default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 12
Volume 12, Number 1, 2021
- Peter Kieseberg, Simon Tjoa:
Guest Editorial: Special Issue on the ARES-Workshops 2020. 1-2 - Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, Michal Choras:
Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data. 3-19 - Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk:
Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets. 20-43 - Rosangela Casolare, Carlo De Dominicis, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone:
Dynamic Mobile Malware Detection through System Call-based Image representation. 44-63 - Daniela Pöhn, Wolfgang Hommel:
Universal Identity and Access Management Framework for Future Ecosystems. 64-84 - Claudia Negri-Ribalta, Marius Lombard-Platet, Camille Salinesi, Pascal Lafourcade:
Blockchain Mirage or Silver Bullet? A Requirements-driven Comparative Analysis of Business and Developers' Perceptions in the Accountancy Domain. 85-110 - Angela Borchert, Maritta Heisel:
Conflict Identification and Resolution for Trust-Related Requirements Elicitation A Goal Modeling Approach. 111-131
Volume 12, Number 2, 2021
- Ioannis Agrafiotis, Gökhan Kul:
Guest Editorial: Special Issue on Advances in Insider Threat Detection. 1-2 - Frank L. Greitzer, Justin Purl, Paul J. Sticha, Martin C. Yu, James D. Lee:
Use of Expert Judgments to Inform Bayesian Models of Insider Threat Risk. 3-47 - Alexander Walls, Ioannis Agrafiotis:
A Bayesian approach to insider threat detection. 48-84 - Akash Sundararaj, Gökhan Kul:
Impact Analysis of Training Data Characteristics for Phishing Email Classification. 85-98 - Arun Kumar, Sanjay K. Dhurandher, Isaac Woungang, Joel J. P. C. Rodrigues:
Securing Opportunistic Networks: An Encounter-based Trust-driven Barter Mechanism. 99-113 - Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Wei Zong:
Exploiting QR Code Error Correction for Digital Image Watermarking. 114-140 - Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Bot detection by friends graph in social networks. 141-159
Volume 12, Number 3, 2021
- Giovanni Lacava, Angelica Marotta, Fabio Martinelli, Andrea Saracino, Antonio La Marra, Endika Gil-Uriarte, Victor Mayoral Vilches:
Cybsersecurity Issues in Robotics. 1-28 - Bambang Soelistijanto, Geraldev Manoah:
Network Size Estimation in Opportunistic Mobile Networks: The Mark-Recapture Method. 29-46 - Francesco Pagano, Luca Verderame, Alessio Merlo:
Understanding Fuchsia Security. 47-64 - Husam Suleiman, Mohammad Hamdan:
Adaptive Probabilistic Model for Energy-Efficient Distance-based Clustering in WSNs (Adapt-P): A LEACH-based Analytical Study. 65-86 - Patrício Domingues, Ruben Nogueira, José Carlos Francisco, Miguel Frade:
Analyzing TikTok from a Digital Forensics Perspective. 87-115
Volume 12, Number 4, 2021
- Luca Caviglione, Steffen Wendzel, Aleksandra Mileva, Simon Vrhovec:
Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges. 1-3 - Johannes Bouché, Lukas Atkinson, Martin Kappes:
ShadowHeap: Memory Safety through Efficient Heap Metadata Validation. 4-21 - Corinna Heinz, Marco Zuppelli, Luca Caviglione:
Covert Channels in Transport Layer Security: Performance and Security Assessment. 22-36 - Maria Leitner, Maximilian Frank, Gregor Langner, Max Landauer, Florian Skopik, Paul Smith, Benjamin Akhras, Wolfgang Hotwagner, Stela Kucek, Timea Pahi, Lenhard Reuter, Manuel Warum:
Enabling exercises, education and research with a comprehensive cyber range. 37-61 - André Prata Ferreira, Chetna Gupta, Pedro R. M. Inácio, Mário M. Freire:
Behaviour-based Malware Detection in Mobile AndroidPlatforms Using Machine Learning Algorithms. 62-88 - Marco Zuppelli, Alessandro Carrega, Matteo Repetto:
An Effective and Efficient Approach to Improve Visibility Over Network Communications. 89-108
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.