


default search action
Journal of Cyber Security and Mobility, Volume 4
Volume 4, Number 1, January 2015
- Kyriakos Manousakis, Sharanya Eswaran, David Shur, Gaurav Naik, Pavan Kantharaju, William C. Regli, Brian Adamson:

Torrent-Based Dissemination in Infrastructure-Less Wireless Networks. 1-22 - Vandana Milind Rohokale

, Ramjee Prasad:
Cyber Security for IntelligentWorld with Internet of Things and Machine to Machine Communication. 23-40 - Tommi Meskanen, Valtteri Niemi, Noora Nieminen:

How to Use Garbling for Privacy Preserving Electronic Surveillance Services. 41-64 - Mohamed Abomhara

, Geir M. Køien:
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. 65-88
Volume 4, Numbers 2-3, April/July 2015
- Matija Stevanovic

, Jens Myrup Pedersen
:
On the use of machine learning for identifying botnet network traffic. 1-32 - Greig Paul, James Irvine

:
Practical Attacks on Security and Privacy Through a Low-Cost Android Device. 33-52 - Goldendeep Kaur, Jyoteesh Malhotra

:
Comparative Investigation of ARP Poisoning mitigation techniques using Standard Testbed for Wireless Networks. 53-64 - Kristian Herland, Heikki Hämmäinen, Pekka Kekolahti:

Information Security Risk Assessment of Smartphones using Bayesian Networks. 65-86 - Ezer Osei Yeboah-Boateng

, Elvis Akwa-Bonsu:
Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-crimes. 87-104 - Kwame Simpe Ofori

, Otu Larbi-Siaw, Eli Emmanuel Fianu
, Richard Eddie Gladjah, Ezer Osei Yeboah-Boateng:
Factors Influencing the Continuance Use of Mobile Social Media: The effect of Privacy Concerns. 105-124 - Vedashree Takalkar, Parikshit N. Mahalle

:
Confidentiality in Online Social Networks; ATrust-based Approach. 125-144
Volume 4, Number 4, October 2015
- Rayyan Sayeed, Ray Miller, Zulfiquar Sayeed:

Throughput Prediction Across Heterogeneous Boundaries in Wireless Communications. 233-258 - Ziqian Dong

, Zheng Wang, Wen Xie, Obinna Emelumadu, Chuan-Bi Lin, Roberto Rojas-Cessa:
An Experimental Study of SmallWorld Network Models for Wireless Networks. 259-278 - Shweta Jain, Christian Barona, Nicholas Madamopoulos

:
Modelling Wireless Propagation for Indoor Localization. 279-304 - Harshvardhan P. Joshi

, Aravindhan Dhanasekaran, Rudra Dutta:
Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of ROP Attacks. 305-324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














