


default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 9
Volume 9, Number 1, March 2018
- Igor V. Kotenko
:
Guest Editorial: Managing Insider Security Threats. 1-3 - Pablo Moriano
, Jared Pendleton, Steven Rich, L. Jean Camp:
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining. 4-29 - Alexander Hartl, Robert Annessi, Tanja Zseby:
Subliminal Channels in High-Speed Signatures. 30-53 - Athul Harilal, Flavio Toffalini, Ivan Homoliak
, John Henry Castellanos
, Juan Guarnizo, Soumik Mondal, Martín Ochoa:
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. 54-85 - Nir Drucker
, Shay Gueron
:
Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment. 86-99
Volume 9, Number 2, June 2018
- Alessio Viticchié, Cataldo Basile, Fulvio Valenza
, Antonio Lioy:
On the impossibility of effectively using likely-invariants for software attestation purposes. 1-25 - Mohammad Shahadat Hossain, Abdullah Al Hasan, Sunanda Guha, Karl Andersson:
A Belief Rule Based Expert System to Predict Earthquake under Uncertainty. 26-41 - Mohammad Shahriar Rahman, Anirban Basu, Toru Nakamura, Haruo Takasaki, Shinsaku Kiyomoto:
PPM: Privacy Policy Manager for Home Energy Management System. 42-56 - Igor V. Kotenko, Maxim Kolomeets, Andrey Chechulin, Yannick Chevalier:
A visual analytics approach for the cyber forensics based on different views of the network traffic. 57-73
Volume 9, Number 3, September 2018
- Guanglei Li, Huachun Zhou, Guanwen Li, Bohao Feng, Hyo-Beom Ahn:
Towards Traffic-Driven VNF Scaling: A Preliminary Case Study based on Container. 1-10 - Kazy Noor E. Alam Siddiquee
, Karl Andersson
, Francisco Javier Moreno Arrebola, Zainal Abedin, Mohammad Shahadat Hossain:
Estimation of Signal Coverage and Localization in Wi-Fi Networks with AODV and OLSR. 11-24 - Mookyu Park, Junwoo Seo, Jaehyeok Han, Haengrok Oh, Kyungho Lee:
Situational Awareness Framework for Threat Intelligence Measurement of Android Malware. 25-38 - Jongsu Lim, Yonggu Shin, Sunjun Lee, Kyuho Kim, Jeong Hyun Yi:
Survey of Dynamic Anti-Analysis Schemes for Mobile Malware. 39-49 - Seong-je Cho, Kyeonghwan Lim, Jungkyu Han, Byoung-chir Kim, Minkyu Park, Sangchul Han:
Open-Source Android App Detection considering the Effects of Code Obfuscation. 50-61
Volume 9, Number 4, December 2018
- Clémentine Gritti, Melek Önen
, Refik Molva, Willy Susilo
, Thomas Plantard
:
Device Identification and Personal Data Attestation in Networks. 1-25 - Damjan Buhov, Julian Rauchberger, Sebastian Schrittwieser:
FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications. 26-40 - Gaurav Choudhary
, Jiyoon Kim, Vishal Sharma
:
Security of 5G-Mobile Backhaul Networks: A Survey. 41-70 - Cheyenne Atapour, Ioannis Agrafiotis, Sadie Creese:
Modeling Advanced Persistent Threats to enhance anomaly detection techniques. 71-102

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.