = {10.58346/JOWUA.2024.I1.005},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NugrahaAE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NugrohoWWS24,
  author       = {Arief Kelik Nugroho and
                  Retantyo Wardoyo and
                  Moh Edi Wibowo and
                  Hardyanto Soebono},
  title        = {Thresholding Segmentation of Skin Lesions with Modified Ant Colony
                  Optimization Algorithm},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {226--239},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.015},
  doi          = {10.58346/JOWUA.2024.I2.015},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NugrohoWWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Putra24,
  author       = {Taufiq Odhi Dwi Putra},
  title        = {Container Load Placement for Deep Learning Application Using Whale
                  Optimization},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {183--201},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.013},
  doi          = {10.58346/JOWUA.2024.I2.013},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Putra24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RajeshNS24,
  author       = {M. Rajesh and
                  S. R. Nagaraja and
                  P. Suja},
  title        = {Multi - Robot Exploration Supported by Enhanced Localization with
                  Reduction of Localization Error Using Particle Swarm Optimization},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {202--215},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.014},
  doi          = {10.58346/JOWUA.2024.I1.014},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RajeshNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RaoS24,
  author       = {H. V. Ramana Rao and
                  V. Ravi Sankar},
  title        = {Precision in Prostate Cancer Diagnosis: {A} Comprehensive Study on
                  Neural Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {109--122},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.008},
  doi          = {10.58346/JOWUA.2024.I2.008},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RaoS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RizaYR24,
  author       = {Bob Subhan Riza and
                  Rina Yunita and
                  Rika Rosnelly},
  title        = {Comparative Analysis of {LSTM} and BiLSTM in Image Detection Processing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {244--260},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.017},
  doi          = {10.58346/JOWUA.2024.I1.017},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RizaYR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Sathyanarayanan24,
  author       = {S. Sathyanarayanan and
                  K. Srikanta Murthy},
  title        = {Heart Sound Analysis Using SAINet Incorporating {CNN} and Transfer
                  Learning for Detecting Heart Diseases},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {152--169},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.011},
  doi          = {10.58346/JOWUA.2024.I2.011},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Sathyanarayanan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SmadiAAA24,
  author       = {Ahmad Al Smadi and
                  Ahed Abugabah and
                  Mutasem K. Alsmadi and
                  Ahmad Alsmadi},
  title        = {Smart Medical Application of Deep Learning (MUNet) for Detection of
                  {COVID-19} from Chest Images},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {133--153},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.010},
  doi          = {10.58346/JOWUA.2024.I1.010},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SmadiAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SonPKY24,
  author       = {Daehyeon Son and
                  Youngshin Park and
                  Bonam Kim and
                  Ilsun You},
  title        = {A Study on the Implementation of a Network Function for Real-time
                  False Base Station Detection for the Next Generation Mobile Communication
                  Environment},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {184--201},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.013},
  doi          = {10.58346/JOWUA.2024.I1.013},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SonPKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SongY24,
  author       = {Hyunwoo Song and
                  Jaeho Yu},
  title        = {Effects of Augmented Reality based Dual-Task Proprioceptive Training
                  on Postural Stability, Positioning Sensation and Cognition},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {88--103},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.007},
  doi          = {10.58346/JOWUA.2024.I1.007},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SongY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SreevidyaS24,
  author       = {B. Sreevidya and
                  M. Supriya},
  title        = {Trust based Routing - {A} Novel Approach for Data Security in {WSN}
                  based Data Critical Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {27--41},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.003},
  doi          = {10.58346/JOWUA.2024.I1.003},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SreevidyaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TalebO24,
  author       = {Anas Abu Taleb and
                  Ammar Odeh},
  title        = {Effective Routing of Mobile Sink in Wireless Sensor Networks Using
                  Steiner Trees},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {2},
  pages        = {135--151},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i2.010},
  doi          = {10.58346/JOWUA.2024.I2.010},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TalebO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TriayudiAS24,
  author       = {Agung Triayudi and
                  Rima Tamara Aldisa and
                  S. Sumiati},
  title        = {New Framework of Educational Data Mining to Predict Student Learning
                  Performance},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {15},
  number       = {1},
  pages        = {115--132},
  year         = {2024},
  url          = {https://doi.org/10.58346/jowua.2024.i1.009},
  doi          = {10.58346/JOWUA.2024.I1.009},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TriayudiAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Abugabah23,
  author       = {Ahed Abugabah},
  title        = {Smart Medical Systems Based IoT: Exploring the Relationship Between
                  Essential Algorithms and Service Orientation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {115--127},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.009},
  doi          = {10.58346/JOWUA.2023.I4.009},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Abugabah23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AdrianiDSHSSR23,
  author       = {Dessy Adriani and
                  Ratna Dewi and
                  Leni Saleh and
                  D. Yadi Heryadi and
                  Fatma Sarie and
                  I Gede Iwan Sudipa and
                  Robbi Rahim},
  title        = {Using Distance Measure to Perform Optimal Mapping with the K-Medoids
                  Method on Medicinal Plants, Aromatics, and Spices Export},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {103--111},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.008},
  doi          = {10.58346/JOWUA.2023.I3.008},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AdrianiDSHSSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AjwadAKJM23,
  author       = {Asmaa Abbas Ajwad and
                  Ammar Abdulrahman Ahmed and
                  Muntaha Kamal and
                  Refed Adnan Jaleel and
                  Marium Basheer Mahmood},
  title        = {Improved Secure IoTs-Based Visual Computing with Image Processing
                  and Artificial Intelligence Techniques for Accurate Predicting of
                  Novel {COVID}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {1--14},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.001},
  doi          = {10.58346/JOWUA.2023.I1.001},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AjwadAKJM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Alanazi23,
  author       = {Jazem Mutared Alanazi},
  title        = {Effective Machine-Learning Based Traffic Surveillance Moving Vehicle
                  Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {95--105},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.008},
  doi          = {10.58346/JOWUA.2023.I1.008},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Alanazi23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AlharbiA23,
  author       = {Mada Alharbi and
                  Abdulatif Alabdulatif},
  title        = {Intelligent Transport System based Blockchain to Preventing Routing
                  Attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {126--143},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.011},
  doi          = {10.58346/JOWUA.2023.I1.011},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AlharbiA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ArunaSV23,
  author       = {Orchu Aruna and
                  Sk. Sameerunnisa and
                  Ramachandran Vedantham},
  title        = {Routing in Mobile ad Hoc Networks Using Machine Learning Techniques},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {84--95},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.007},
  doi          = {10.58346/JOWUA.2023.I4.007},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ArunaSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BabuB23,
  author       = {Gopatoti John Samuel Babu and
                  Manickam Baskar},
  title        = {Location Aware {DFS} Scheduling Based Improved Quality of Service
                  Maximization with IoT Devices in Cloud},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {37--49},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.003},
  doi          = {10.58346/JOWUA.2023.I1.003},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BabuB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BharathiR23,
  author       = {C. Bharathi and
                  Duraisamy Rekha},
  title        = {Load Forecasting for Demand Side Management in Smart Grid using Non-Linear
                  Machine Learning Technique},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {200--214},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.016},
  doi          = {10.58346/JOWUA.2023.I1.016},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BharathiR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BharathiSH23,
  author       = {S. Bharathi and
                  M. Senthilarasi and
                  K. Hari},
  title        = {Key Frame Extraction Based on Real-Time Person Availability Using
                  {YOLO}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {31--40},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.003},
  doi          = {10.58346/JOWUA.2023.I2.003},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BharathiSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BouhamedMZ23,
  author       = {Emna Bouhamed and
                  Hend Marouane and
                  Faouzi Zerai},
  title        = {Dynamic Resource Allocation Approach for Interference Mitigation based
                  on {NOMA} in Network Operating in Both Uplink and Downlink},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {23--44},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.003},
  doi          = {10.58346/JOWUA.2023.I4.003},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BouhamedMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BurhanAHJ23,
  author       = {Iman Mohammed Burhan and
                  Qusay Abboodi Ali and
                  Inass Shahadha Hussein and
                  Refed Adnan Jaleel},
  title        = {Mobile-computer Vision Model with Deep Learning for Testing Classification
                  and Status of Flowers Images by using IoTs Devices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {82--94},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.007},
  doi          = {10.58346/JOWUA.2023.I1.007},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BurhanAHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ClavijoLopezVNFMVF23,
  author       = {Rosa Clavijo{-}L{\'{o}}pez and
                  Jes{\'{u}}s Merino Vel{\'{a}}squez and
                  Wayky Alfredo Luy Navarrete and
                  C{\'{e}}sar Augusto Flores{-}Tananta and
                  Dorothy Luisa Mel{\'{e}}ndez Morote and
                  Maria Aurora Gonzales Vigo and
                  Doris E. Fuster{-}Guill{\'{e}}n},
  title        = {Energy-aware and Context-aware Fault Detection Framework for Wireless
                  Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {1--13},
  year         = {2023},
  url          = {https://doi.org/10.58346/jowua.2023.i3.001},
  doi          = {10.58346/JOWUA.2023.I3.001},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ClavijoLopezVNFMVF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ElfarraSRAA23,
  author       = {Belal K. Elfarra and
                  Mamoun A. Salha and
                  Raed S. Rasheed and
                  Jehad Aldahdooh and
                  Aiman Ahmed AbuSamra},
  title        = {Enhancing the Lifetime of {WSN} Using a Modified Ant Colony Optimization
                  Algorithm},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {143--155},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.011},
  doi          = {10.58346/JOWUA.2023.I3.011},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ElfarraSRAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FisenkoASACGP23,
  author       = {Olga Fisenko and
                  Larisa Adonina and
                  Heriberto Solis Sosa and
                  Shiguay Guizado Giomar Arturo and
                  Ang{\'{e}}lica S{\'{a}}nchez Castro and
                  Fernando Willy Morillo Galarza and
                  David Aroni Palomino},
  title        = {Advancements in Flexible Antenna Design: Enabling Tri-Band Connectivity
                  for WLAN, WiMAX, and 5G Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {156--168},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.012},
  doi          = {10.58346/JOWUA.2023.I3.012},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FisenkoASACGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Fuster-GuillenZ23,
  author       = {Doris E. Fuster{-}Guill{\'{e}}n and
                  Oscar Gustavo Guadalupe Zevallos and
                  Segundo Juan S{\'{a}}nchez Tarrillo and
                  Silvia Josefina Aguinaga Vasquez and
                  Miguel A. Saavedra{-}L{\'{o}}pez and
                  Ronald M. Hern{\'{a}}ndez},
  title        = {An Ensemble-based Machine Learning Model for Investigating Children
                  Interaction with Robots in Childhood Education},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {60--68},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.005},
  doi          = {10.58346/JOWUA.2023.I1.005},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Fuster-GuillenZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HassanAA23,
  author       = {Sudad Gharib Hassan and
                  Sara Alshwani and
                  Aras Al{-}Dawoodi},
  title        = {Design and Investigation of Modal Excitation in Tapered Optical Fiber
                  for a Mode Division Multiplexed Transmission System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {1--9},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.001},
  doi          = {10.58346/JOWUA.2023.I4.001},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HassanAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HengAS23,
  author       = {Sovannarith Heng and
                  Phet Aimtongkham and
                  Chakchai So{-}In},
  title        = {A Novel Video-on-Demand Caching Scheme using Hybrid Fuzzy Logic Least
                  Frequency and Recently Used with Support Vector Machine},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {15--36},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.002},
  doi          = {10.58346/JOWUA.2023.I1.002},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HengAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Hermansyah23,
  author       = {Yus Hermansyah},
  title        = {Assessing the Impact of Communicative Artificial Intelligence Based
                  Accounting Information Systems on Small and Medium Enterprises},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {230--239},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.017},
  doi          = {10.58346/JOWUA.2023.I3.017},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Hermansyah23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HurriyatiASLS23,
  author       = {Ratih Hurriyati and
                  A. Ana and
                  Sulastri and
                  Lisnawati and
                  Thosporn Sawangsang},
  title        = {Stock Market Trend Analysis and Machine Learning-based Predictive
                  Evaluation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {267--281},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.020},
  doi          = {10.58346/JOWUA.2023.I3.020},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HurriyatiASLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/IndriyaniGSW23,
  author       = {I. Indriyani and
                  Ida Ayu Dwi Giriantari and
                  Made Sudarma and
                  I Made Oka Widyantara},
  title        = {Facial Skin Type Detection for Race Classification using Convolutional
                  Neural Network and Haar Cascade Method},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {41--58},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.004},
  doi          = {10.58346/JOWUA.2023.I2.004},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/IndriyaniGSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KavithaK23,
  author       = {S. Kavitha and
                  R. Kaniezhil},
  title        = {Enhanced Wireless Network Usage and Loading on Network Delay using
                  Cognitive Radio Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {10--22},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.002},
  doi          = {10.58346/JOWUA.2023.I4.002},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KavithaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KhasawnehK23,
  author       = {Yusra Jadallah Abed Khasawneh and
                  Mohamad Ahmad Saleem Khasawneh},
  title        = {Availability of Voice-Recognition Devices to Support Visually Impaired
                  Students in Saudi Arabian Universities},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {186--193},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.014},
  doi          = {10.58346/JOWUA.2023.I3.014},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KhasawnehK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KhoeurtSMA23,
  author       = {Sopha Khoeurt and
                  Chakchai So{-}In and
                  Pakarat Musikawan and
                  Phet Aimtongkham},
  title        = {Multidirectional Trust-Based Security Mechanisms for Sinkhole Attack
                  Detection in the {RPL} Routing Protocol for Internet of Things},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {48--76},
  year         = {2023},
  url          = {https://doi.org/10.58346/jowua.2023.i3.005},
  doi          = {10.58346/JOWUA.2023.I3.005},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KhoeurtSMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kim23,
  author       = {Jongkil Kim},
  title        = {Studies on Inspecting Encrypted Data: Trends and Challenges},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {189--199},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.015},
  doi          = {10.58346/JOWUA.2023.I1.015},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kim23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KumaranTVSV23,
  author       = {U. Kumaran and
                  S. Thangam and
                  Nidhin Prabhakar T. V and
                  Jana Selvaganesan and
                  H. N. Vishwas},
  title        = {Adversarial Defense: {A} {GAN-IF} Based Cyber-security Model for Intrusion
                  Detection in Software Piracy},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {96--114},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.008},
  doi          = {10.58346/JOWUA.2023.I4.008},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KumaranTVSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LatifahWPC23,
  author       = {E. Latifah and
                  A. Fathjri Wisesa and
                  N. Adi Pramono and
                  T. Chusniyah},
  title        = {Optimization of Depression Level Detection Based on Noninvasive Parameters
                  with Artificial Neural Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {74--83},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.006},
  doi          = {10.58346/JOWUA.2023.I4.006},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LatifahWPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LopezGJRH23,
  author       = {Mirko Bruno Vela L{\'{o}}pez and
                  Mar{\'{\i}}a Ysabel Arangur{\'{\i}} Garc{\'{\i}}a and
                  Jessie Leila Bravo Jaico and
                  {\'{A}}ngel Antonio Ruiz{-}Pico and
                  Ronald M. Hern{\'{a}}ndez},
  title        = {Application of a Data Mining Model to Predict Customer Defection.
                  Case of a Telecommunications Company in Peru},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {144--158},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.012},
  doi          = {10.58346/JOWUA.2023.I1.012},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LopezGJRH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MajjaruS23,
  author       = {Chandrababu Majjaru and
                  K. Senthilkumar},
  title        = {Strengthening IoT Intrusion Detection through the {HOPNET} Model},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {89--102},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.007},
  doi          = {10.58346/JOWUA.2023.I3.007},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MajjaruS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Mansouri23,
  author       = {Sofiene Mansouri},
  title        = {Application of Neural Networks in the Medical Field},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {69--81},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.006},
  doi          = {10.58346/JOWUA.2023.I1.006},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Mansouri23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MansouriCAA23,
  author       = {Sofiene Mansouri and
                  Souhir Chabchoub and
                  Yousef Alharbi and
                  Abdulrahman Alqahtani},
  title        = {Blockchain Technology in Enhancing Health Care Ecosystem for Sustainable
                  Development},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {240--252},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.018},
  doi          = {10.58346/JOWUA.2023.I3.018},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MansouriCAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MerinBRR23,
  author       = {J. Brindha Merin and
                  W. Aisha Banu and
                  Akila R. and
                  A. Radhika},
  title        = {Semantic Annotation Based Mechanism for Web Service Discovery and
                  Recommendation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {169--185},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.013},
  doi          = {10.58346/JOWUA.2023.I3.013},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MerinBRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Modhugu23,
  author       = {Venugopal Reddy Modhugu},
  title        = {Efficient Hybrid {CNN} Method to Classify the Liver Diseases},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {36--47},
  year         = {2023},
  url          = {https://doi.org/10.58346/jowua.2023.i3.004},
  doi          = {10.58346/JOWUA.2023.I3.004},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Modhugu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MohamedMN23,
  author       = {Amira Mohamed and
                  Mohamed H. Mousa and
                  Hamed Nassar},
  title        = {Effectiveness of Guard Zone in Mitigating Interference in {D2D} Underlaid
                  Cellular Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {112--124},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.021},
  doi          = {10.58346/JOWUA.2023.I3.021},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MohamedMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MohammedH23,
  author       = {Salim Qadir Mohammed and
                  Mohammed A. ElSheikh Hussein},
  title        = {Reducing False Negative Intrusions Rates of Ensemble Machine Learning
                  Model based on Imbalanced Multiclass Datasets},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {12--30},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.002},
  doi          = {10.58346/JOWUA.2023.I2.002},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MohammedH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MustapaRCFPR23,
  author       = {Mahmud Mustapa and
                  Ummiati Rahmah and
                  Pandu Adi Cakranegara and
                  Winci Firdaus and
                  Dendi Pratama and
                  Robbi Rahim},
  title        = {Implementation of Feature Selection and Data Split using Brute Force
                  to Improve Accuracy},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {50--59},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.004},
  doi          = {10.58346/JOWUA.2023.I1.004},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MustapaRCFPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Nirmala23,
  author       = {M. S. Nirmala},
  title        = {Behavioural Analysis of Deaf and Mute People Using Gesture Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {125--142},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.010},
  doi          = {10.58346/JOWUA.2023.I3.010},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Nirmala23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Ocana-Fernandez23,
  author       = {Yolvi J. Oca{\~{n}}a{-}Fern{\'{a}}ndez and
                  Walter G{\'{o}}mez{-}Gonzales and
                  Luis Alex Valenzuela Fern{\'{a}}ndez and
                  Segundo Pio V{\'{a}}squez Ramos and
                  Huguette Fortunata Due{\~{n}}as Z{\'{u}}{\~{n}}iga and
                  Jackeline Roxana Huaman Fernandez and
                  Marco Antonio Amapanqui Broncano},
  title        = {A Novel Approach to Predict the Early Childhood Special Education
                  Learning Skills of Autistic Children Using Ensemble Machine Learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {59--65},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.005},
  doi          = {10.58346/JOWUA.2023.I2.005},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Ocana-Fernandez23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/OdehT23,
  author       = {Ammar Odeh and
                  Anas Abu Taleb},
  title        = {A Multi-Faceted Encryption Strategy for Securing Patient Information
                  in Medical Imaging},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {164--176},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.012},
  doi          = {10.58346/JOWUA.2023.I4.012},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/OdehT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RMRB23,
  author       = {Akila R. and
                  J. Brindha Merin and
                  A. Radhika and
                  Niyati Kumari Behera},
  title        = {Human Activity Recognition Using Ensemble Neural Networks and The
                  Analysis of Multi-Environment Sensor Data Within Smart Environments},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {218--229},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.016},
  doi          = {10.58346/JOWUA.2023.I3.016},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RMRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RahmatNPAFR23,
  author       = {Abdul Rahmat and
                  Ahmad Arif Nurrahman and
                  Susatyo Adhi Pramono and
                  Dadi Ahmadi and
                  Winci Firdaus and
                  Robbi Rahim},
  title        = {Data Optimization using {PSO} and K-Means Algorithm},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {14--24},
  year         = {2023},
  url          = {https://doi.org/10.58346/jowua.2023.i3.002},
  doi          = {10.58346/JOWUA.2023.I3.002},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RahmatNPAFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RameshJ23,
  author       = {R. Ramesh and
                  M. Jeyakarthic},
  title        = {Fuzzy Support Vector Machine Based Outlier Detection for Financial
                  Credit Score Prediction System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {60--73},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.005},
  doi          = {10.58346/JOWUA.2023.I4.005},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RameshJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RosnellyRS23,
  author       = {Rika Rosnelly and
                  Bob Subhan Riza and
                  S. Suparni},
  title        = {Comparative Analysis of Support Vector Machine and Convolutional Neural
                  Network for Malaria Parasite Classification and Feature Extraction},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {194--217},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.015},
  doi          = {10.58346/JOWUA.2023.I3.015},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RosnellyRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SinhaNM23,
  author       = {Sourav Sinha and
                  Revathi Sathiya Narayanan and
                  Indrajit Mukherjee},
  title        = {A Novel Multi-Layer Sparse Regularizer based {GRU} Model for Consumer
                  Reviews Summarization},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {159--173},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.013},
  doi          = {10.58346/JOWUA.2023.I1.013},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SinhaNM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SolikinD23,
  author       = {Ikin Solikin and
                  Deni Darmawan},
  title        = {Impact of Artificial Intelligence in Improving the Effectiveness of
                  Accounting Information Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {82--93},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.007},
  doi          = {10.58346/JOWUA.2023.I2.007},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SolikinD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SomsukASKS23,
  author       = {Kritsanapong Somsuk and
                  Sarutte Atsawaraungsuk and
                  Chanwit Suwannapong and
                  Suchart Khummanee and
                  Chalida Sanemueang},
  title        = {The Optimal Equations with Chinese Remainder Theorem for RSA's Decryption
                  Process},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {109--120},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.009},
  doi          = {10.58346/JOWUA.2023.I2.009},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SomsukASKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SrinadiHJ23,
  author       = {Ni Luh Putri Srinadi and
                  Dadang Hermawan and
                  Anak Agung Ngurah Adhi Jaya},
  title        = {Advancement of Banking and Financial Services Employing Artificial
                  Intelligence and the Internet of Things},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {106--117},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.009},
  doi          = {10.58346/JOWUA.2023.I1.009},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SrinadiHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SubhashiniR23,
  author       = {S. Subhashini and
                  S. Revathi},
  title        = {A New Fusion Feature Selection Model {(FFSM)} based Feature Extraction
                  System for Hand Gesture Recognition},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {149--163},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.011},
  doi          = {10.58346/JOWUA.2023.I4.011},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SubhashiniR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Suleiman23,
  author       = {Husam Suleiman},
  title        = {{\unicode{119875}}c{\unicode{120576}}{\unicode{120581}}max-Means++:
                  Adapt-{\unicode{119875}} Driven by Energy and Distance Quality Probabilities
                  Based on {\unicode{120581}}-Means++ for the Stable Election Protocol
                  {(SEP)}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {128--148},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.010},
  doi          = {10.58346/JOWUA.2023.I4.010},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Suleiman23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SunartoKMDAR23,
  author       = {Ading Sunarto and
                  Putri Nilam Kencana and
                  Baliyah Munadjat and
                  Iriana Kusuma Dewi and
                  Ali Zaenal Abidin and
                  Robbi Rahim},
  title        = {Application of Boosting Technique with {C4.5} Algorithm to Reduce
                  the Classification Error Rate in Online Shoppers Purchasing Intention},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {1--11},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.001},
  doi          = {10.58346/JOWUA.2023.I2.001},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SunartoKMDAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SuprihartiniTAC23,
  author       = {Yayuk Suprihartini and
                  Taryana and
                  Andiyan and
                  Pandu Adi Cakranegara and
                  Dani Dwiyandana},
  title        = {Utilization of Motion Sensors to Reduce Electricity Consumption in
                  Buildings},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {94--108},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.008},
  doi          = {10.58346/JOWUA.2023.I2.008},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SuprihartiniTAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TelloASMA23,
  author       = {Alcides Bernardo Tello and
                  Sohaib Alam and
                  Archana Ravindra Salve and
                  Kusuma Kumari B. M and
                  Meena Arora},
  title        = {Quantitative Evaluation of Android Application Privacy Security Based
                  on Privacy Policy and Behaviour},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {253--266},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.019},
  doi          = {10.58346/JOWUA.2023.I3.019},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TelloASMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ThiruvalarRPSS23,
  author       = {V. Naren Thiruvalar and
                  Yamini R. and
                  Manimekalai M. A. P. and
                  I Wayan Suryasa and
                  Sugapriya S.},
  title        = {Enhancing User Experiences in Ubiquitous Soft Computing Environments
                  with Fuzzy Agent Middleware},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {25--35},
  year         = {2023},
  url          = {https://doi.org/10.58346/jowua.2023.i3.003},
  doi          = {10.58346/JOWUA.2023.I3.003},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ThiruvalarRPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TranLT23,
  author       = {Vinh Duc Tran and
                  Phi Thuong Le and
                  Viet Cuong Trinh},
  title        = {A Secure Proxy Re-Signature Scheme for IoT},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {174--188},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.014},
  doi          = {10.58346/JOWUA.2023.I1.014},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TranLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/UdayakumarKSE23,
  author       = {R. Udayakumar and
                  Muhammad Abul Kalam and
                  R. Sugumar and
                  R. Elankavi},
  title        = {Assessing Learning Behaviors Using Gaussian Hybrid Fuzzy Clustering
                  {(GHFC)} in Special Education Classrooms},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {1},
  pages        = {118--125},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I1.010},
  doi          = {10.58346/JOWUA.2023.I1.010},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/UdayakumarKSE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/UdayakumarPGVS23,
  author       = {R. Udayakumar and
                  Suvarna Yogesh Pansambal and
                  Yogesh Manohar Gajmal and
                  V. R. Vimal and
                  R. Sugumar},
  title        = {User Activity Analysis Via Network Traffic Using {DNN} and Optimized
                  Federated Learning based Privacy Preserving Method in Mobile Wireless
                  Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {66--81},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.006},
  doi          = {10.58346/JOWUA.2023.I2.006},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/UdayakumarPGVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VargasLAPCPG23,
  author       = {Isabel Menacho Vargas and
                  Carlos Luy{-}Montejo and
                  Lourdes Ivonne del Carmen Alcaide{-}Aranda and
                  Doris Isabel Goicochea Parks and
                  Yoni Magali Maita Cruz and
                  Jessica Paola Palacios{-}Garay and
                  Aracelli del Carmen Gonzales{-}S{\'{a}}nchez},
  title        = {Improved Butterfly Optimization Algorithm for Energy Efficient Antenna
                  Selection Over Wireless Cellular Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {121--136},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.010},
  doi          = {10.58346/JOWUA.2023.I2.010},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VargasLAPCPG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VeerasamyF23,
  author       = {K. Veerasamy and
                  E. J. Thomson Fredrik},
  title        = {Intelligence System towards Identify Weeds in Crops and Vegetables
                  Plantation Using Image Processing and Deep Learning Techniques},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {4},
  pages        = {45--59},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I4.004},
  doi          = {10.58346/JOWUA.2023.I4.004},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VeerasamyF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VladaSRCBHP23,
  author       = {Nikitina Vlada and
                  Ra{\'{u}}l A. S{\'{a}}nchez{-}Ancajima and
                  Miguel {\'{A}}ngel Torres Rubio and
                  Walter Antonio Campos{-}Ugaz and
                  An{\'{\i}}bal Mej{\'{\i}}a Benavides and
                  Mar{\'{\i}}a Del Roc{\'{\i}}o Hende{-}Santolaya and
                  Jacqueline C. Ponce{-}Meza},
  title        = {Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm
                  Optimization-driven Intrusion Detection and Secure Routing Algorithm},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {3},
  pages        = {77--88},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I3.006},
  doi          = {10.58346/JOWUA.2023.I3.006},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VladaSRCBHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WangYQ23,
  author       = {Lixin Wang and
                  Jianhua Yang and
                  Maochang Qin},
  title        = {Analyzing Distribution of Packet Round-Trip Times using Fast Fourier
                  Transformation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {14},
  number       = {2},
  pages        = {137--149},
  year         = {2023},
  url          = {https://doi.org/10.58346/JOWUA.2023.I2.011},
  doi          = {10.58346/JOWUA.2023.I2.011},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WangYQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/00010A22,
  author       = {Gabriele Costa and
                  Enrico Russo and
                  Alessandro Armando},
  title        = {Automating the Generation of Cyber Range Virtual Scenarios with {VSDL}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {61--80},
  year         = {2022},
  url          = {https://doi.org/10.58346/JOWUA.2022.I4.004},
  doi          = {10.58346/JOWUA.2022.I4.004},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/00010A22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/0001M22,
  author       = {J{\"{o}}rg Keller and
                  Ewelina Marciniszyn},
  title        = {Improved Concept and Implementation of a Fountain Code Covert Channel},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {3},
  pages        = {25--36},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.09.30.025},
  doi          = {10.22667/JOWUA.2022.09.30.025},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/0001M22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AyubRSAAS22,
  author       = {Aqsa Ayub and
                  Muhammad Rizwan and
                  Shivanshu Shrivastava and
                  Adeel Anjum and
                  Pelin Angin and
                  Yigit Sever},
  title        = {Securely Offloading Computation to the Edge with the Tangle Cache},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {40--60},
  year         = {2022},
  url          = {https://doi.org/10.58346/JOWUA.2022.I4.003},
  doi          = {10.58346/JOWUA.2022.I4.003},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AyubRSAAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BakhtinaM22,
  author       = {Mariia Bakhtina and
                  Raimundas Matulevicius},
  title        = {Information Security Risks Analysis and Assessment in the Passenger-Autonomous
                  Vehicle Interaction},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {1},
  pages        = {87--111},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.03.31.087},
  doi          = {10.22667/JOWUA.2022.03.31.087},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BakhtinaM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BoualemRA22,
  author       = {Adda Boualem and
                  Cyril De Runz and
                  Marwane Ayaida},
  title        = {Partial Paving Strategy: Application to optimize the Area Coverage
                  Problem in Mobile Wireless Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {2},
  pages        = {1--22},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.06.30.001},
  doi          = {10.22667/JOWUA.2022.06.30.001},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BoualemRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CabraPMA22,
  author       = {Jose{-}Luis Cabra and
                  Carlos Parra and
                  Diego Mendez and
                  Luis Carlos Trujillo Arboleda},
  title        = {Mechanisms of Authentication toward Habitude Pattern Lock and {ECG:}
                  An overview},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {2},
  pages        = {23--67},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.06.30.023},
  doi          = {10.22667/JOWUA.2022.06.30.023},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CabraPMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CassaviaC00Z22,
  author       = {Nunziato Cassavia and
                  Luca Caviglione and
                  Massimo Guarascio and
                  Giuseppe Manco and
                  Marco Zuppelli},
  title        = {Detection of Steganographic Threats Targeting Digital Images in Heterogeneous
                  Ecosystems Through Machine Learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {3},
  pages        = {50--67},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.09.30.050},
  doi          = {10.22667/JOWUA.2022.09.30.050},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CassaviaC00Z22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DayiRNPG22,
  author       = {Arif Kerem Dayi and
                  Volkan Rodoplu and
                  Mert Nakip and
                  Buse Pehlivan and
                  C{\"{u}}neyt G{\"{u}}zelis},
  title        = {Multi-Channel Subset Iteration with Minimal Loss in Available Capacity
                  {(MC-SIMLAC)} Algorithm for Joint Forecasting-Scheduling in the Internet
                  of Things},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {2},
  pages        = {68--95},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.06.30.068},
  doi          = {10.22667/JOWUA.2022.06.30.068},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/DayiRNPG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DoigRUHOFL22,
  author       = {Silvia Georgina Aguinaga Doig and
                  Jessica Natal{\'{\i}} Gallardo Ram{\'{\i}}rez and
                  Osmer Campo Ugaz and
                  Ronald M. Hern{\'{a}}ndez and
                  Janeth Benedicta Falla Ortiz and
                  Lizzeth Aimee Garci Flores and
                  Yen Marvin Bravo Larrea},
  title        = {Educational Scenarios Using Technology: Challenges and Proposals During
                  the Pandemic},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {182--195},
  year         = {2022},
  url          = {https://doi.org/10.58346/jowua.2022.i4.012},
  doi          = {10.58346/JOWUA.2022.I4.012},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/DoigRUHOFL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EmuraKNOO22,
  author       = {Keita Emura and
                  Kaisei Kajita and
                  Ryo Nojima and
                  Kazuto Ogawa and
                  Go Ohtake},
  title        = {Providing Membership Privacy to the Asynchronous Ratcheting Trees
                  Protocol without losing Scalability},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {105--123},
  year         = {2022},
  url          = {https://doi.org/10.58346/JOWUA.2022.I4.007},
  doi          = {10.58346/JOWUA.2022.I4.007},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EmuraKNOO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GiorgiAS22,
  author       = {Giacomo Giorgi and
                  Wisam Abbasi and
                  Andrea Saracino},
  title        = {Privacy-Preserving Analysis for Remote Video Anomaly Detection in
                  Real Life Environments},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {1},
  pages        = {112--136},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.03.31.112},
  doi          = {10.22667/JOWUA.2022.03.31.112},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GiorgiAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GrammatopoulosP22,
  author       = {Athanasios Vasileios Grammatopoulos and
                  Ilias Politis and
                  Christos Xenakis},
  title        = {Blind software-assisted conformance and security assessment of FIDO2/WebAuthn
                  implementations},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {2},
  pages        = {96--127},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.06.30.096},
  doi          = {10.22667/JOWUA.2022.06.30.096},
  timestamp    = {Wed, 03 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GrammatopoulosP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HartmannW22,
  author       = {Laura Hartmann and
                  Steffen Wendzel},
  title        = {Anomaly Detection for Industrial Control Systems Through Totally Integrated
                  Automation Portal Project History},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {3},
  pages        = {4--24},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.09.30.004},
  doi          = {10.22667/JOWUA.2022.09.30.004},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HartmannW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Jung22,
  author       = {Seung Wook Jung},
  title        = {Universal Redactable Blockchain},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {81--93},
  year         = {2022},
  url          = {https://doi.org/10.58346/JOWUA.2022.I4.005},
  doi          = {10.58346/JOWUA.2022.I4.005},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Jung22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiesebergT22,
  author       = {Peter Kieseberg and
                  Simon Tjoa},
  title        = {Guest Editorial: Special Issue on the ARES-Workshops 2021},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {1},
  pages        = {1--3},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.03.31.001},
  doi          = {10.22667/JOWUA.2022.03.31.001},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/KiesebergT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KioskliDFM22,
  author       = {Kitty Kioskli and
                  Daniele Dellagiacoma and
                  Theofanis Fotis and
                  Haralambos Mouratidis},
  title        = {The supply chain of a Living Lab: Modelling security, privacy, and
                  vulnerability issues alongside with their impact and potential mitigation
                  strategies},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {2},
  pages        = {147--182},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.06.30.147},
  doi          = {10.22667/JOWUA.2022.06.30.147},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KioskliDFM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KomisarekPKMKC22,
  author       = {Mikolaj Komisarek and
                  Marek Pawlicki and
                  Mikolaj Kowalski and
                  Adrian Marzecki and
                  Rafal Kozik and
                  Michal Choras},
  title        = {Hunting cyberattacks: experience from the real backbone network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {2},
  pages        = {128--146},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.06.30.128},
  doi          = {10.22667/JOWUA.2022.06.30.128},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/KomisarekPKMKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ManfrediCSR22,
  author       = {Salvatore Manfredi and
                  Mariano Ceccato and
                  Giada Sciarretta and
                  Silvio Ranise},
  title        = {Empirical Validation on the Usability of Security Reports for Patching
                  {TLS} Misconfigurations: User- and Case-Studies on Actionable Mitigations},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {1},
  pages        = {56--86},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.03.31.056},
  doi          = {10.22667/JOWUA.2022.03.31.056},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/ManfrediCSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MegiasKRCM22,
  author       = {David Meg{\'{\i}}as and
                  Minoru Kuribayashi and
                  Andrea Rosales and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  title        = {Architecture of a fake news detection system combining digital watermarking,
                  signal processing, and machine learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {1},
  pages        = {33--55},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.03.31.033},
  doi          = {10.22667/JOWUA.2022.03.31.033},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MegiasKRCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MihelicVBDFHOPV22,
  author       = {Anze Mihelic and
                  Simon Vrhovec and
                  Igor Bernik and
                  Andrej Domej and
                  Damjan Fujs and
                  Tomaz Hovelja and
                  Sanja Kerznar Osolnik and
                  Patrik Pucer and
                  Damjan Vavpotic and
                  Bostjan Zvanut and
                  Kaja Prislan},
  title        = {Use of smart devices by the elderly: Nursing home residents in Slovenia},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {3},
  pages        = {68--80},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.09.30.068},
  doi          = {10.22667/JOWUA.2022.09.30.068},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MihelicVBDFHOPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MilevaT22,
  author       = {Aleksandra Mileva and
                  Jordan Tikvesanski},
  title        = {Hiding Data in a Switched Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {3},
  pages        = {37--49},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.09.30.037},
  doi          = {10.22667/JOWUA.2022.09.30.037},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MilevaT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MuthuswamyRR22,
  author       = {Prema Muthuswamy and
                  V. Raju and
                  M. Ramya},
  title        = {Natural Language Processing for Data Science Workforce Analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {225--232},
  year         = {2022},
  url          = {https://doi.org/10.58346/jowua.2022.i4.015},
  doi          = {10.58346/JOWUA.2022.I4.015},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MuthuswamyRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ParkJ22,
  author       = {Jungsoo Park and
                  Souhwan Jung},
  title        = {Android Adware Detection using Soot and {CFG}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {94--104},
  year         = {2022},
  url          = {https://doi.org/10.58346/JOWUA.2022.I4.006},
  doi          = {10.58346/JOWUA.2022.I4.006},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ParkJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PuysTMGS22,
  author       = {Maxime Puys and
                  Pierre{-}Henri Thevenon and
                  St{\'{e}}phane Mocanu and
                  Mathieu Gallissot and
                  Camille Sivelle},
  title        = {{SCADA} Cybersecurity Awareness and Teaching with Hardware-In-The-Loop
                  Platforms},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {1},
  pages        = {4--32},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.03.31.004},
  doi          = {10.22667/JOWUA.2022.03.31.004},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/PuysTMGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RatnadewiHPP22,
  author       = {R. Ratnadewi and
                  Aan Darmawan Hangkawidjaja and
                  Agus Prijono and
                  Ariesa Pandanwang},
  title        = {Design of Robot Plotter Software for Making Pattern with Turtle Graphics
                  Algorithm},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {137--154},
  year         = {2022},
  url          = {https://doi.org/10.58346/jowua.2022.i4.009},
  doi          = {10.58346/JOWUA.2022.I4.009},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RatnadewiHPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RosnellyRWHP22,
  author       = {Rika Rosnelly and
                  Bob Subhan Riza and
                  Linda Wahyuni and
                  S. Edy Victor Haryanto and
                  Annas Prasetio},
  title        = {Vehicle Detection Using Machine Learning Model with the Gaussian Mixture
                  Model {(GMM)}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {233--243},
  year         = {2022},
  url          = {https://doi.org/10.58346/jowua.2022.i4.016},
  doi          = {10.58346/JOWUA.2022.I4.016},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RosnellyRWHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SchmidbauerW22,
  author       = {Tobias Schmidbauer and
                  Steffen Wendzel},
  title        = {Detection Of Computational Intensive Reversible Covert Channels Based
                  On Packet Runtime},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {1},
  pages        = {137--166},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.03.31.137},
  doi          = {10.22667/JOWUA.2022.03.31.137},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SchmidbauerW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShadadiA22,
  author       = {Ebtesam Shadadi and
                  Latifah Alamer},
  title        = {Hierarchical Parallel Processing for Data Clustering in {GPU} Using
                  Deep Nearest Neighbor Searching},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {155--168},
  year         = {2022},
  url          = {https://doi.org/10.58346/jowua.2022.i4.010},
  doi          = {10.58346/JOWUA.2022.I4.010},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShadadiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SinghRYAK022,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  Ilsun You and
                  Amalan Joseph Antony and
                  S. K. Karthika and
                  Jiyoon Kim},
  title        = {Efficient Lattice based {(H)IB-DRE}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {1--23},
  year         = {2022},
  url          = {https://doi.org/10.58346/JOWUA.2022.I4.001},
  doi          = {10.58346/JOWUA.2022.I4.001},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SinghRYAK022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SudipaAY22,
  author       = {I Gede Iwan Sudipa and
                  Putu Wirayudi Aditama and
                  Christina Purnama Yanti},
  title        = {Developing Augmented Reality Lontar Prasi Bali as an E-learning Material
                  to Preserve Balinese Culture},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {169--181},
  year         = {2022},
  url          = {https://doi.org/10.58346/jowua.2022.i4.011},
  doi          = {10.58346/JOWUA.2022.I4.011},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SudipaAY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/UnisaG22,
  author       = {Syeda Ayesha Unisa and
                  K. S. Jagadeesh Gowda},
  title        = {Estimating {CSI} for Future Generation {MIMO} Networks Using Deep
                  Learning Techniques and its Applicability to Varied Environments},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {124--136},
  year         = {2022},
  url          = {https://doi.org/10.58346/jowua.2022.i4.008},
  doi          = {10.58346/JOWUA.2022.I4.008},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/UnisaG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/UtomoL22,
  author       = {Fajar Cahyo Utomo and
                  Tatag Herbayu Latukismo},
  title        = {Trends and Patterns in Workforce Agility Literature: {A} Scopus-based
                  Bibliometric Analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {211--224},
  year         = {2022},
  url          = {https://doi.org/10.58346/jowua.2022.i4.014},
  doi          = {10.58346/JOWUA.2022.I4.014},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/UtomoL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VrhovecGJ22,
  author       = {Simon Vrhovec and
                  B{\'{e}}la Genge and
                  Martin Gilje Jaatun},
  title        = {Guest Editorial: Special Issue on Interdisciplinary Cybersecurity},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {3},
  pages        = {1--3},
  year         = {2022},
  url          = {https://doi.org/10.22667/JOWUA.2022.09.30.001},
  doi          = {10.22667/JOWUA.2022.09.30.001},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VrhovecGJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YangWLW22,
  author       = {Jianhua Yang and
                  Lixin Wang and
                  Austin Lee and
                  Peng{-}Jun Wan},
  title        = {Stepping-Stone Intrusion Detection via Estimating Numbers of Upstream
                  and Downstream Connections using Packet Crossover},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {24--39},
  year         = {2022},
  url          = {https://doi.org/10.58346/JOWUA.2022.I4.002},
  doi          = {10.58346/JOWUA.2022.I4.002},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YangWLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YudistiraAS22,
  author       = {Bagus Gede Krishna Yudistira and
                  Radityo Anggoro and
                  Ary Mazharuddin Shiddiqi},
  title        = {Addition of Neighbors in the Number of Vanets Node Factors: {DSR-PNT}
                  Performance Study},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {13},
  number       = {4},
  pages        = {196--210},
  year         = {2022},
  url          = {https://doi.org/10.58346/jowua.2022.i4.013},
  doi          = {10.58346/JOWUA.2022.I4.013},
  timestamp    = {Fri, 26 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YudistiraAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AgrafiotisK21,
  author       = {Ioannis Agrafiotis and
                  G{\"{o}}khan Kul},
  title        = {Guest Editorial: Special Issue on Advances in Insider Threat Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {2},
  pages        = {1--2},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.06.30.001},
  doi          = {10.22667/JOWUA.2021.06.30.001},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AgrafiotisK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BorchertH21,
  author       = {Angela Borchert and
                  Maritta Heisel},
  title        = {Conflict Identification and Resolution for Trust-Related Requirements
                  Elicitation {A} Goal Modeling Approach},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {1},
  pages        = {111--131},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.03.31.111},
  doi          = {10.22667/JOWUA.2021.03.31.111},
  timestamp    = {Mon, 17 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BorchertH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BoucheAK21,
  author       = {Johannes Bouch{\'{e}} and
                  Lukas Atkinson and
                  Martin Kappes},
  title        = {ShadowHeap: Memory Safety through Efficient Heap Metadata Validation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {4},
  pages        = {4--21},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.12.31.004},
  doi          = {10.22667/JOWUA.2021.12.31.004},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/BoucheAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CasolareDIMMS21,
  author       = {Rosangela Casolare and
                  Carlo De Dominicis and
                  Giacomo Iadarola and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  title        = {Dynamic Mobile Malware Detection through System Call-based Image representation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {1},
  pages        = {44--63},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.03.31.044},
  doi          = {10.22667/JOWUA.2021.03.31.044},
  timestamp    = {Mon, 17 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CasolareDIMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CaviglioneWMV21,
  author       = {Luca Caviglione and
                  Steffen Wendzel and
                  Aleksandra Mileva and
                  Simon Vrhovec},
  title        = {Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity
                  Challenges},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {4},
  pages        = {1--3},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.12.31.001},
  doi          = {10.22667/JOWUA.2021.12.31.001},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/CaviglioneWMV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChowSBKZ21,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim and
                  Wei Zong},
  title        = {Exploiting {QR} Code Error Correction for Digital Image Watermarking},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {2},
  pages        = {114--140},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.06.30.114},
  doi          = {10.22667/JOWUA.2021.06.30.114},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChowSBKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DominguesNFF21,
  author       = {Patr{\'{\i}}cio Domingues and
                  Ruben Nogueira and
                  Jos{\'{e}} Carlos Francisco and
                  Miguel Frade},
  title        = {Analyzing TikTok from a Digital Forensics Perspective},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {3},
  pages        = {87--115},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.09.30.087},
  doi          = {10.22667/JOWUA.2021.09.30.087},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/DominguesNFF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FerreiraGIF21,
  author       = {Andr{\'{e}} Prata Ferreira and
                  Chetna Gupta and
                  Pedro R. M. In{\'{a}}cio and
                  M{\'{a}}rio M. Freire},
  title        = {Behaviour-based Malware Detection in Mobile AndroidPlatforms Using
                  Machine Learning Algorithms},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {4},
  pages        = {62--88},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.12.31.062},
  doi          = {10.22667/JOWUA.2021.12.31.062},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/FerreiraGIF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GreitzerPSYL21,
  author       = {Frank L. Greitzer and
                  Justin Purl and
                  Paul J. Sticha and
                  Martin C. Yu and
                  James D. Lee},
  title        = {Use of Expert Judgments to Inform Bayesian Models of Insider Threat
                  Risk},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {2},
  pages        = {3--47},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.06.30.003},
  doi          = {10.22667/JOWUA.2021.06.30.003},
  timestamp    = {Fri, 30 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GreitzerPSYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HeinzZC21,
  author       = {Corinna Heinz and
                  Marco Zuppelli and
                  Luca Caviglione},
  title        = {Covert Channels in Transport Layer Security: Performance and Security
                  Assessment},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {4},
  pages        = {22--36},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.12.31.022},
  doi          = {10.22667/JOWUA.2021.12.31.022},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HeinzZC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiesebergT21,
  author       = {Peter Kieseberg and
                  Simon Tjoa},
  title        = {Guest Editorial: Special Issue on the ARES-Workshops 2020},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {1},
  pages        = {1--2},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.03.31.001},
  doi          = {10.22667/JOWUA.2021.03.31.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KiesebergT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KolomeetsCK21,
  author       = {Maxim Kolomeets and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Bot detection by friends graph in social networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {2},
  pages        = {141--159},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.06.30.141},
  doi          = {10.22667/JOWUA.2021.06.30.141},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KolomeetsCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KomisarekPKC21,
  author       = {Mikolaj Komisarek and
                  Marek Pawlicki and
                  Rafal Kozik and
                  Michal Choras},
  title        = {Machine Learning Based Approach to Anomaly and Cyberattack Detection
                  in Streamed Network Traffic Data},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {1},
  pages        = {3--19},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.03.31.003},
  doi          = {10.22667/JOWUA.2021.03.31.003},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/KomisarekPKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KumarDWR21,
  author       = {Arun Kumar and
                  Sanjay K. Dhurandher and
                  Isaac Woungang and
                  Joel J. P. C. Rodrigues},
  title        = {Securing Opportunistic Networks: An Encounter-based Trust-driven Barter
                  Mechanism},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {2},
  pages        = {99--113},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.06.30.099},
  doi          = {10.22667/JOWUA.2021.06.30.099},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KumarDWR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LacavaMMSMGV21,
  author       = {Giovanni Lacava and
                  Angelica Marotta and
                  Fabio Martinelli and
                  Andrea Saracino and
                  Antonio La Marra and
                  Endika Gil{-}Uriarte and
                  Victor Mayoral Vilches},
  title        = {Cybsersecurity Issues in Robotics},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {3},
  pages        = {1--28},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.09.30.001},
  doi          = {10.22667/JOWUA.2021.09.30.001},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/LacavaMMSMGV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeitnerFLLSSAHK21,
  author       = {Maria Leitner and
                  Maximilian Frank and
                  Gregor Langner and
                  Max Landauer and
                  Florian Skopik and
                  Paul Smith and
                  Benjamin Akhras and
                  Wolfgang Hotwagner and
                  Stela Kucek and
                  Timea Pahi and
                  Lenhard Reuter and
                  Manuel Warum},
  title        = {Enabling exercises, education and research with a comprehensive cyber
                  range},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {4},
  pages        = {37--61},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.12.31.037},
  doi          = {10.22667/JOWUA.2021.12.31.037},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeitnerFLLSSAHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NowakowskiZCM21,
  author       = {Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski and
                  Krzysztof Cabaj and
                  Wojciech Mazurczyk},
  title        = {Detecting Network Covert Channels using Machine Learning, Data Mining
                  and Hierarchical Organisation of Frequent Sets},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {1},
  pages        = {20--43},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.03.31.020},
  doi          = {10.22667/JOWUA.2021.03.31.020},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NowakowskiZCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PaganoVM21,
  author       = {Francesco Pagano and
                  Luca Verderame and
                  Alessio Merlo},
  title        = {Understanding Fuchsia Security},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {3},
  pages        = {47--64},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.09.30.047},
  doi          = {10.22667/JOWUA.2021.09.30.047},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PaganoVM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PohnH21,
  author       = {Daniela P{\"{o}}hn and
                  Wolfgang Hommel},
  title        = {Universal Identity and Access Management Framework for Future Ecosystems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {1},
  pages        = {64--84},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.03.31.064},
  doi          = {10.22667/JOWUA.2021.03.31.064},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PohnH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RibaltaLSL21,
  author       = {Claudia Negri{-}Ribalta and
                  Marius Lombard{-}Platet and
                  Camille Salinesi and
                  Pascal Lafourcade},
  title        = {Blockchain Mirage or Silver Bullet? {A} Requirements-driven Comparative
                  Analysis of Business and Developers' Perceptions in the Accountancy
                  Domain},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {1},
  pages        = {85--110},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.03.31.085},
  doi          = {10.22667/JOWUA.2021.03.31.085},
  timestamp    = {Thu, 05 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/RibaltaLSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SoelistijantoM21,
  author       = {Bambang Soelistijanto and
                  Geraldev Manoah},
  title        = {Network Size Estimation in Opportunistic Mobile Networks: The Mark-Recapture
                  Method},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {3},
  pages        = {29--46},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.09.30.029},
  doi          = {10.22667/JOWUA.2021.09.30.029},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SoelistijantoM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SuleimanH21,
  author       = {Husam Suleiman and
                  Mohammad Hamdan},
  title        = {Adaptive Probabilistic Model for Energy-Efficient Distance-based Clustering
                  in WSNs (Adapt-P): {A} LEACH-based Analytical Study},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {3},
  pages        = {65--86},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.09.30.065},
  doi          = {10.22667/JOWUA.2021.09.30.065},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SuleimanH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SundararajK21,
  author       = {Akash Sundararaj and
                  G{\"{o}}khan Kul},
  title        = {Impact Analysis of Training Data Characteristics for Phishing Email
                  Classification},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {2},
  pages        = {85--98},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.06.30.085},
  doi          = {10.22667/JOWUA.2021.06.30.085},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SundararajK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WallsA21,
  author       = {Alexander Walls and
                  Ioannis Agrafiotis},
  title        = {A Bayesian approach to insider threat detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {2},
  pages        = {48--84},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.06.30.048},
  doi          = {10.22667/JOWUA.2021.06.30.048},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WallsA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ZuppelliCR21,
  author       = {Marco Zuppelli and
                  Alessandro Carrega and
                  Matteo Repetto},
  title        = {An Effective and Efficient Approach to Improve Visibility Over Network
                  Communications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {12},
  number       = {4},
  pages        = {89--108},
  year         = {2021},
  url          = {https://doi.org/10.22667/JOWUA.2021.12.31.089},
  doi          = {10.22667/JOWUA.2021.12.31.089},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/ZuppelliCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AbhishtaHJNJ20,
  author       = {Abhishta Abhishta and
                  Wouter van Heeswijk and
                  Marianne Junger and
                  Lambert J. M. Nieuwenhuis and
                  Reinoud Joosten},
  title        = {Why would we get attacked? An analysis of attacker's aims behind DDoS
                  attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {3--22},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.003},
  doi          = {10.22667/JOWUA.2020.06.30.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AbhishtaHJNJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AnginAGGB20,
  author       = {Pelin Angin and
                  Mohammad Hossein Anisi and
                  Furkan G{\"{o}}ksel and
                  Ceren G{\"{u}}rsoy and
                  Asaf B{\"{u}}y{\"{u}}kg{\"{u}}lc{\"{u}}},
  title        = {AgriLoRa: {A} Digital Twin Framework for Smart Agriculture},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {4},
  pages        = {77--96},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.12.31.077},
  doi          = {10.22667/JOWUA.2020.12.31.077},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AnginAGGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BaranovSSZ20,
  author       = {Oleg V. Baranov and
                  Nikolay V. Smirnov and
                  Tatyana E. Smirnova and
                  Yefim V. Zholobov},
  title        = {Design of a quadrocopter with PID-controlled fail-safe algorithm},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {23--33},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.023},
  doi          = {10.22667/JOWUA.2020.06.30.023},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BaranovSSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BembenikF20,
  author       = {Robert Bembenik and
                  Krzysztof Falcman},
  title        = {{BLE} Indoor Positioning System Using RSSI-based Trilateration},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {3},
  pages        = {50--69},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.09.30.050},
  doi          = {10.22667/JOWUA.2020.09.30.050},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BembenikF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BerbecaruLC20,
  author       = {Diana Berbecaru and
                  Antonio Lioy and
                  Cesare Cameroni},
  title        = {Supporting Authorize-then-Authenticate for Wi-Fi access based on an
                  electronic identity infrastructure},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {34--54},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.034},
  doi          = {10.22667/JOWUA.2020.06.30.034},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BerbecaruLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CaputoVRMC20,
  author       = {Davide Caputo and
                  Luca Verderame and
                  Andrea Ranieri and
                  Alessio Merlo and
                  Luca Caviglione},
  title        = {Fine-hearing Google Home: why silence will not protect your privacy},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {1},
  pages        = {35--53},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.03.31.035},
  doi          = {10.22667/JOWUA.2020.03.31.035},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CaputoVRMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DuongST20,
  author       = {Dung Hoang Duong and
                  Willy Susilo and
                  Viet Cuong Trinh},
  title        = {Wildcarded Identity-Based Encryption with Constant-size Ciphertext
                  and Secret Key},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {74--86},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.074},
  doi          = {10.22667/JOWUA.2020.06.30.074},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/DuongST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JamilHIA20,
  author       = {Mohammad Newaj Jamil and
                  Mohammad Shahadat Hossain and
                  Raihan Ul Islam and
                  Karl Andersson},
  title        = {Technological Innovation Capability Evaluation of High-Tech Firms
                  Using Conjunctive and Disjunctive Belief Rule-Based Expert System:
                  {A} Comparative Study},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {3},
  pages        = {29--49},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.09.30.029},
  doi          = {10.22667/JOWUA.2020.09.30.029},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/JamilHIA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JasimOMA20,
  author       = {Al{-}Hussein Hameed Jasim and
                  Niclas {\"{O}}gren and
                  Dimitar Minovski and
                  Karl Andersson},
  title        = {Packet Probing Study to Assess Sustainability in Available Bandwidth
                  Measurements: Case of High-Speed Cellular Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {106--125},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.106},
  doi          = {10.22667/JOWUA.2020.06.30.106},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/JasimOMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JohnsonKBD20,
  author       = {Clayton Johnson and
                  Bishal Khadka and
                  Ram B. Basnet and
                  Tenzin Doleck},
  title        = {Towards Detecting and Classifying Malicious URLs Using Deep Learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {4},
  pages        = {31--48},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.12.31.031},
  doi          = {10.22667/JOWUA.2020.12.31.031},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/JohnsonKBD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KasturiJS20,
  author       = {G. S. Kasturi and
                  Ansh Jain and
                  Jagdeep Singh},
  title        = {Detection and Classification of Radio Frequency Jamming Attacks using
                  Machine learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {4},
  pages        = {49--62},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.12.31.049},
  doi          = {10.22667/JOWUA.2020.12.31.049},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/KasturiJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KhamaysehMAM20,
  author       = {Yaser M. Khamayseh and
                  Wail Mardini and
                  Monther Aldwairi and
                  Hussein T. Mouftah},
  title        = {On the Optimality of Route Selection in Grid Wireless Sensor Networks:
                  Theory and Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {87--105},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.087},
  doi          = {10.22667/JOWUA.2020.06.30.087},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KhamaysehMAM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KhedrRA20,
  author       = {Ahmed M. Khedr and
                  P. V. Pravija Raj and
                  Amal Al Ali},
  title        = {An Energy-Efficient Data Acquisition Technique for Hierarchical Cluster-Based
                  Wireless Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {3},
  pages        = {70--86},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.09.30.070},
  doi          = {10.22667/JOWUA.2020.09.30.070},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KhedrRA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KholodSG20,
  author       = {Ivan Kholod and
                  Andrey Shorov and
                  Sergei Gorlatch},
  title        = {Efficient Distribution and Processing of Data for Parallelizing Data
                  Mining in Mobile Clouds},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {1},
  pages        = {2--17},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.03.31.002},
  doi          = {10.22667/JOWUA.2020.03.31.002},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KholodSG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kotenko20,
  author       = {Igor V. Kotenko},
  title        = {Guest Editorial: Intelligent Distributed Computing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {1--2},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.001},
  doi          = {10.22667/JOWUA.2020.06.30.001},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kotenko20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LaouamerEZM20,
  author       = {Lamri Laouamer and
                  Jalel Euchi and
                  Salah Zidi and
                  Alaeddine Mihoub},
  title        = {Image-to-Tree to Select Significant Blocks for Image Watermarking},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {1},
  pages        = {81--115},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.03.31.081},
  doi          = {10.22667/JOWUA.2020.03.31.081},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LaouamerEZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LiuYZS20,
  author       = {Naiwei Liu and
                  Meng Yu and
                  Wanyu Zang and
                  Ravi S. Sandhu},
  title        = {Cost and Effectiveness of TrustZone Defense and Side-Channel Attack
                  on {ARM} Platform},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {4},
  pages        = {1--15},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.12.31.001},
  doi          = {10.22667/JOWUA.2020.12.31.001},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/LiuYZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LohHTK20,
  author       = {Jia{-}Ch'ng Loh and
                  Swee{-}Huay Heng and
                  Syh{-}Yuan Tan and
                  Kaoru Kurosawa},
  title        = {On the Invisibility and Anonymity of Undeniable Signature Schemes},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {1},
  pages        = {18--34},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.03.31.018},
  doi          = {10.22667/JOWUA.2020.03.31.018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LohHTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MarraMMSS20,
  author       = {Antonio La Marra and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Andrea Saracino and
                  Mina Sheikhalishahi},
  title        = {{D-BRIDEMAID:} {A} Distributed Framework for Collaborative and Dynamic
                  Analysis of Android Malware},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {3},
  pages        = {1--28},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.09.30.001},
  doi          = {10.22667/JOWUA.2020.09.30.001},
  timestamp    = {Thu, 05 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/MarraMMSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NowaczewskiM20,
  author       = {Slawomir Nowaczewski and
                  Wojciech Mazurczyk},
  title        = {Securing Future Internet and 5G using Customer Edge Switching using
                  DNSCrypt and {DNSSEC}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {3},
  pages        = {87--106},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.09.30.087},
  doi          = {10.22667/JOWUA.2020.09.30.087},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NowaczewskiM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ParkKK20,
  author       = {Myungseo Park and
                  Soram Kim and
                  Jongsung Kim},
  title        = {Research on Note-Taking Apps with Security Features},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {4},
  pages        = {63--76},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.12.31.063},
  doi          = {10.22667/JOWUA.2020.12.31.063},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/ParkKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RealinhoRD20,
  author       = {Valentim Realinho and
                  Teresa Rom{\~{a}}o and
                  A. Eduardo Dias},
  title        = {A Language for the End-user Development of Mobile Context-Aware Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {1},
  pages        = {54--80},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.03.31.054},
  doi          = {10.22667/JOWUA.2020.03.31.054},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RealinhoRD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SchachtK20,
  author       = {Birger Schacht and
                  Peter Kieseberg},
  title        = {An Analysis of 5 Million OpenPGP Keys},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {3},
  pages        = {107--140},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.09.30.107},
  doi          = {10.22667/JOWUA.2020.09.30.107},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SchachtK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShichkinaKIS20,
  author       = {Yulia A. Shichkina and
                  Galina V. Kataeva and
                  Yulia A. Irishina and
                  Elizaveta S. Stanevich},
  title        = {The use of mobile phones to monitor the status of patients with Parkinson's
                  disease},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {2},
  pages        = {55--73},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.06.30.055},
  doi          = {10.22667/JOWUA.2020.06.30.055},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShichkinaKIS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WongY20,
  author       = {Shing Ki Wong and
                  Siu{-}Ming Yiu},
  title        = {Location spoofing attack detection with pre-installed sensors in mobile
                  devices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {4},
  pages        = {16--30},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.12.31.016},
  doi          = {10.22667/JOWUA.2020.12.31.016},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/WongY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/You20,
  author       = {Ilsun You},
  title        = {2020 Letter from the Editor-in-Chief},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {1},
  pages        = {1},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.03.31.001},
  doi          = {10.22667/JOWUA.2020.03.31.001},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/You20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AlmathamiAVW19,
  author       = {Hassan Khader Almathami and
                  Majed A. Alrafiee and
                  Elena Vlahu{-}Gjorgievska and
                  Khin Than Win},
  title        = {An Analytical Approach to Using and Implementing Beacons: Opportunities
                  and Challenges},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {58--74},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.058},
  doi          = {10.22667/JOWUA.2019.03.31.058},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AlmathamiAVW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BaekSK19,
  author       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Guest Editorial: Security and Privacy for Contemporary Network Computing
                  Environment},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {1--3},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.001},
  doi          = {10.22667/JOWUA.2019.03.31.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BaekSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChoiV19,
  author       = {Gwangbae Choi and
                  Serge Vaudenay},
  title        = {Timed-Release Encryption With Master Time Bound Key (Extended)},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {88--108},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.088},
  doi          = {10.22667/JOWUA.2019.12.31.088},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChoiV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EslamiNB19,
  author       = {Ziba Eslami and
                  Mahnaz Noroozi and
                  Joonsang Baek},
  title        = {On the Security of a Privacy-Preserving Ranked Multi-Keyword Search
                  Scheme},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {75--85},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.075},
  doi          = {10.22667/JOWUA.2019.03.31.075},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EslamiNB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FiorinoCF19,
  author       = {Davide Fiorino and
                  Mario Collotta and
                  Renato Ferrero},
  title        = {Usability evaluation of touch gestures for Mobile Augmented Reality
                  applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {2},
  pages        = {22--36},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.06.30.022},
  doi          = {10.22667/JOWUA.2019.06.30.022},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FiorinoCF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FungRM19,
  author       = {Carol J. Fung and
                  Bahman Rashidi and
                  Vivian Genaro Motti},
  title        = {Multi-View Permission Risk Notification for Smartphone System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {42--57},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.042},
  doi          = {10.22667/JOWUA.2019.03.31.042},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FungRM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GilibertoA019,
  author       = {Mario Giliberto and
                  Fabio Arena and
                  Giovanni Pau},
  title        = {A fuzzy-based Solution for Optimized Management of Energy Consumption
                  in e-bikes},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {3},
  pages        = {45--64},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.09.30.045},
  doi          = {10.22667/JOWUA.2019.09.30.045},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GilibertoA019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HelslootTE19,
  author       = {Leon J. Helsloot and
                  Gamze Tillem and
                  Zekeriya Erkin},
  title        = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied
                  Secret Sharing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {23--41},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.023},
  doi          = {10.22667/JOWUA.2019.03.31.023},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HelslootTE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HossainSNA19,
  author       = {Mohammad Shahadat Hossain and
                  Zinnia Sultana and
                  Lutfun Nahar and
                  Karl Andersson},
  title        = {An Intelligent System to Diagnose Chikungunya under Uncertainty},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {2},
  pages        = {37--54},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.06.30.037},
  doi          = {10.22667/JOWUA.2019.06.30.037},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HossainSNA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KimORLKL19,
  author       = {Aram Kim and
                  Junhyoung Oh and
                  Jinho Ryu and
                  Jemin Lee and
                  Kookheui Kwon and
                  Kyungho Lee},
  title        = {SoK: {A} Systematic Review of Insider Threat Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {46--67},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.046},
  doi          = {10.22667/JOWUA.2019.12.31.046},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KimORLKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KolomeetsBBCSK19,
  author       = {Maxim Kolomeets and
                  Amira Benachour and
                  Didier El Baz and
                  Andrey Chechulin and
                  Martin Strecker and
                  Igor V. Kotenko},
  title        = {Reference architecture for social networks graph analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {109--125},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.109},
  doi          = {10.22667/JOWUA.2019.12.31.109},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KolomeetsBBCSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KolomeetsCK19,
  author       = {Maxim Kolomeets and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Social networks analysis by graph algorithms on the example of the
                  VKontakte social network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {2},
  pages        = {55--75},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.06.30.055},
  doi          = {10.22667/JOWUA.2019.06.30.055},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KolomeetsCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KorzhukGMS19,
  author       = {Viktoriia Korzhuk and
                  Anton Groznykh and
                  Alexander Menshikov and
                  Martin Strecker},
  title        = {Identification of Attacks against Wireless Sensor Networks Based on
                  Behaviour Analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {2},
  pages        = {1--21},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.06.30.001},
  doi          = {10.22667/JOWUA.2019.06.30.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KorzhukGMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LiuKKTL19,
  author       = {Jui{-}Chun Liu and
                  Yi{-}Quan Ke and
                  Yi{-}Chih Kao and
                  Shi{-}Chun Tsai and
                  Yi{-}Bing Lin},
  title        = {A Dual-Stack Authentication Mechanism Through {SNMP}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {31--45},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.031},
  doi          = {10.22667/JOWUA.2019.12.31.031},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LiuKKTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MavusA19,
  author       = {Zeynep Mavus and
                  Pelin Angin},
  title        = {A Secure Model For Efficient Live Migration of Containers},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {3},
  pages        = {21--44},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.09.30.021},
  doi          = {10.22667/JOWUA.2019.09.30.021},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MavusA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ParkYCPH19,
  author       = {Minjae Park and
                  Geunha You and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han},
  title        = {A Framework for Identifying Obfuscation Techniques applied to Android
                  Apps using Machine Learning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {22--30},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.022},
  doi          = {10.22667/JOWUA.2019.12.31.022},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ParkYCPH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShihHK19,
  author       = {Chi{-}Sheng Shih and
                  Wei{-}Yu Hsieh and
                  Chia{-}Lung Kao},
  title        = {Traceability for Vehicular Network Real-Time Messaging Based on Blockchain
                  Technology},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {1--21},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.001},
  doi          = {10.22667/JOWUA.2019.12.31.001},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShihHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Thorncharoensri19,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Joonsang Baek},
  title        = {Efficient Controlled Signature for a Large Network with Multi Security-level
                  Setting},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {3},
  pages        = {1--20},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.09.30.001},
  doi          = {10.22667/JOWUA.2019.09.30.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Thorncharoensri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WangSBKK19,
  author       = {Yang Wang and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim and
                  Intae Kim},
  title        = {Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {4},
  pages        = {68--87},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.12.31.068},
  doi          = {10.22667/JOWUA.2019.12.31.068},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WangSBKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WongY19,
  author       = {Shing Ki Wong and
                  Siu{-}Ming Yiu},
  title        = {Detection on auto clickers in mobile games},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {3},
  pages        = {65--80},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.09.30.065},
  doi          = {10.22667/JOWUA.2019.09.30.065},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WongY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Yang019,
  author       = {Zheng Yang and
                  Kimmo J{\"{a}}rvinen},
  title        = {Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization
                  and its Application},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {10},
  number       = {1},
  pages        = {4--22},
  year         = {2019},
  url          = {https://doi.org/10.22667/JOWUA.2019.03.31.004},
  doi          = {10.22667/JOWUA.2019.03.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Yang019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AtapourAC18,
  author       = {Cheyenne Atapour and
                  Ioannis Agrafiotis and
                  Sadie Creese},
  title        = {Modeling Advanced Persistent Threats to enhance anomaly detection
                  techniques},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {4},
  pages        = {71--102},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.12.31.071},
  doi          = {10.22667/JOWUA.2018.12.31.071},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AtapourAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BuhovRS18,
  author       = {Damjan Buhov and
                  Julian Rauchberger and
                  Sebastian Schrittwieser},
  title        = {{FLASH:} Is the 20th Century Hero Really Gone? Large-Scale Evaluation
                  on Flash Usage {\&} Its Security and Privacy Implications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {4},
  pages        = {26--40},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.12.31.026},
  doi          = {10.22667/JOWUA.2018.12.31.026},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BuhovRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChoLHKPH18,
  author       = {Seong{-}je Cho and
                  Kyeonghwan Lim and
                  Jungkyu Han and
                  Byoung{-}chir Kim and
                  Minkyu Park and
                  Sangchul Han},
  title        = {Open-Source Android App Detection considering the Effects of Code
                  Obfuscation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {3},
  pages        = {50--61},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.09.30.050},
  doi          = {10.22667/JOWUA.2018.09.30.050},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChoLHKPH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChoudharyKS18,
  author       = {Gaurav Choudhary and
                  Jiyoon Kim and
                  Vishal Sharma},
  title        = {Security of 5G-Mobile Backhaul Networks: {A} Survey},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {4},
  pages        = {41--70},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.12.31.041},
  doi          = {10.22667/JOWUA.2018.12.31.041},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChoudharyKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DruckerG18,
  author       = {Nir Drucker and
                  Shay Gueron},
  title        = {Achieving trustworthy Homomorphic Encryption by combining it with
                  a Trusted Execution Environment},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {1},
  pages        = {86--99},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.03.31.086},
  doi          = {10.22667/JOWUA.2018.03.31.086},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/DruckerG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GrittiOMSP18,
  author       = {Cl{\'{e}}mentine Gritti and
                  Melek {\"{O}}nen and
                  Refik Molva and
                  Willy Susilo and
                  Thomas Plantard},
  title        = {Device Identification and Personal Data Attestation in Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {4},
  pages        = {1--25},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.12.31.001},
  doi          = {10.22667/JOWUA.2018.12.31.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GrittiOMSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HarilalTHCGMO18,
  author       = {Athul Harilal and
                  Flavio Toffalini and
                  Ivan Homoliak and
                  John Henry Castellanos and
                  Juan Guarnizo and
                  Soumik Mondal and
                  Mart{\'{\i}}n Ochoa},
  title        = {The Wolf Of {SUTD} {(TWOS):} {A} Dataset of Malicious Insider Threat
                  Behavior Based on a Gamified Competition},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {1},
  pages        = {54--85},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.03.31.054},
  doi          = {10.22667/JOWUA.2018.03.31.054},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/HarilalTHCGMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HartlAZ18,
  author       = {Alexander Hartl and
                  Robert Annessi and
                  Tanja Zseby},
  title        = {Subliminal Channels in High-Speed Signatures},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {1},
  pages        = {30--53},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.03.31.030},
  doi          = {10.22667/JOWUA.2018.03.31.030},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HartlAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HossainHGA18,
  author       = {Mohammad Shahadat Hossain and
                  Abdullah Al Hasan and
                  Sunanda Guha and
                  Karl Andersson},
  title        = {A Belief Rule Based Expert System to Predict Earthquake under Uncertainty},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {2},
  pages        = {26--41},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.06.30.026},
  doi          = {10.22667/JOWUA.2018.06.30.026},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HossainHGA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kotenko18,
  author       = {Igor V. Kotenko},
  title        = {Guest Editorial: Managing Insider Security Threats},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {1},
  pages        = {1--3},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.03.31.001},
  doi          = {10.22667/JOWUA.2018.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kotenko18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KotenkoKCC18,
  author       = {Igor V. Kotenko and
                  Maxim Kolomeets and
                  Andrey Chechulin and
                  Yannick Chevalier},
  title        = {A visual analytics approach for the cyber forensics based on different
                  views of the network traffic},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {2},
  pages        = {57--73},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.06.30.057},
  doi          = {10.22667/JOWUA.2018.06.30.057},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KotenkoKCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LiZLFA18,
  author       = {Guanglei Li and
                  Huachun Zhou and
                  Guanwen Li and
                  Bohao Feng and
                  Hyo{-}Beom Ahn},
  title        = {Towards Traffic-Driven {VNF} Scaling: {A} Preliminary Case Study based
                  on Container},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {3},
  pages        = {1--10},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.09.30.001},
  doi          = {10.22667/JOWUA.2018.09.30.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LiZLFA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LimSLKY18,
  author       = {Jongsu Lim and
                  Yonggu Shin and
                  Sunjun Lee and
                  Kyuho Kim and
                  Jeong Hyun Yi},
  title        = {Survey of Dynamic Anti-Analysis Schemes for Mobile Malware},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {3},
  pages        = {39--49},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.09.30.039},
  doi          = {10.22667/JOWUA.2018.09.30.039},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LimSLKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MorianoPRC18,
  author       = {Pablo Moriano and
                  Jared Pendleton and
                  Steven Rich and
                  L. Jean Camp},
  title        = {Stopping the Insider at the Gates: Protecting Organizational Assets
                  through Graph Mining},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {1},
  pages        = {4--29},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.03.31.004},
  doi          = {10.22667/JOWUA.2018.03.31.004},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MorianoPRC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ParkSHOL18,
  author       = {Mookyu Park and
                  Junwoo Seo and
                  Jaehyeok Han and
                  Haengrok Oh and
                  Kyungho Lee},
  title        = {Situational Awareness Framework for Threat Intelligence Measurement
                  of Android Malware},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {3},
  pages        = {25--38},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.09.30.025},
  doi          = {10.22667/JOWUA.2018.09.30.025},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ParkSHOL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RahmanBNTK18,
  author       = {Mohammad Shahriar Rahman and
                  Anirban Basu and
                  Toru Nakamura and
                  Haruo Takasaki and
                  Shinsaku Kiyomoto},
  title        = {{PPM:} Privacy Policy Manager for Home Energy Management System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {2},
  pages        = {42--56},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.06.30.042},
  doi          = {10.22667/JOWUA.2018.06.30.042},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RahmanBNTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SiddiqueeAAAH18,
  author       = {Kazy Noor E. Alam Siddiquee and
                  Karl Andersson and
                  Francisco Javier Moreno Arrebola and
                  Zainal Abedin and
                  Mohammad Shahadat Hossain},
  title        = {Estimation of Signal Coverage and Localization in Wi-Fi Networks with
                  {AODV} and {OLSR}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {3},
  pages        = {11--24},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.09.30.011},
  doi          = {10.22667/JOWUA.2018.09.30.011},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SiddiqueeAAAH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ViticchieBVL18,
  author       = {Alessio Viticchi{\'{e}} and
                  Cataldo Basile and
                  Fulvio Valenza and
                  Antonio Lioy},
  title        = {On the impossibility of effectively using likely-invariants for software
                  attestation purposes},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {9},
  number       = {2},
  pages        = {1--25},
  year         = {2018},
  url          = {https://doi.org/10.22667/JOWUA.2018.06.30.001},
  doi          = {10.22667/JOWUA.2018.06.30.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ViticchieBVL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/0002CTC17,
  author       = {Giovanni Pau and
                  Mario Collotta and
                  Salvatore Tirrito and
                  Riccardo Caponetto},
  title        = {An Innovative Approach for the Management of Cross-Coupling Interference
                  in Street Lighting Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {2},
  pages        = {44--63},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.06.31.044},
  doi          = {10.22667/JOWUA.2017.06.31.044},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/0002CTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AbhishtaJN17,
  author       = {Abhishta and
                  Reinoud Joosten and
                  Lambert J. M. Nieuwenhuis},
  title        = {Comparing Alternatives to Measure the Impact of DDoS Attack Announcements
                  on Target Stock Prices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {4},
  pages        = {1--18},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.12.31.001},
  doi          = {10.22667/JOWUA.2017.12.31.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AbhishtaJN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AgrafiotisEGC17,
  author       = {Ioannis Agrafiotis and
                  Arnau Erola and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Formalising Policies for Insider-threat Detection: {A} Tripwire Grammar},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {1},
  pages        = {26--43},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.03.31.026},
  doi          = {10.22667/JOWUA.2017.03.31.026},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AgrafiotisEGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChowSPBV17,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  James G. Phillips and
                  Joonsang Baek and
                  Elena Vlahu{-}Gjorgievska},
  title        = {Video Games and Virtual Reality as Persuasive Technologies for Health
                  Care: An Overview},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {3},
  pages        = {18--35},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.09.30.018},
  doi          = {10.22667/JOWUA.2017.09.30.018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChowSPBV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ContiRMMV17,
  author       = {Vincenzo Conti and
                  Leonardo Rundo and
                  Carmelo Militello and
                  Giancarlo Mauri and
                  Salvatore Vitabile},
  title        = {Resource-Efficient Hardware Implementation of a Neural-based Node
                  for Automatic Fingerprint Classification},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {4},
  pages        = {19--36},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.12.31.019},
  doi          = {10.22667/JOWUA.2017.12.31.019},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/ContiRMMV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GuerarMM17,
  author       = {Meriem Guerar and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {ClickPattern: {A} Pattern Lock System Resilient to Smudge and Side-channel
                  Attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {2},
  pages        = {64--78},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.06.31.064},
  doi          = {10.22667/JOWUA.2017.06.31.064},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GuerarMM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KammullerKP17,
  author       = {Florian Kamm{\"{u}}ller and
                  Manfred Kerber and
                  Christian W. Probst},
  title        = {Insider Threats and Auctions: Formalization, Mechanized Proof, and
                  Code Generation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {1},
  pages        = {44--78},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.03.31.044},
  doi          = {10.22667/JOWUA.2017.03.31.044},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KammullerKP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KotenkoSK17,
  author       = {Igor V. Kotenko and
                  Igor Saenko and
                  Alexey Kushnerevich},
  title        = {Parallel big data processing system for security monitoring in Internet
                  of Things networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {4},
  pages        = {60--74},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.12.31.060},
  doi          = {10.22667/JOWUA.2017.12.31.060},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/KotenkoSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MajeedZ17,
  author       = {Amjed Majeed and
                  Tanveer A. Zia},
  title        = {Multi-Layer Network Architecture for Supporting Multiple Applications
                  in Wireless Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {3},
  pages        = {36--56},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.09.30.036},
  doi          = {10.22667/JOWUA.2017.09.30.036},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MajeedZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MellSHG17,
  author       = {Peter Mell and
                  James M. Shook and
                  Richard E. Harang and
                  Serban I. Gavrila},
  title        = {Linear Time Algorithms to Restrict Insider Access using Multi-Policy
                  Access Control Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {1},
  pages        = {4--25},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.03.31.004},
  doi          = {10.22667/JOWUA.2017.03.31.004},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/MellSHG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NurseB17,
  author       = {Jason R. C. Nurse and
                  Elisa Bertino},
  title        = {Guest Editorial: Insider Threat Solutions - Moving from Concept to
                  Reality},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {1},
  pages        = {1--3},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.03.31.001},
  doi          = {10.22667/JOWUA.2017.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NurseB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SiddiqueeAKH17,
  author       = {Kazy Noor E. Alam Siddiquee and
                  Karl Andersson and
                  Faria Farjana Khan and
                  Mohammad Shahadat Hossain},
  title        = {A Scalable and Secure {MANET} for an i-Voting System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {3},
  pages        = {1--17},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.09.30.001},
  doi          = {10.22667/JOWUA.2017.09.30.001},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SiddiqueeAKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TaqieddinAA17,
  author       = {Eyad Taqieddin and
                  Fahed Awad and
                  Hani Ahmad},
  title        = {Location-Aware and Mobility-Based Performance Optimization for Wireless
                  Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {4},
  pages        = {37--59},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.12.31.037},
  doi          = {10.22667/JOWUA.2017.12.31.037},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TaqieddinAA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Torroglosa-Garcia17,
  author       = {Elena Torroglosa{-}Garc{\'{\i}}a and
                  Antonio F. Skarmeta{-}G{\'{o}}mez},
  title        = {Towards Interoperabilty in Identity Federation Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {2},
  pages        = {19--43},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.06.31.019},
  doi          = {10.22667/JOWUA.2017.06.31.019},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Torroglosa-Garcia17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/UchidaTIS17,
  author       = {Noriki Uchida and
                  Shoma Takeuchi and
                  Tomoyuki Ishida and
                  Yoshitaka Shibata},
  title        = {Mobile Traffic Accident Prevention System based on Chronological Changes
                  of Wireless Signals and Sensors},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {3},
  pages        = {57--66},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.09.30.057},
  doi          = {10.22667/JOWUA.2017.09.30.057},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/UchidaTIS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ValenzaSSLSV17,
  author       = {Fulvio Valenza and
                  Tao Su and
                  Serena Spinoso and
                  Antonio Lioy and
                  Riccardo Sisto and
                  Marco Vallini},
  title        = {A formal approach for network security policy validation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {1},
  pages        = {79--100},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.03.31.079},
  doi          = {10.22667/JOWUA.2017.03.31.079},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ValenzaSSLSV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WatanabeDET17,
  author       = {Ryo Watanabe and
                  Dilawaer Duolikun and
                  Tomoya Enokido and
                  Makoto Takizawa},
  title        = {A Simply Energy-efficient Migration Algorithm of Processes with Virtual
                  Machines in Server Clusters},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {8},
  number       = {2},
  pages        = {1--18},
  year         = {2017},
  url          = {https://doi.org/10.22667/JOWUA.2017.06.31.001},
  doi          = {10.22667/JOWUA.2017.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WatanabeDET17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BaiardiTI16,
  author       = {Fabrizio Baiardi and
                  Federico Tonelli and
                  Lorenzo Isoni},
  title        = {Application Vulnerabilities in Risk Assessment and Management},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {41--59},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.041},
  doi          = {10.22667/JOWUA.2016.06.31.041},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BaiardiTI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BhargavaJMA16,
  author       = {Bharat K. Bhargava and
                  Amber M. Johnson and
                  Gisele Izera Munyengabe and
                  Pelin Angin},
  title        = {A Systematic Approach for Attack Analysis and Mitigation in {V2V}
                  Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {79--96},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.079},
  doi          = {10.22667/JOWUA.2016.03.31.079},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BhargavaJMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CarnianiCMMM16,
  author       = {Enrico Carniani and
                  Gianpiero Costantino and
                  Francesco Marino and
                  Fabio Martinelli and
                  Paolo Mori},
  title        = {Enhancing Video Surveillance with Usage Control and Privacy-Preserving
                  Solutions},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {4},
  pages        = {20--40},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.12.31.020},
  doi          = {10.22667/JOWUA.2016.12.31.020},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CarnianiCMMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CarnianiCMMM16a,
  author       = {Borja Bordel S{\'{a}}nchez and
                  Ram{\'{o}}n Alcarria and
                  Diego S{\'{a}}nchez de Rivera and
                  {\'{A}}lvaro S{\'{a}}nchez{-}Picot},
  title        = {Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical
                  Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {4},
  pages        = {41--64},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.12.31.041},
  doi          = {10.22667/JOWUA.2016.12.31.041},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CarnianiCMMM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CaseyMM16,
  author       = {William Casey and
                  Jose Andre Morales and
                  Bud Mishra},
  title        = {Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based
                  Model},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {97--117},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.097},
  doi          = {10.22667/JOWUA.2016.03.31.097},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CaseyMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChakrabortyRR16,
  author       = {Suvradip Chakraborty and
                  Srinivasan Raghuraman and
                  C. Pandu Rangan},
  title        = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange
                  Protocol Secure Against Memory-Scrapers},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {1--22},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.001},
  doi          = {10.22667/JOWUA.2016.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChakrabortyRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CorreiaMPBA16,
  author       = {F{\'{a}}bio Correia and
                  Artur Mariano and
                  Alberto Proen{\c{c}}a and
                  Christian H. Bischof and
                  Erik Agrell},
  title        = {Parallel Improved Schnorr-Euchner Enumeration {SE++} on Shared and
                  Distributed Memory Systems, With and Without Extreme Pruning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {4},
  pages        = {1--19},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.12.31.001},
  doi          = {10.22667/JOWUA.2016.12.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CorreiaMPBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DesnitskyLCK16,
  author       = {Vasily Desnitsky and
                  Dmitry Levshun and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Design Technique for Secure Embedded Devices: Application for Creation
                  of Integrated Cyber-Physical Security System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {60--80},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.060},
  doi          = {10.22667/JOWUA.2016.06.31.060},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/DesnitskyLCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EzeNH16,
  author       = {Chika Eze and
                  Jason R. C. Nurse and
                  Jassim Happa},
  title        = {Using Visualizations to Enhance Users' Understanding of App Activities
                  on Android Devices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {39--57},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.039},
  doi          = {10.22667/JOWUA.2016.03.31.039},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EzeNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FayeLGE16,
  author       = {S{\'{e}}bastien Faye and
                  Nicolas Louveton and
                  Gabriela Gheorghe and
                  Thomas Engel},
  title        = {A Two-Level Approach to Characterizing Human Activities from Wearable
                  Sensor Data},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {1--21},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.001},
  doi          = {10.22667/JOWUA.2016.09.31.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FayeLGE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HegedusBJ16,
  author       = {Istv{\'{a}}n Heged{\"{u}}s and
                  {\'{A}}rp{\'{a}}d Berta and
                  M{\'{a}}rk Jelasity},
  title        = {Robust Decentralized Differentially Private Stochastic Gradient Descent},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {20--40},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.020},
  doi          = {10.22667/JOWUA.2016.06.31.020},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HegedusBJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KC16,
  author       = {Subhashree V. K. and
                  Tharini C.},
  title        = {Real-Time Implementation of Locality Sensitive Hashing Using {NI}
                  {WSN} and LabVIEW for Outlier Detection in Wireless Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {22--39},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.022},
  doi          = {10.22667/JOWUA.2016.09.31.022},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KimuraP16,
  author       = {Tomotaka Kimura and
                  Chinthaka Premachandra},
  title        = {Optimal Relay Node Selection in Two-Hop Routing for Intermittently
                  Connected MANETs},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {23--38},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.023},
  doi          = {10.22667/JOWUA.2016.03.31.023},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KimuraP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KolomeecCPK16,
  author       = {Maxim Kolomeec and
                  Andrey Chechulin and
                  Anton Pronoza and
                  Igor V. Kotenko},
  title        = {Technique of Data Visualization: Example of Network Topology Display
                  for Security Monitoring},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {58--78},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.058},
  doi          = {10.22667/JOWUA.2016.03.31.058},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KolomeecCPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kotenko16,
  author       = {Igor V. Kotenko},
  title        = {Guest Editorial: Advances in Secure Distributed and Network-Based
                  Computing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.001},
  doi          = {10.22667/JOWUA.2016.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kotenko16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LimJCPH16,
  author       = {Kyeonghwan Lim and
                  Younsik Jeong and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han},
  title        = {An Android Application Protection Scheme against Dynamic Reverse Engineering
                  Attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {40--52},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.040},
  doi          = {10.22667/JOWUA.2016.09.31.040},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LimJCPH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SbeytiMAFY16,
  author       = {Hassan Sbeyti and
                  Mohamad Malli and
                  Khalid Suliman Al{-}Tahat and
                  Ahmad Fadlallah and
                  Mohamad Youssef},
  title        = {Scalable extensible middleware framework for context-aware mobile
                  applications {(SCAMMP)}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {77--98},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.077},
  doi          = {10.22667/JOWUA.2016.09.31.077},
  timestamp    = {Fri, 19 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SbeytiMAFY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ThombreIAH16,
  author       = {Sumeet Thombre and
                  Raihan Ul Islam and
                  Karl Andersson and
                  Mohammad Shahadat Hossain},
  title        = {{IP} based Wireless Sensor Networks: Performance Analysis using Simulations
                  and Experiments},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {53--76},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.053},
  doi          = {10.22667/JOWUA.2016.09.31.053},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ThombreIAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YangOP16,
  author       = {Huihui Yang and
                  Vladimir A. Oleshchuk and
                  Andreas Prinz},
  title        = {Verifying Group Authentication Protocols by Scyther},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {3--19},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.003},
  doi          = {10.22667/JOWUA.2016.06.31.003},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YangOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AramKP15,
  author       = {Siamak Aram and
                  Ikramullah Khosa and
                  Eros Pasero},
  title        = {Conserving Energy Through Neural Prediction of Sensed Data},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {1},
  pages        = {74--97},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.03.31.074},
  doi          = {10.22667/JOWUA.2015.03.31.074},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AramKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BaiardiTBB15,
  author       = {Fabrizio Baiardi and
                  Federico Tonelli and
                  Alessandro Bertolini and
                  Roberto Bertolotti},
  title        = {Selecting Countermeasures for {ICT} Systems Before They are Attacked},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {58--77},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.058},
  doi          = {10.22667/JOWUA.2015.06.31.058},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BaiardiTBB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CicottiCDR15,
  author       = {Giuseppe Cicotti and
                  Luigi Coppolino and
                  Salvatore D'Antonio and
                  Luigi Romano},
  title        = {Runtime Model Checking for {SLA} Compliance Monitoring and QoS Prediction},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {4--20},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.004},
  doi          = {10.22667/JOWUA.2015.06.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CicottiCDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FedorchenkoKC15,
  author       = {Andrey Fedorchenko and
                  Igor V. Kotenko and
                  Andrey Chechulin},
  title        = {Integrated Repository of Security Information for Network Security
                  Evaluation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {41--57},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.041},
  doi          = {10.22667/JOWUA.2015.06.31.041},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FedorchenkoKC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GavaiSGHSR15,
  author       = {Gaurang Gavai and
                  Kumar Sricharan and
                  Dave Gunning and
                  John Hanley and
                  Mudita Singhal and
                  Rob Rolleston},
  title        = {Supervised and Unsupervised methods to detect Insider Threat from
                  Enterprise Social and Online Activity Data},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {4},
  pages        = {47--63},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.12.31.047},
  doi          = {10.22667/JOWUA.2015.12.31.047},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GavaiSGHSR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GiangIKJK15,
  author       = {Nam Ky Giang and
                  Janggwan Im and
                  Daeyoung Kim and
                  Markus Jung and
                  Wolfgang Kastner},
  title        = {Integrating the {EPCIS} and Building Automation System into the Internet
                  of Things: a Lightweight and Interoperable Approach},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {1},
  pages        = {56--73},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.03.31.056},
  doi          = {10.22667/JOWUA.2015.03.31.056},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GiangIKJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JimenezG15,
  author       = {David Guill{\'{e}}n Jim{\'{e}}nez and
                  Franck Le Gall},
  title        = {Testing a Commercial Sensor Platform for Wideband Applications based
                  on the 802.15.4 standard},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {1},
  pages        = {24--36},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.03.31.024},
  doi          = {10.22667/JOWUA.2015.03.31.024},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/JimenezG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kotenko15,
  author       = {Igor V. Kotenko},
  title        = {Guest Editorial: Security in Distributed and Network-Based Computing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {1--3},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.001},
  doi          = {10.22667/JOWUA.2015.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kotenko15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KulU15,
  author       = {G{\"{o}}khan Kul and
                  Shambhu J. Upadhyaya},
  title        = {Towards a Cyber Ontology for Insider Threats in the Financial Sector},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {4},
  pages        = {64--85},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.12.31.064},
  doi          = {10.22667/JOWUA.2015.12.31.064},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KulU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MalikL15,
  author       = {Sehrish Malik and
                  Jong{-}Hyouk Lee},
  title        = {Privacy Enhancing Factors in People-Nearby Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {113--121},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.113},
  doi          = {10.22667/JOWUA.2015.06.31.113},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MalikL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/McGoughAGWBFMAT15,
  author       = {Andrew Stephen McGough and
                  Budi Arief and
                  Carl Gamble and
                  David Wall and
                  John Brennan and
                  John S. Fitzgerald and
                  Aad P. A. van Moorsel and
                  Sujeewa Alwis and
                  Georgios Theodoropoulos and
                  Ed Ruck{-}Keene},
  title        = {Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems
                  Using Beneficial Intelligent Software},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {4},
  pages        = {3--46},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.12.31.003},
  doi          = {10.22667/JOWUA.2015.12.31.003},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/McGoughAGWBFMAT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NkenyereyeTPR15,
  author       = {Lewis Nkenyereye and
                  Bayu Adhi Tama and
                  Youngho Park and
                  Kyung Hyune Rhee},
  title        = {A Fine-Grained Privacy Preserving Protocol over Attribute Based Access
                  Control for VANETs},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {98--112},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.098},
  doi          = {10.22667/JOWUA.2015.06.31.098},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NkenyereyeTPR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ParkKJCHP15,
  author       = {Jonghwa Park and
                  Hyojung Kim and
                  Younsik Jeong and
                  Seong{-}je Cho and
                  Sangchul Han and
                  Minkyu Park},
  title        = {Effects of Code Obfuscation on Android App Similarity Analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {4},
  pages        = {86--98},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.12.31.086},
  doi          = {10.22667/JOWUA.2015.12.31.086},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ParkKJCHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PokricKDPRMKJ15,
  author       = {Boris Pokric and
                  Srdjan Krco and
                  Dejan Drajic and
                  Maja Pokric and
                  Vladimir Rajs and
                  Zivorad Mihajlovic and
                  Petar Knezevic and
                  Dejan Jovanovic},
  title        = {Augmented Reality Enabled IoT Services for Environmental Monitoring
                  Utilising Serious Gaming Concept},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {1},
  pages        = {37--55},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.03.31.037},
  doi          = {10.22667/JOWUA.2015.03.31.037},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PokricKDPRMKJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RashidiF15,
  author       = {Bahman Rashidi and
                  Carol J. Fung},
  title        = {A Survey of Android Security Threats and Defenses},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {3},
  pages        = {3--35},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.09.31.003},
  doi          = {10.22667/JOWUA.2015.09.31.003},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RashidiF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RenugadeviM15,
  author       = {N. Renugadevi and
                  C. Mala},
  title        = {Improved Group Key Agreement for Emergency Cognitive Radio Mobile
                  Ad hoc Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {3},
  pages        = {73--86},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.09.31.073},
  doi          = {10.22667/JOWUA.2015.09.31.073},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RenugadeviM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RiekeZR15,
  author       = {Roland Rieke and
                  Maria Zhdanova and
                  J{\"{u}}rgen Repp},
  title        = {Security Compliance Tracking of Processes in Networked Cooperating
                  Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {21--40},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.021},
  doi          = {10.22667/JOWUA.2015.06.31.021},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RiekeZR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RoblesAANCIL15,
  author       = {Tom{\'{a}}s Robles and
                  Ram{\'{o}}n Alcarria and
                  Diego Mart{\'{\i}}n de Andr{\'{e}}s and
                  Mariano Navarro de la Cruz and
                  Rodrigo Calero and
                  Sof{\'{\i}}a Iglesias and
                  Manuel L{\'{o}}pez},
  title        = {An IoT based reference architecture for smart water management processes},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {1},
  pages        = {4--23},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.03.31.004},
  doi          = {10.22667/JOWUA.2015.03.31.004},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RoblesAANCIL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SantaFPS15,
  author       = {Jos{\'{e}} Santa and
                  Pedro J. Fern{\'{a}}ndez and
                  Fernando Pere{\~{n}}{\'{\i}}guez{-}Garcia and
                  Antonio F. Skarmeta},
  title        = {Real Experience with IPv6 Communications in Highways},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {3},
  pages        = {36--53},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.09.31.036},
  doi          = {10.22667/JOWUA.2015.09.31.036},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SantaFPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SharmaKR15,
  author       = {Vishal Sharma and
                  Rajesh Kumar and
                  Neeraj Rathore},
  title        = {Topological Broadcasting Using Parameter Sensitivity-Based Logical
                  Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {3},
  pages        = {54--72},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.09.31.054},
  doi          = {10.22667/JOWUA.2015.09.31.054},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SharmaKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SkarmetaCI15,
  author       = {Antonio F. Skarmeta and
                  Mar{\'{\i}}a Victoria Moreno Cano and
                  Antonio Iera},
  title        = {Guest Editorial: Smart Things, Big Data Technology and Ubiquitous
                  Computing solutions for the future Internet of Things},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {1},
  pages        = {1--3},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.03.31.001},
  doi          = {10.22667/JOWUA.2015.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SkarmetaCI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SkovorodaG15,
  author       = {Anastasia Skovoroda and
                  Dennis Gamayunov},
  title        = {Securing mobile devices: malware mitigation methods},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {2},
  pages        = {78--97},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.06.31.078},
  doi          = {10.22667/JOWUA.2015.06.31.078},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SkovorodaG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VazquezKJ15,
  author       = {Carlos Vazquez and
                  Ram Krishnan and
                  Eugene John},
  title        = {Time Series Forecasting of Cloud Data Center Workloads for Dynamic
                  Resource Provisioning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {3},
  pages        = {87--110},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.09.31.087},
  doi          = {10.22667/JOWUA.2015.09.31.087},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VazquezKJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/You15,
  author       = {Ilsun You},
  title        = {Editorial},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {3},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.09.31.001},
  doi          = {10.22667/JOWUA.2015.09.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/You15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/You15a,
  author       = {Ilsun You},
  title        = {Editorial},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {4},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.12.31.001},
  doi          = {10.22667/JOWUA.2015.12.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/You15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ArmandoCCMMM14,
  author       = {Alessandro Armando and
                  Giantonio Chiarelli and
                  Gabriele Costa and
                  Gabriele De Maglie and
                  Rocco Mammoliti and
                  Alessio Merlo},
  title        = {Mobile App Security Analysis with the MAVeriC Static Analysis Module},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {103--119},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.103},
  doi          = {10.22667/JOWUA.2014.12.31.103},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ArmandoCCMMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AzizH14,
  author       = {Benjamin Aziz and
                  Geoff W. Hamilton},
  title        = {Enforcing Reputation Constraints on Business Process Workflows},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {1},
  pages        = {101--121},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.03.31.101},
  doi          = {10.22667/JOWUA.2014.03.31.101},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AzizH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BaddarMM14,
  author       = {Sherenaz W. Al{-}Haj Baddar and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {Anomaly Detection in Computer Networks: {A} State-of-the-Art Review},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {29--64},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.029},
  doi          = {10.22667/JOWUA.2014.12.31.029},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BaddarMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BeckersHH14,
  author       = {Kristian Beckers and
                  Maritta Heisel and
                  Denis Hatebur},
  title        = {Supporting Common Criteria Security Analysis with Problem Frames},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {1},
  pages        = {37--63},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.03.31.037},
  doi          = {10.22667/JOWUA.2014.03.31.037},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BeckersHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ClaycombLG14,
  author       = {William R. Claycomb and
                  Philip A. Legg and
                  Dieter Gollmann},
  title        = {Guest Editorial: Emerging Trends in Research for Insider Threat Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {2},
  pages        = {1--6},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.06.31.001},
  doi          = {10.22667/JOWUA.2014.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ClaycombLG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EldardirySLHPBB14,
  author       = {Hoda Eldardiry and
                  Kumar Sricharan and
                  Juan Liu and
                  John Hanley and
                  Bob Price and
                  Oliver Brdiczka and
                  Eugene Bart},
  title        = {Multi-source fusion for anomaly detection: using across-domain and
                  across-time peer-group consistency checks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {2},
  pages        = {39--58},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.06.31.039},
  doi          = {10.22667/JOWUA.2014.06.31.039},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EldardirySLHPBB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Goriac14,
  author       = {Iulian Goriac},
  title        = {Plausibilistic Entropy and Anonymity},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {1},
  pages        = {64--83},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.03.31.064},
  doi          = {10.22667/JOWUA.2014.03.31.064},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Goriac14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GotzfriedM14,
  author       = {Johannes G{\"{o}}tzfried and
                  Tilo M{\"{u}}ller},
  title        = {Analysing Android's Full Disk Encryption Feature},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {1},
  pages        = {84--100},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.03.31.084},
  doi          = {10.22667/JOWUA.2014.03.31.084},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GotzfriedM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GrittiSPLW14,
  author       = {Cl{\'{e}}mentine Gritti and
                  Willy Susilo and
                  Thomas Plantard and
                  Kaitai Liang and
                  Duncan S. Wong},
  title        = {Empowering Personal Health Records with Cloud Computing: How to encrypt
                  with forthcoming fine-grained policies efficiently},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {3--28},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.003},
  doi          = {10.22667/JOWUA.2014.12.31.003},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GrittiSPLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HochreinerFMKSW14,
  author       = {Christoph Hochreiner and
                  Peter Fr{\"{u}}hwirt and
                  Zhendong Ma and
                  Peter Kieseberg and
                  Sebastian Schrittwieser and
                  Edgar R. Weippl},
  title        = {Genie in a Model? Why Model Driven Security will not secure your Web
                  Application},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {44--62},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.044},
  doi          = {10.22667/JOWUA.2014.09.31.044},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HochreinerFMKSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/IslamSKA14,
  author       = {Raihan Ul Islam and
                  Mischa Schmidt and
                  Hans{-}Joerg Kolbe and
                  Karl Andersson},
  title        = {Secure and Scalable Multimedia Sharing between Smart Homes},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {79--93},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.079},
  doi          = {10.22667/JOWUA.2014.09.31.079},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/IslamSKA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JoseGP14,
  author       = {Sangeetha Jose and
                  Akash Gautam and
                  Chandrasekaran Pandu Rangan},
  title        = {A New Certificateless Blind Signature Scheme},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {1},
  pages        = {122--141},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.03.31.122},
  doi          = {10.22667/JOWUA.2014.03.31.122},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/JoseGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KammullerP14,
  author       = {Florian Kamm{\"{u}}ller and
                  Christian W. Probst},
  title        = {Invalidating Policies using Structural Information},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {2},
  pages        = {59--79},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.06.31.059},
  doi          = {10.22667/JOWUA.2014.06.31.059},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KammullerP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KentLW14,
  author       = {Alexander D. Kent and
                  Lorie M. Liebrock and
                  James Wernicke},
  title        = {Differentiating User Authentication Graphs},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {2},
  pages        = {24--38},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.06.31.024},
  doi          = {10.22667/JOWUA.2014.06.31.024},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KentLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KotenkoD14,
  author       = {Igor V. Kotenko and
                  Elena Doynikova},
  title        = {Evaluation of Computer Network Security based on Attack Graphs and
                  Security Event Processing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {14--29},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.014},
  doi          = {10.22667/JOWUA.2014.09.31.014},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KotenkoD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeuT14,
  author       = {Fang{-}Yie Leu and
                  A Min Tjoa},
  title        = {Guest Editorial: Emerging Software Reliability and System Security
                  Technologies},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {1},
  pages        = {1--3},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.03.31.001},
  doi          = {10.22667/JOWUA.2014.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeuT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LindauerGRW14,
  author       = {Brian Lindauer and
                  Joshua Glasser and
                  Mitch Rosen and
                  Kurt C. Wallnau},
  title        = {Generating Test Data for Insider Threat Detectors},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {2},
  pages        = {80--94},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.06.31.080},
  doi          = {10.22667/JOWUA.2014.06.31.080},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LindauerGRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MundiePD14,
  author       = {David A. Mundie and
                  Samuel J. Perl and
                  Carly Huth J. D.},
  title        = {Insider Threat Defined: Discovering the Prototypical Case},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {2},
  pages        = {7--23},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.06.31.007},
  doi          = {10.22667/JOWUA.2014.06.31.007},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MundiePD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PanditBT14,
  author       = {Tapas Pandit and
                  Rana Barua and
                  Somanath Tripathy},
  title        = {eCK Secure Single Round ID-based Authenticated Key Exchange Protocols
                  with Master Perfect Forward Secrecy (Extended Version)},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {65--85},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.065},
  doi          = {10.22667/JOWUA.2014.12.31.065},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PanditBT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PhamBD14,
  author       = {Thanh{-}Trung Pham and
                  Fran{\c{c}}ois Bonnet and
                  Xavier D{\'{e}}fago},
  title        = {Reliability Prediction for Component-based Software Systems with Architectural-level
                  Fault Tolerance Mechanisms (Extended Version)},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {1},
  pages        = {4--36},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.03.31.004},
  doi          = {10.22667/JOWUA.2014.03.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PhamBD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SaenkoK14,
  author       = {Igor Saenko and
                  Igor V. Kotenko},
  title        = {Design of Virtual Local Area Network Scheme Based on Genetic Optimization
                  and Visual Analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {86--102},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.086},
  doi          = {10.22667/JOWUA.2014.12.31.086},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/SaenkoK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/StenzelKBR14,
  author       = {Kurt Stenzel and
                  Kuzman Katkalov and
                  Marian Borek and
                  Wolfgang Reif},
  title        = {A Model-Driven Approach to Noninterference},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {30--43},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.030},
  doi          = {10.22667/JOWUA.2014.09.31.030},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/StenzelKBR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SunK14,
  author       = {Kyoungjae Sun and
                  Younghan Kim},
  title        = {Flow Mobility Management in PMIPv6-based {DMM} (Distributed Mobility
                  Management) Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {120--127},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.120},
  doi          = {10.22667/JOWUA.2014.12.31.120},
  timestamp    = {Thu, 05 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/SunK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TanjoMMM14,
  author       = {Tomoya Tanjo and
                  Kazuhiro Minami and
                  Ken Mano and
                  Hiroshi Maruyama},
  title        = {Evaluating data utility of privacy-preserving pseudonymized location
                  datasets},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {63--78},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.063},
  doi          = {10.22667/JOWUA.2014.09.31.063},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TanjoMMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YasudaTS14,
  author       = {Takanori Yasuda and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {Efficient variant of Rainbow using sparse secret keys},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {3--13},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.003},
  doi          = {10.22667/JOWUA.2014.09.31.003},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YasudaTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/You14,
  author       = {Ilsun You},
  title        = {Editorial},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.001},
  doi          = {10.22667/JOWUA.2014.09.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/You14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/You14a,
  author       = {Ilsun You},
  title        = {Editorial},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {4},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.12.31.001},
  doi          = {10.22667/JOWUA.2014.12.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/You14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AbbasiCD13,
  author       = {Sedigheh Abbasi and
                  Stelvio Cimato and
                  Ernesto Damiani},
  title        = {Clustering Models in Secure Clustered Multiparty Computation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {63--76},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.063},
  doi          = {10.22667/JOWUA.2013.06.31.063},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AbbasiCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AnginB13,
  author       = {Pelin Angin and
                  Bharat K. Bhargava},
  title        = {An Agent-based Optimization Framework for Mobile-Cloud Computing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {1--17},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.001},
  doi          = {10.22667/JOWUA.2013.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AnginB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BabaE13,
  author       = {Kensuke Baba and
                  Serina Egawa},
  title        = {On the Order of Search for Personal Identification with Biometric
                  Images},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {97--103},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.097},
  doi          = {10.22667/JOWUA.2013.06.31.097},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BabaE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BadiiCPPSTV13,
  author       = {Atta Badii and
                  Davide Carboni and
                  Antonio Pintus and
                  Andrea Piras and
                  Alberto Serra and
                  Marco Tiemann and
                  Nagarajan Viswanathan},
  title        = {CityScripts: Unifying Web, IoT and Smart City Services in a Smart
                  Citizen Workspace},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {58--78},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.058},
  doi          = {10.22667/JOWUA.2013.09.31.058},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BadiiCPPSTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BkakriaCCFG13,
  author       = {Anis Bkakria and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jos{\'{e}} M. Fernandez and
                  David Gross{-}Amblard},
  title        = {Preserving Multi-relational Outsourced Databases Confidentiality using
                  Fragmentation and Encryption},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {39--62},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.039},
  doi          = {10.22667/JOWUA.2013.06.31.039},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BkakriaCCFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CadeB13,
  author       = {David Cad{\'{e}} and
                  Bruno Blanchet},
  title        = {From Computationally-Proved Protocol Specifications to Implementations
                  and Application to {SSH}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {4--31},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.004},
  doi          = {10.22667/JOWUA.2013.03.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CadeB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChangLCHL13,
  author       = {Chia{-}Hsuan Chang and
                  Chia{-}Lung Liu and
                  Hsi{-}Lu Chao and
                  Kuei{-}Li Huang and
                  Yi{-}Bing Lin},
  title        = {A Novel {LIPA} Scheme for {LTE} VoIP Services with Home eNBs},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {1--22},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.001},
  doi          = {10.22667/JOWUA.2013.09.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChangLCHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChenLMP13,
  author       = {Xihui Chen and
                  Gabriele Lenzini and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Design and Formal Analysis of {A} Group Signature Based Electronic
                  Toll Pricing System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {55--75},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.055},
  doi          = {10.22667/JOWUA.2013.03.31.055},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChenLMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChoPSR13,
  author       = {Wonjun Cho and
                  Youngho Park and
                  Chul Sur and
                  Kyung Hyune Rhee},
  title        = {An Improved Privacy-Preserving Navigation Protocol in \{VANET\}s},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {80--92},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.080},
  doi          = {10.22667/JOWUA.2013.12.31.080},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChoPSR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ClaycombH13,
  author       = {William R. Claycomb and
                  Carly L. Huth},
  title        = {A Method For Characterizing Sociotechnical Events Related to Insider
                  Threat Sabotage},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {1--19},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.001},
  doi          = {10.22667/JOWUA.2013.12.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ClaycombH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CrassDJKM13,
  author       = {Stefan Cra{\ss} and
                  Tobias D{\"{o}}nz and
                  Gerson Joskowicz and
                  Eva K{\"{u}}hn and
                  Alexander Marek},
  title        = {Securing a Space-Based Service Architecture with Coordination-Driven
                  Access Control},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {76--97},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.076},
  doi          = {10.22667/JOWUA.2013.03.31.076},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/CrassDJKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EbriBSV13,
  author       = {Noura Al Ebri and
                  Joonsang Baek and
                  Abdulhadi Shoufan and
                  Quang Hieu Vu},
  title        = {Forward-Secure Identity-Based Signature: New Generic Constructions
                  and Their Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {32--54},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.032},
  doi          = {10.22667/JOWUA.2013.03.31.032},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EbriBSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GochhayatV13,
  author       = {Sarada Prasad Gochhayat and
                  Pallapa Venkataram},
  title        = {Performance Analysis of a Priority based Resource Allocation Scheme
                  in Ubiquitous Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {23--40},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.023},
  doi          = {10.22667/JOWUA.2013.09.31.023},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GochhayatV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HouSUY13,
  author       = {Shuhui Hou and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu},
  title        = {Double Encryption for Data Authenticity and Integrity in Privacy-
                  preserving Confidential Forensic Investigation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {104--113},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.104},
  doi          = {10.22667/JOWUA.2013.06.31.104},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HouSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HuaiQLLL13,
  author       = {Weicheng Huai and
                  Zhuzhong Qian and
                  Xin Li and
                  Gangyi Luo and
                  Sanglu Lu},
  title        = {Energy Aware Task Scheduling in Data Centers},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {18--38},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.018},
  doi          = {10.22667/JOWUA.2013.06.31.018},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HuaiQLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JaraLG13,
  author       = {Antonio J. Jara and
                  Latif Ladid and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {The Internet of Everything through IPv6: An Analysis of Challenges,
                  Solutions and Opportunities},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {97--118},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.097},
  doi          = {10.22667/JOWUA.2013.09.31.097},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/JaraLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeggMNHAGC13,
  author       = {Philip A. Legg and
                  Nick Moffat and
                  Jason R. C. Nurse and
                  Jassim Happa and
                  Ioannis Agrafiotis and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Towards a Conceptual Model and Reasoning Structure for Insider Threat
                  Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {20--37},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.020},
  doi          = {10.22667/JOWUA.2013.12.31.020},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeggMNHAGC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LomoteyD13,
  author       = {Richard K. Lomotey and
                  Ralph Deters},
  title        = {Facilitating Multi-Device Usage in mHealth},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {77--96},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.077},
  doi          = {10.22667/JOWUA.2013.06.31.077},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LomoteyD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MatsunoY13,
  author       = {Yutaka Matsuno and
                  Shuichiro Yamamoto},
  title        = {A Framework for Dependability Consensus Building and In-Operation
                  Assurance},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {118--134},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.118},
  doi          = {10.22667/JOWUA.2013.03.31.118},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MatsunoY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PoiselMT13,
  author       = {Rainer Poisel and
                  Erich Malzer and
                  Simon Tjoa},
  title        = {Evidence and Cloud Computing: The Virtual Machine Introspection Approach},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {135--152},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.135},
  doi          = {10.22667/JOWUA.2013.03.31.135},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PoiselMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ProbstH13,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Reachability-based Impact as a Measure for Insiderness},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {38--48},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.038},
  doi          = {10.22667/JOWUA.2013.12.31.038},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ProbstH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SeoCKH13,
  author       = {Jiwan Seo and
                  Seungjin Choi and
                  Mucheol Kim and
                  Sangyong Han},
  title        = {The Method of Personalized Recommendation with Ensemble Combination},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {108--121},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.108},
  doi          = {10.22667/JOWUA.2013.12.31.108},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SeoCKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShahzadL13,
  author       = {Raja Khurram Shahzad and
                  Niklas Lavesson},
  title        = {Comparative Analysis of Voting Schemes for Ensemble-based Malware
                  Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {98--117},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.098},
  doi          = {10.22667/JOWUA.2013.03.31.098},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShahzadL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShinY13,
  author       = {Dongwan Shin and
                  Huiping Yao},
  title        = {A User Study of Security Warnings for Detecting {QR} Code Based Attacks
                  on Android Phone},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {49--64},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.049},
  doi          = {10.22667/JOWUA.2013.12.31.049},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShinY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SinghRB13,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  title        = {Lattice Based Efficient Threshold Public Key Encryption Scheme},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {93--107},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.093},
  doi          = {10.22667/JOWUA.2013.12.31.093},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SinghRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TakayaTY13,
  author       = {Mayumi Takaya and
                  Yusuke Tsuruta and
                  Akihiro Yamamura},
  title        = {Reverse Turing Test using Touchscreens and {CAPTCHA}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {41--57},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.041},
  doi          = {10.22667/JOWUA.2013.09.31.041},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TakayaTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ViragKE13,
  author       = {L{\'{a}}szl{\'{o}} Vir{\'{a}}g and
                  J{\'{o}}zsef Kov{\'{a}}cs and
                  Andr{\'{a}}s Edelmayer},
  title        = {Interacting Advanced {ITS} Communications with Low-Power Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {79--96},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.079},
  doi          = {10.22667/JOWUA.2013.09.31.079},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ViragKE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WeipplTT13,
  author       = {Edgar R. Weippl and
                  A Min Tjoa and
                  Simon Tjoa},
  title        = {Frontiers in Security and Dependability},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {1--3},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.001},
  doi          = {10.22667/JOWUA.2013.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WeipplTT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/XuLMZ13,
  author       = {Jian Xu and
                  Yuxi Li and
                  Jingwei Miao and
                  Fucai Zhou},
  title        = {The Electronic Cash Protocol Based on Dynamic Group Signature},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {65--79},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.065},
  doi          = {10.22667/JOWUA.2013.12.31.065},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/XuLMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AnderssonE12,
  author       = {Karl Andersson and
                  Muslim Elkotob},
  title        = {Rethinking {IP} Mobility Management},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {3},
  pages        = {41--49},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.09.31.041},
  doi          = {10.22667/JOWUA.2012.09.31.041},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AnderssonE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AndoTS12,
  author       = {Ruo Ando and
                  Kazushi Takahashi and
                  Kuniyasu Suzaki},
  title        = {Inter-domain Communication Protocol for Real-time File Access Monitor
                  of Virtual Machine},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {120--137},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.120},
  doi          = {10.22667/JOWUA.2012.03.31.120},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AndoTS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AzamLKNAE12,
  author       = {Muhammad Awais Azam and
                  Jonathan Loo and
                  Sardar Kashif Ashraf Khan and
                  Usman Naeem and
                  Muhammad Adeel and
                  Waleed Ejaz},
  title        = {Behavioural Patterns Analysis of Low Entropy People Using Proximity
                  Data},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {3},
  pages        = {21--40},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.09.31.021},
  doi          = {10.22667/JOWUA.2012.09.31.021},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AzamLKNAE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChoiC12,
  author       = {Byungha Choi and
                  Kyungsan Cho},
  title        = {Detection of Insider Attacks to the Web Server},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {35--45},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.035},
  doi          = {10.22667/JOWUA.2012.12.31.035},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChoiC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ClaycombHFML12,
  author       = {William R. Claycomb and
                  Carly L. Huth and
                  Lori Flynn and
                  David M. McIntire and
                  Todd B. Lewellen},
  title        = {Chronological Examination of Insider Threat Sabotage: Preliminary
                  Observations},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {4--20},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.004},
  doi          = {10.22667/JOWUA.2012.12.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ClaycombHFML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ColombiniC12,
  author       = {Clara Maria Colombini and
                  Antonio Colella},
  title        = {Digital scene of crime: technique of profiling users},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {3},
  pages        = {50--73},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.09.31.050},
  doi          = {10.22667/JOWUA.2012.09.31.050},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ColombiniC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DowLHLH12,
  author       = {Chyi{-}Ren Dow and
                  Yu{-}Hong Lee and
                  Pa Hsuan and
                  Yi{-}Tung Lee and
                  Shiow{-}Fen Hwang},
  title        = {Omnibone: An Efficient Service Data Circulation and Discovery Scheme
                  in VANETs},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {3},
  pages        = {4--20},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.09.31.004},
  doi          = {10.22667/JOWUA.2012.09.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/DowLHLH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Gollmann12,
  author       = {Dieter Gollmann},
  title        = {From Insider Threats to Business Processes that are Secure-by-Design},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {4--12},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.004},
  doi          = {10.22667/JOWUA.2012.03.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Gollmann12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HoL12,
  author       = {Shuyuan Mary Ho and
                  Hwajung Lee},
  title        = {A Thief among Us: The Use of Finite-State Machines to Dissect Insider
                  Threat in Cloud Communications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {82--98},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.082},
  doi          = {10.22667/JOWUA.2012.03.31.082},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HoriCY12,
  author       = {Yoshiaki Hori and
                  William R. Claycomb and
                  Kangbin Yim},
  title        = {Frontiers in Insider Threats and Data Leakage Prevention},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {1--3},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.001},
  doi          = {10.22667/JOWUA.2012.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HoriCY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiyomotoFM12,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  title        = {Design of Categorization Mechanism for Disaster-Information-Gathering
                  System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {21--34},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.021},
  doi          = {10.22667/JOWUA.2012.12.31.021},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KiyomotoFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeeLBLAY12,
  author       = {Kangwon Lee and
                  Kyungroul Lee and
                  Jaecheon Byun and
                  Sunghoon Lee and
                  Hyobeom Ahn and
                  Kangbin Yim},
  title        = {Extraction of Platform-unique Information as an Identifier},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {85--99},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.085},
  doi          = {10.22667/JOWUA.2012.12.31.085},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeeLBLAY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LingSM12,
  author       = {Amy Poh Ai Ling and
                  Kokichi Sugihara and
                  Masao Mukaidono},
  title        = {Enhancing Smart Grid System Processes via Philosophy of Security -
                  Case Study based on Information Security Systems -},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {3},
  pages        = {94--112},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.09.31.094},
  doi          = {10.22667/JOWUA.2012.09.31.094},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LingSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NishideMS12,
  author       = {Takashi Nishide and
                  Shingo Miyazaki and
                  Kouichi Sakurai},
  title        = {Security Analysis of Offline E-cash Systems with Malicious Insider},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {55--71},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.055},
  doi          = {10.22667/JOWUA.2012.03.31.055},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NishideMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SakuraiG12,
  author       = {Kouichi Sakurai and
                  Dieter Gollmann},
  title        = {Managing Insider Security Threats {(MIST} 2012 Volume 1)},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {1--3},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.001},
  doi          = {10.22667/JOWUA.2012.12.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SakuraiG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SalemS12,
  author       = {Malek Ben Salem and
                  Salvatore J. Stolfo},
  title        = {Combining Baiting and User Search Profiling Techniques for Masquerade
                  Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {13--29},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.013},
  doi          = {10.22667/JOWUA.2012.03.31.013},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SalemS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Sasaki12,
  author       = {Takayuki Sasaki},
  title        = {A Framework for Detecting Insider Threats using Psychological Triggers},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {99--119},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.099},
  doi          = {10.22667/JOWUA.2012.03.31.099},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Sasaki12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/UchidaTSS12,
  author       = {Noriki Uchida and
                  Kazuo Takahata and
                  Yoshitaka Shibata and
                  Norio Shiratori},
  title        = {Never Die Network Based on Cognitive Wireless Network and Satellite
                  System for Large Scale Disaster},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {3},
  pages        = {74--93},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.09.31.074},
  doi          = {10.22667/JOWUA.2012.09.31.074},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/UchidaTSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VivekSKR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Salini Selvaraj Kowsalya and
                  C. Pandu Rangan},
  title        = {{PKI} Based Signcryption without Pairing: an Efficient Scheme with
                  Tight Security Reduction},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {72--84},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.072},
  doi          = {10.22667/JOWUA.2012.12.31.072},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VivekSKR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VivekSVR12,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Ramarathnam Venkatesan and
                  C. Pandu Rangan},
  title        = {A Special Purpose Signature Scheme for Secure Computation of Traffic
                  in a Distributed Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {46--60},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.046},
  doi          = {10.22667/JOWUA.2012.12.31.046},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VivekSVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WangMT0ZM012,
  author       = {Jianfeng Wang and
                  Hua Ma and
                  Qiang Tang and
                  Jin Li and
                  Hui Zhu and
                  Siqi Ma and
                  Xiaofeng Chen},
  title        = {A New Efficient Verifiable Fuzzy Keyword Search Scheme},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {61--71},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.061},
  doi          = {10.22667/JOWUA.2012.12.31.061},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WangMT0ZM012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Xhafa12,
  author       = {Fatos Xhafa},
  title        = {Advances in Mobility Services and Protocols for Cognitive and Ubiquitous
                  Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {3},
  pages        = {1--3},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.09.31.001},
  doi          = {10.22667/JOWUA.2012.09.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Xhafa12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YanaiTMO12,
  author       = {Naoto Yanai and
                  Raylin Tso and
                  Masahiro Mambo and
                  Eiji Okamoto},
  title        = {A Certificateless Ordered Sequential Aggregate Signature Scheme Secure
                  against Super Adverssaries},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {30--54},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.030},
  doi          = {10.22667/JOWUA.2012.03.31.030},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YanaiTMO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Zhao0MTZ12,
  author       = {Yuanjie Zhao and
                  Xiaofeng Chen and
                  Hua Ma and
                  Qiang Tang and
                  Hui Zhu},
  title        = {A New Trapdoor-indistinguishable Public Key Encryption with Keyword
                  Search},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {1/2},
  pages        = {72--81},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.03.31.072},
  doi          = {10.22667/JOWUA.2012.03.31.072},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Zhao0MTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CastiglioneDSP11,
  author       = {Aniello Castiglione and
                  Bonaventura D'Alessio and
                  Alfredo De Santis and
                  Francesco Palmieri},
  title        = {Hiding Information into {OOXML} Documents: New Steganographic Perspectives},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {4},
  pages        = {59--83},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.12.31.059},
  doi          = {10.22667/JOWUA.2011.12.31.059},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/CastiglioneDSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChenLSL11,
  author       = {Hsiao{-}Han Chen and
                  Yi{-}Bing Lin and
                  Yingrong Coral Sung and
                  Ren{-}Huang Liou},
  title        = {Direction-based Wireless Remote Controller: {A} Smartphone Application},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {2},
  pages        = {33--45},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.06.31.033},
  doi          = {10.22667/JOWUA.2011.06.31.033},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChenLSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ContrerasBS11,
  author       = {Luis M. Contreras and
                  Carlos Jesus Bernardos and
                  Ignacio Soto},
  title        = {{RAMS:} {A} Protocol Extension to PMIPv6 for Improving Handover Performance
                  of Multicast Traffic},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {2},
  pages        = {67--82},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.06.31.067},
  doi          = {10.22667/JOWUA.2011.06.31.067},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ContrerasBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CrescenzoGKTZ11,
  author       = {Giovanni Di Crescenzo and
                  Abhrajit Ghosh and
                  Abhinay Kampasi and
                  Rajesh Talpade and
                  Yin Zhang},
  title        = {Detecting Anomalies in Active Insider Stepping Stone Attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {103--120},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.103},
  doi          = {10.22667/JOWUA.2011.03.31.103},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CrescenzoGKTZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EnokidoAT11,
  author       = {Tomoya Enokido and
                  Ailixier Aikebaier and
                  Makoto Takizawa},
  title        = {Computation and Transmission Rate Based Algorithm for Reducing the
                  Total Power Consumption},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {2},
  pages        = {1--18},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.06.31.001},
  doi          = {10.22667/JOWUA.2011.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EnokidoAT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Fung11,
  author       = {Carol J. Fung},
  title        = {Collaborative Intrusion Detection Networks and Insider Attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {63--74},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.063},
  doi          = {10.22667/JOWUA.2011.03.31.063},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Fung11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HuangL11,
  author       = {Yi{-}Li Huang and
                  Fang{-}Yie Leu},
  title        = {Constructing a Secure Point-to-Point Wireless Environment by Integrating
                  Diffie-Hellman {PKDS} {RSA} and Stream Ciphering for Users Known to
                  Each Other},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {3},
  pages        = {96--107},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.09.31.096},
  doi          = {10.22667/JOWUA.2011.09.31.096},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HuangL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HunkerP11,
  author       = {Jeffrey Hunker and
                  Christian W. Probst},
  title        = {Insiders and Insider Threats - An Overview of Definitions and Mitigation
                  Techniques},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {4--27},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.004},
  doi          = {10.22667/JOWUA.2011.03.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HunkerP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiyomotoM11,
  author       = {Shinsaku Kiyomoto and
                  Keith M. Martin},
  title        = {Model for a Common Notion of Privacy Leakage on Public Database},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {50--62},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.050},
  doi          = {10.22667/JOWUA.2011.03.31.050},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KiyomotoM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeitnerMR11,
  author       = {Maria Leitner and
                  Juergen Mangler and
                  Stefanie Rinderle{-}Ma},
  title        = {{SPRINT-} Responsibilities: Design and Development of Security Policies
                  in Process-aware Information Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {4},
  pages        = {4--26},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.12.31.004},
  doi          = {10.22667/JOWUA.2011.12.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeitnerMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Leu11,
  author       = {Fang{-}Yie Leu},
  title        = {Emerging Security Technologies and Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {3},
  pages        = {1--3},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.09.31.001},
  doi          = {10.22667/JOWUA.2011.09.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Leu11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MiyajiRS11,
  author       = {Atsuko Miyaji and
                  Mohammad Shahriar Rahman and
                  Masakazu Soshi},
  title        = {Efficient and Low-Cost {RFID} Authentication Schemes},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {3},
  pages        = {4--25},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.09.31.004},
  doi          = {10.22667/JOWUA.2011.09.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MiyajiRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MooreCCSST11,
  author       = {Andrew P. Moore and
                  Dawn M. Cappelli and
                  Thomas C. Caron and
                  Eric D. Shaw and
                  Derrick Spooner and
                  Randall F. Trzeciak},
  title        = {A Preliminary Model of Insider Theft of Intellectual Property},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {28--49},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.028},
  doi          = {10.22667/JOWUA.2011.03.31.028},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MooreCCSST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MouchaLP11,
  author       = {Cornelius Moucha and
                  Enrico Lovat and
                  Alexander Pretschner},
  title        = {A virtualized usage control bus system},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {4},
  pages        = {84--101},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.12.31.084},
  doi          = {10.22667/JOWUA.2011.12.31.084},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MouchaLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NoblesAC11,
  author       = {Philip Nobles and
                  Shahid Ali and
                  Howard Chivers},
  title        = {Improved Estimation of Trilateration Distances for Indoor Wireless
                  Intrusion Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {93--102},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.093},
  doi          = {10.22667/JOWUA.2011.03.31.093},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NoblesAC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PakniatE11,
  author       = {Nasrollah Pakniat and
                  Ziba Eslami},
  title        = {A Proxy E-Raffle Protocol Based on Proxy Signatures},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {3},
  pages        = {74--84},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.09.31.074},
  doi          = {10.22667/JOWUA.2011.09.31.074},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PakniatE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Pieters11,
  author       = {Wolter Pieters},
  title        = {Representing Humans in System Security Models: An Actor-Network Approach},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {75--92},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.075},
  doi          = {10.22667/JOWUA.2011.03.31.075},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Pieters11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PoiselTT11,
  author       = {Rainer Poisel and
                  Simon Tjoa and
                  Paul Tavolato},
  title        = {Advanced File Carving Approaches for Multimedia Files},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {4},
  pages        = {42--58},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.12.31.042},
  doi          = {10.22667/JOWUA.2011.12.31.042},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PoiselTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ProbstYSS11,
  author       = {Christian W. Probst and
                  Ilsun You and
                  Dongwan Shin and
                  Kouichi Sakurai},
  title        = {Addressing Insider Threats and Information Leakage},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {1--3},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.001},
  doi          = {10.22667/JOWUA.2011.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ProbstYSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/RassWS11,
  author       = {Stefan Rass and
                  Raphael Wigoutschnigg and
                  Peter Schartner},
  title        = {Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and
                  Receiver-Anonymity},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {4},
  pages        = {27--41},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.12.31.027},
  doi          = {10.22667/JOWUA.2011.12.31.027},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/RassWS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShahriarAI11,
  author       = {Abu Zafar M. Shahriar and
                  Mohammed Atiquzzaman and
                  William D. Ivancic},
  title        = {Evaluation of the Route Optimization for {NEMO} in Satellite Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {2},
  pages        = {46--66},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.06.31.046},
  doi          = {10.22667/JOWUA.2011.06.31.046},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShahriarAI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShiraishiMF11,
  author       = {Yoshiaki Shiraishi and
                  Masami Mohri and
                  Youji Fukuta},
  title        = {A Server-Aided Computation Protocol Revisited for Confidentiality
                  of Cloud Service},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {2},
  pages        = {83--94},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.06.31.083},
  doi          = {10.22667/JOWUA.2011.06.31.083},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShiraishiMF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TalebiFardL11,
  author       = {Peyman TalebiFard and
                  Victor C. M. Leung},
  title        = {Context-Aware Mobility Management in Heterogeneous Network Environments},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {2},
  pages        = {19--32},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.06.31.019},
  doi          = {10.22667/JOWUA.2011.06.31.019},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TalebiFardL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WeipplTP11,
  author       = {Edgar R. Weippl and
                  A Min Tjoa and
                  G{\"{u}}nther Pernul},
  title        = {Guest Editorial: Advances in Applied Security},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {4},
  pages        = {1--3},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.12.31.001},
  doi          = {10.22667/JOWUA.2011.12.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WeipplTP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YangLC11,
  author       = {Fuw{-}Yi Yang and
                  Zhen{-}Wei Liu and
                  Su{-}Hui Chiu},
  title        = {Mobile Banking Payment System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {3},
  pages        = {85--95},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.09.31.085},
  doi          = {10.22667/JOWUA.2011.09.31.085},
  timestamp    = {Thu, 07 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YangLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YouHS11,
  author       = {Ilsun You and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {Enhancing {SVO} Logic for Mobile IPv6 Security Protocols},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {3},
  pages        = {26--52},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.09.31.026},
  doi          = {10.22667/JOWUA.2011.09.31.026},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YouHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ZiaZ11,
  author       = {Tanveer A. Zia and
                  Albert Y. Zomaya},
  title        = {A Lightweight Security Framework for Wireless Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {3},
  pages        = {53--73},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.09.31.053},
  doi          = {10.22667/JOWUA.2011.09.31.053},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/ZiaZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/0002CC10,
  author       = {Jie Zhang and
                  Chen Chen and
                  Robin Cohen},
  title        = {A Scalable and Effective Trust-Based Framework for Vehicular Ad-Hoc
                  Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {3--15},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.003},
  doi          = {10.22667/JOWUA.2010.12.31.003},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/0002CC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BernardosGCCS10,
  author       = {Carlos Jesus Bernardos and
                  Marco Gramaglia and
                  Luis M. Contreras and
                  Mar{\'{\i}}a Calder{\'{o}}n and
                  Ignacio Soto},
  title        = {Network-based Localized {IP} mobility Management: Proxy Mobile IPv6
                  and Current Trends in Standardization},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {16--35},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.016},
  doi          = {10.22667/JOWUA.2010.09.31.016},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BernardosGCCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BienPN10,
  author       = {Van Quang Bien and
                  R. Venkatesha Prasad and
                  Ignas G. Niemegeers},
  title        = {Handoff in Radio over Fiber Indoor Networks at 60 GHz},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {71--82},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.071},
  doi          = {10.22667/JOWUA.2010.09.31.071},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BienPN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CostaLMMISDM10,
  author       = {Gabriele Costa and
                  Aliaksandr Lazouski and
                  Fabio Martinelli and
                  Ilaria Matteucci and
                  Val{\'{e}}rie Issarny and
                  Rachid Saadi and
                  Nicola Dragoni and
                  Fabio Massacci},
  title        = {Security-by-Contract-with-Trust for Mobile Devices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {75--91},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.075},
  doi          = {10.22667/JOWUA.2010.12.31.075},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CostaLMMISDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FuchsP10,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Reducing the Risk of Insider Misuse by Revising Identity Management
                  and User Account Data},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {14--28},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.014},
  doi          = {10.22667/JOWUA.2010.06.31.014},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FuchsP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Gal-OzGG10,
  author       = {Nurit Gal{-}Oz and
                  Tal Grinshpoun and
                  Ehud Gudes},
  title        = {Privacy Issues with Sharing and Computing Reputation across Communities},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {16--34},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.016},
  doi          = {10.22667/JOWUA.2010.12.31.016},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Gal-OzGG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HanKG10,
  author       = {Youn{-}Hee Han and
                  Chan{-}Myung Kim and
                  Joon{-}Min Gil},
  title        = {A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor
                  Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {96--106},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.096},
  doi          = {10.22667/JOWUA.2010.09.31.096},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HanKG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JaraZG10,
  author       = {Antonio J. Jara and
                  Miguel A. Zamora and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {An Initial Approach to Support Mobility in Hospital Wireless Sensor
                  Networks based on 6LoWPAN {(HWSN6)}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {107--122},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.107},
  doi          = {10.22667/JOWUA.2010.09.31.107},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/JaraZG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KafleI10,
  author       = {Ved P. Kafle and
                  Masugi Inoue},
  title        = {Locator {ID} Separation for Mobility Management in the New Generation
                  Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {3--15},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.003},
  doi          = {10.22667/JOWUA.2010.09.31.003},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KafleI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KimSNH10,
  author       = {Mucheol Kim and
                  Jiwan Seo and
                  Sanhyun Noh and
                  Sangyong Han},
  title        = {Reliable Social Trust Management with Mitigating Sparsity Problem},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {86--97},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.086},
  doi          = {10.22667/JOWUA.2010.06.31.086},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KimSNH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiriyamaWXT10,
  author       = {Sawako Kiriyama and
                  Ryuji Wakikawa and
                  Jinwei Xia and
                  Fumio Teraoka},
  title        = {Context Reflector for Proxy Mobile IPv6},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {36--51},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.036},
  doi          = {10.22667/JOWUA.2010.09.31.036},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KiriyamaWXT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kofod-PetersenC10,
  author       = {Anders Kofod{-}Petersen and
                  J{\"{o}}rg Cassens},
  title        = {Proxies for Privacy in Ambient Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {62--74},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.062},
  doi          = {10.22667/JOWUA.2010.12.31.062},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kofod-PetersenC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeeT10,
  author       = {Jong{-}Hyouk Lee and
                  Fumio Teraoka},
  title        = {Guest Editorial: Advances in Wireless Mobile and Sensor Technologies},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.001},
  doi          = {10.22667/JOWUA.2010.09.31.001},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeeT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeeYCPYY10,
  author       = {Kyungroul Lee and
                  Hyeungjun Yeuk and
                  Youngtae Choi and
                  Sitha Pho and
                  Ilsun You and
                  Kangbin Yim},
  title        = {Safe Authentication Protocol for Secure {USB} Memories},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {46--55},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.046},
  doi          = {10.22667/JOWUA.2010.06.31.046},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeeYCPYY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LiuCWW10,
  author       = {Debin Liu and
                  L. Jean Camp and
                  XiaoFeng Wang and
                  Lusha Wang},
  title        = {Using Budget-Based Access Control to Manage Operational Risks Caused
                  by Insiders},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {29--45},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.029},
  doi          = {10.22667/JOWUA.2010.06.31.029},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LiuCWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NagarajanJ10,
  author       = {Anand Nagarajan and
                  Christian Damsgaard Jensen},
  title        = {A Generic Role Based Access Control Model for Wind Power Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {35--49},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.035},
  doi          = {10.22667/JOWUA.2010.12.31.035},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NagarajanJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SalemS10,
  author       = {Malek Ben Salem and
                  Salvatore J. Stolfo},
  title        = {Detecting Masqueraders: {A} Comparison of One-Class Bag-of-Words User
                  Behavior Modeling Techniques},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {3--13},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.003},
  doi          = {10.22667/JOWUA.2010.06.31.003},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SalemS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/StanierNBLW10,
  author       = {James Stanier and
                  Stephen Naicken and
                  Anirban Basu and
                  Jian Li and
                  Ian Wakeman},
  title        = {Can We Use Trust in Online Dating?},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {50--61},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.050},
  doi          = {10.22667/JOWUA.2010.12.31.050},
  timestamp    = {Wed, 14 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/StanierNBLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Sun0SYS10,
  author       = {Jingbo Sun and
                  Yue Wang and
                  Hongbo Si and
                  Jian Yuan and
                  Xiuming Shan},
  title        = {Aggregate Human Mobility Modeling Using Principal Component Analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {83--95},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.083},
  doi          = {10.22667/JOWUA.2010.09.31.083},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Sun0SYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ThiD10,
  author       = {Que Nguyet Tran Thi and
                  Tran Khanh Dang},
  title        = {Towards Side-Effects-free Database Penetration Testing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {72--85},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.072},
  doi          = {10.22667/JOWUA.2010.06.31.072},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ThiD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TongCM10,
  author       = {Val{\'{e}}rie Viet Triem Tong and
                  Andrew J. Clark and
                  Ludovic M{\'{e}}},
  title        = {Specifying and Enforcing a Fine-Grained Information Flow Policy: Model
                  and Experiments},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {56--71},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.056},
  doi          = {10.22667/JOWUA.2010.06.31.056},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TongCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YanZY10,
  author       = {Zhiwei Yan and
                  Huachun Zhou and
                  Ilsun You},
  title        = {{N-NEMO:} {A} Comprehensive Network Mobility Solution in Proxy Mobile
                  IPv6 Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {52--70},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.052},
  doi          = {10.22667/JOWUA.2010.09.31.052},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YanZY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Yim10,
  author       = {Kangbin Yim},
  title        = {Guest Editorial: Advances in Trust Management},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.001},
  doi          = {10.22667/JOWUA.2010.12.31.001},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Yim10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/You10,
  author       = {Ilsun You},
  title        = {Editorial},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.001},
  doi          = {10.22667/JOWUA.2010.06.31.001},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/You10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}