- Isabel Menacho Vargas, Carlos Luy-Montejo, Lourdes Ivonne del Carmen Alcaide-Aranda
, Doris Isabel Goicochea Parks, Yoni Magali Maita Cruz, Jessica Paola Palacios-Garay, Aracelli del Carmen Gonzales-Sánchez:
Improved Butterfly Optimization Algorithm for Energy Efficient Antenna Selection Over Wireless Cellular Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 14(2): 121-136 (2023) - K. Veerasamy, E. J. Thomson Fredrik:
Intelligence System towards Identify Weeds in Crops and Vegetables Plantation Using Image Processing and Deep Learning Techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 14(4): 45-59 (2023) - Nikitina Vlada, Raúl A. Sánchez-Ancajima, Miguel Ángel Torres Rubio, Walter Antonio Campos-Ugaz, Aníbal Mejía Benavides, María Del Rocío Hende-Santolaya, Jacqueline C. Ponce-Meza:
Enhancing Security in Mobile Ad Hoc Networks: Enhanced Particle Swarm Optimization-driven Intrusion Detection and Secure Routing Algorithm. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 14(3): 77-88 (2023) - Lixin Wang
, Jianhua Yang, Maochang Qin:
Analyzing Distribution of Packet Round-Trip Times using Fast Fourier Transformation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 14(2): 137-149 (2023) - 2022
- Gabriele Costa, Enrico Russo, Alessandro Armando:
Automating the Generation of Cyber Range Virtual Scenarios with VSDL. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 61-80 (2022) - Jörg Keller, Ewelina Marciniszyn:
Improved Concept and Implementation of a Fountain Code Covert Channel. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 25-36 (2022) - Aqsa Ayub, Muhammad Rizwan, Shivanshu Shrivastava, Adeel Anjum, Pelin Angin, Yigit Sever
:
Securely Offloading Computation to the Edge with the Tangle Cache. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 40-60 (2022) - Mariia Bakhtina, Raimundas Matulevicius:
Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 87-111 (2022) - Adda Boualem
, Cyril De Runz, Marwane Ayaida:
Partial Paving Strategy: Application to optimize the Area Coverage Problem in Mobile Wireless Sensor Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 1-22 (2022) - Jose-Luis Cabra, Carlos Parra, Diego Mendez, Luis Carlos Trujillo Arboleda:
Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 23-67 (2022) - Nunziato Cassavia, Luca Caviglione, Massimo Guarascio
, Giuseppe Manco
, Marco Zuppelli:
Detection of Steganographic Threats Targeting Digital Images in Heterogeneous Ecosystems Through Machine Learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 50-67 (2022) - Arif Kerem Dayi, Volkan Rodoplu, Mert Nakip
, Buse Pehlivan, Cüneyt Güzelis:
Multi-Channel Subset Iteration with Minimal Loss in Available Capacity (MC-SIMLAC) Algorithm for Joint Forecasting-Scheduling in the Internet of Things. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 68-95 (2022) - Silvia Georgina Aguinaga Doig, Jessica Natalí Gallardo Ramírez
, Osmer Campo Ugaz, Ronald M. Hernández, Janeth Benedicta Falla Ortiz, Lizzeth Aimee Garci Flores, Yen Marvin Bravo Larrea
:
Educational Scenarios Using Technology: Challenges and Proposals During the Pandemic. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 182-195 (2022) - Keita Emura, Kaisei Kajita
, Ryo Nojima, Kazuto Ogawa, Go Ohtake:
Providing Membership Privacy to the Asynchronous Ratcheting Trees Protocol without losing Scalability. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 105-123 (2022) - Giacomo Giorgi, Wisam Abbasi
, Andrea Saracino:
Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 112-136 (2022) - Athanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis:
Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 96-127 (2022) - Laura Hartmann, Steffen Wendzel:
Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 4-24 (2022) - Seung Wook Jung:
Universal Redactable Blockchain. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 81-93 (2022) - Peter Kieseberg, Simon Tjoa
:
Guest Editorial: Special Issue on the ARES-Workshops 2021. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 1-3 (2022) - Kitty Kioskli, Daniele Dellagiacoma
, Theofanis Fotis
, Haralambos Mouratidis:
The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 147-182 (2022) - Mikolaj Komisarek, Marek Pawlicki, Mikolaj Kowalski
, Adrian Marzecki, Rafal Kozik, Michal Choras:
Hunting cyberattacks: experience from the real backbone network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(2): 128-146 (2022) - Salvatore Manfredi
, Mariano Ceccato
, Giada Sciarretta, Silvio Ranise:
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 56-86 (2022) - David Megías
, Minoru Kuribayashi, Andrea Rosales
, Krzysztof Cabaj, Wojciech Mazurczyk:
Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 33-55 (2022) - Anze Mihelic, Simon Vrhovec, Igor Bernik, Andrej Domej, Damjan Fujs, Tomaz Hovelja, Sanja Kerznar Osolnik, Patrik Pucer, Damjan Vavpotic, Bostjan Zvanut, Kaja Prislan:
Use of smart devices by the elderly: Nursing home residents in Slovenia. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 68-80 (2022) - Aleksandra Mileva
, Jordan Tikvesanski:
Hiding Data in a Switched Network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(3): 37-49 (2022) - Prema Muthuswamy, V. Raju, M. Ramya:
Natural Language Processing for Data Science Workforce Analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 225-232 (2022) - Jungsoo Park, Souhwan Jung:
Android Adware Detection using Soot and CFG. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 94-104 (2022) - Maxime Puys
, Pierre-Henri Thevenon, Stéphane Mocanu, Mathieu Gallissot, Camille Sivelle:
SCADA Cybersecurity Awareness and Teaching with Hardware-In-The-Loop Platforms. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(1): 4-32 (2022) - R. Ratnadewi, Aan Darmawan Hangkawidjaja
, Agus Prijono
, Ariesa Pandanwang:
Design of Robot Plotter Software for Making Pattern with Turtle Graphics Algorithm. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 137-154 (2022) - Rika Rosnelly, Bob Subhan Riza, Linda Wahyuni, S. Edy Victor Haryanto, Annas Prasetio:
Vehicle Detection Using Machine Learning Model with the Gaussian Mixture Model (GMM). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 13(4): 233-243 (2022)