


default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 9
Volume 9, Number 1, March 2018
- Igor V. Kotenko

:
Guest Editorial: Managing Insider Security Threats. 1-3 - Pablo Moriano

, Jared Pendleton, Steven Rich, L. Jean Camp:
Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining. 4-29 - Alexander Hartl, Robert Annessi, Tanja Zseby:

Subliminal Channels in High-Speed Signatures. 30-53 - Athul Harilal, Flavio Toffalini, Ivan Homoliak

, John Henry Castellanos
, Juan Guarnizo, Soumik Mondal, Martín Ochoa:
The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition. 54-85 - Nir Drucker

, Shay Gueron
:
Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment. 86-99
Volume 9, Number 2, June 2018
- Alessio Viticchié, Cataldo Basile, Fulvio Valenza

, Antonio Lioy:
On the impossibility of effectively using likely-invariants for software attestation purposes. 1-25 - Mohammad Shahadat Hossain, Abdullah Al Hasan, Sunanda Guha, Karl Andersson:

A Belief Rule Based Expert System to Predict Earthquake under Uncertainty. 26-41 - Mohammad Shahriar Rahman, Anirban Basu, Toru Nakamura, Haruo Takasaki, Shinsaku Kiyomoto:

PPM: Privacy Policy Manager for Home Energy Management System. 42-56 - Igor V. Kotenko, Maxim Kolomeets, Andrey Chechulin, Yannick Chevalier:

A visual analytics approach for the cyber forensics based on different views of the network traffic. 57-73
Volume 9, Number 3, September 2018
- Guanglei Li, Huachun Zhou, Guanwen Li, Bohao Feng, Hyo-Beom Ahn:

Towards Traffic-Driven VNF Scaling: A Preliminary Case Study based on Container. 1-10 - Kazy Noor E. Alam Siddiquee

, Karl Andersson
, Francisco Javier Moreno Arrebola, Zainal Abedin, Mohammad Shahadat Hossain
:
Estimation of Signal Coverage and Localization in Wi-Fi Networks with AODV and OLSR. 11-24 - Mookyu Park, Junwoo Seo, Jaehyeok Han, Haengrok Oh, Kyungho Lee:

Situational Awareness Framework for Threat Intelligence Measurement of Android Malware. 25-38 - Jongsu Lim, Yonggu Shin, Sunjun Lee, Kyuho Kim, Jeong Hyun Yi:

Survey of Dynamic Anti-Analysis Schemes for Mobile Malware. 39-49 - Seong-je Cho, Kyeonghwan Lim, Jungkyu Han, Byoung-chir Kim, Minkyu Park, Sangchul Han:

Open-Source Android App Detection considering the Effects of Code Obfuscation. 50-61
Volume 9, Number 4, December 2018
- Clémentine Gritti, Melek Önen

, Refik Molva, Willy Susilo
, Thomas Plantard
:
Device Identification and Personal Data Attestation in Networks. 1-25 - Damjan Buhov, Julian Rauchberger, Sebastian Schrittwieser:

FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications. 26-40 - Gaurav Choudhary

, Jiyoon Kim, Vishal Sharma
:
Security of 5G-Mobile Backhaul Networks: A Survey. 41-70 - Cheyenne Atapour, Ioannis Agrafiotis, Sadie Creese:

Modeling Advanced Persistent Threats to enhance anomaly detection techniques. 71-102

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














