default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 13
Volume 13, Number 1, March 2022
- Peter Kieseberg, Simon Tjoa:
Guest Editorial: Special Issue on the ARES-Workshops 2021. 1-3 - Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu, Mathieu Gallissot, Camille Sivelle:
SCADA Cybersecurity Awareness and Teaching with Hardware-In-The-Loop Platforms. 4-32 - David Megías, Minoru Kuribayashi, Andrea Rosales, Krzysztof Cabaj, Wojciech Mazurczyk:
Architecture of a fake news detection system combining digital watermarking, signal processing, and machine learning. 33-55 - Salvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise:
Empirical Validation on the Usability of Security Reports for Patching TLS Misconfigurations: User- and Case-Studies on Actionable Mitigations. 56-86 - Mariia Bakhtina, Raimundas Matulevicius:
Information Security Risks Analysis and Assessment in the Passenger-Autonomous Vehicle Interaction. 87-111 - Giacomo Giorgi, Wisam Abbasi, Andrea Saracino:
Privacy-Preserving Analysis for Remote Video Anomaly Detection in Real Life Environments. 112-136 - Tobias Schmidbauer, Steffen Wendzel:
Detection Of Computational Intensive Reversible Covert Channels Based On Packet Runtime. 137-166
Volume 13, Number 2, June 2022
- Adda Boualem, Cyril De Runz, Marwane Ayaida:
Partial Paving Strategy: Application to optimize the Area Coverage Problem in Mobile Wireless Sensor Networks. 1-22 - Jose-Luis Cabra, Carlos Parra, Diego Mendez, Luis Carlos Trujillo Arboleda:
Mechanisms of Authentication toward Habitude Pattern Lock and ECG: An overview. 23-67 - Arif Kerem Dayi, Volkan Rodoplu, Mert Nakip, Buse Pehlivan, Cüneyt Güzelis:
Multi-Channel Subset Iteration with Minimal Loss in Available Capacity (MC-SIMLAC) Algorithm for Joint Forecasting-Scheduling in the Internet of Things. 68-95 - Athanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis:
Blind software-assisted conformance and security assessment of FIDO2/WebAuthn implementations. 96-127 - Mikolaj Komisarek, Marek Pawlicki, Mikolaj Kowalski, Adrian Marzecki, Rafal Kozik, Michal Choras:
Hunting cyberattacks: experience from the real backbone network. 128-146 - Kitty Kioskli, Daniele Dellagiacoma, Theofanis Fotis, Haralambos Mouratidis:
The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies. 147-182
Volume 13, Number 3, September 2022
- Simon Vrhovec, Béla Genge, Martin Gilje Jaatun:
Guest Editorial: Special Issue on Interdisciplinary Cybersecurity. 1-3 - Laura Hartmann, Steffen Wendzel:
Anomaly Detection for Industrial Control Systems Through Totally Integrated Automation Portal Project History. 4-24 - Jörg Keller, Ewelina Marciniszyn:
Improved Concept and Implementation of a Fountain Code Covert Channel. 25-36 - Aleksandra Mileva, Jordan Tikvesanski:
Hiding Data in a Switched Network. 37-49 - Nunziato Cassavia, Luca Caviglione, Massimo Guarascio, Giuseppe Manco, Marco Zuppelli:
Detection of Steganographic Threats Targeting Digital Images in Heterogeneous Ecosystems Through Machine Learning. 50-67 - Anze Mihelic, Simon Vrhovec, Igor Bernik, Andrej Domej, Damjan Fujs, Tomaz Hovelja, Sanja Kerznar Osolnik, Patrik Pucer, Damjan Vavpotic, Bostjan Zvanut, Kaja Prislan:
Use of smart devices by the elderly: Nursing home residents in Slovenia. 68-80
Volume 13, Number 4, December 2022
- Kunwar Singh, C. Pandu Rangan, Ilsun You, Amalan Joseph Antony, S. K. Karthika, Jiyoon Kim:
Efficient Lattice based (H)IB-DRE. 1-23 - Jianhua Yang, Lixin Wang, Austin Lee, Peng-Jun Wan:
Stepping-Stone Intrusion Detection via Estimating Numbers of Upstream and Downstream Connections using Packet Crossover. 24-39 - Aqsa Ayub, Muhammad Rizwan, Shivanshu Shrivastava, Adeel Anjum, Pelin Angin, Yigit Sever:
Securely Offloading Computation to the Edge with the Tangle Cache. 40-60 - Gabriele Costa, Enrico Russo, Alessandro Armando:
Automating the Generation of Cyber Range Virtual Scenarios with VSDL. 61-80 - Seung Wook Jung:
Universal Redactable Blockchain. 81-93 - Jungsoo Park, Souhwan Jung:
Android Adware Detection using Soot and CFG. 94-104 - Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake:
Providing Membership Privacy to the Asynchronous Ratcheting Trees Protocol without losing Scalability. 105-123 - Syeda Ayesha Unisa, K. S. Jagadeesh Gowda:
Estimating CSI for Future Generation MIMO Networks Using Deep Learning Techniques and its Applicability to Varied Environments. 124-136 - R. Ratnadewi, Aan Darmawan Hangkawidjaja, Agus Prijono, Ariesa Pandanwang:
Design of Robot Plotter Software for Making Pattern with Turtle Graphics Algorithm. 137-154 - Ebtesam Shadadi, Latifah Alamer:
Hierarchical Parallel Processing for Data Clustering in GPU Using Deep Nearest Neighbor Searching. 155-168 - I Gede Iwan Sudipa, Putu Wirayudi Aditama, Christina Purnama Yanti:
Developing Augmented Reality Lontar Prasi Bali as an E-learning Material to Preserve Balinese Culture. 169-181 - Silvia Georgina Aguinaga Doig, Jessica Natalí Gallardo Ramírez, Osmer Campo Ugaz, Ronald M. Hernández, Janeth Benedicta Falla Ortiz, Lizzeth Aimee Garci Flores, Yen Marvin Bravo Larrea:
Educational Scenarios Using Technology: Challenges and Proposals During the Pandemic. 182-195 - Bagus Gede Krishna Yudistira, Radityo Anggoro, Ary Mazharuddin Shiddiqi:
Addition of Neighbors in the Number of Vanets Node Factors: DSR-PNT Performance Study. 196-210 - Fajar Cahyo Utomo, Tatag Herbayu Latukismo:
Trends and Patterns in Workforce Agility Literature: A Scopus-based Bibliometric Analysis. 211-224 - Prema Muthuswamy, V. Raju, M. Ramya:
Natural Language Processing for Data Science Workforce Analysis. 225-232 - Rika Rosnelly, Bob Subhan Riza, Linda Wahyuni, S. Edy Victor Haryanto, Annas Prasetio:
Vehicle Detection Using Machine Learning Model with the Gaussian Mixture Model (GMM). 233-243
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.