default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 6
Volume 6, Number 1, March 2015
- Antonio F. Skarmeta, María Victoria Moreno Cano, Antonio Iera:
Guest Editorial: Smart Things, Big Data Technology and Ubiquitous Computing solutions for the future Internet of Things. 1-3 - Tomás Robles, Ramón Alcarria, Diego Martín de Andrés, Mariano Navarro de la Cruz, Rodrigo Calero, Sofía Iglesias, Manuel López:
An IoT based reference architecture for smart water management processes. 4-23 - David Guillén Jiménez, Franck Le Gall:
Testing a Commercial Sensor Platform for Wideband Applications based on the 802.15.4 standard. 24-36 - Boris Pokric, Srdjan Krco, Dejan Drajic, Maja Pokric, Vladimir Rajs, Zivorad Mihajlovic, Petar Knezevic, Dejan Jovanovic:
Augmented Reality Enabled IoT Services for Environmental Monitoring Utilising Serious Gaming Concept. 37-55 - Nam Ky Giang, Janggwan Im, Daeyoung Kim, Markus Jung, Wolfgang Kastner:
Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach. 56-73 - Siamak Aram, Ikramullah Khosa, Eros Pasero:
Conserving Energy Through Neural Prediction of Sensed Data. 74-97
Volume 6, Number 2, June 2015
- Igor V. Kotenko:
Guest Editorial: Security in Distributed and Network-Based Computing. 1-3 - Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano:
Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction. 4-20 - Roland Rieke, Maria Zhdanova, Jürgen Repp:
Security Compliance Tracking of Processes in Networked Cooperating Systems. 21-40 - Andrey Fedorchenko, Igor V. Kotenko, Andrey Chechulin:
Integrated Repository of Security Information for Network Security Evaluation. 41-57 - Fabrizio Baiardi, Federico Tonelli, Alessandro Bertolini, Roberto Bertolotti:
Selecting Countermeasures for ICT Systems Before They are Attacked. 58-77 - Anastasia Skovoroda, Dennis Gamayunov:
Securing mobile devices: malware mitigation methods. 78-97 - Lewis Nkenyereye, Bayu Adhi Tama, Youngho Park, Kyung Hyune Rhee:
A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs. 98-112 - Sehrish Malik, Jong-Hyouk Lee:
Privacy Enhancing Factors in People-Nearby Applications. 113-121
Volume 6, Number 3, September 2015
- Ilsun You:
Editorial. 1-2 - Bahman Rashidi, Carol J. Fung:
A Survey of Android Security Threats and Defenses. 3-35 - José Santa, Pedro J. Fernández, Fernando Pereñíguez-Garcia, Antonio F. Skarmeta:
Real Experience with IPv6 Communications in Highways. 36-53 - Vishal Sharma, Rajesh Kumar, Neeraj Rathore:
Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks. 54-72 - N. Renugadevi, C. Mala:
Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks. 73-86 - Carlos Vazquez, Ram Krishnan, Eugene John:
Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning. 87-110
Volume 6, Number 4, December 2015
- Ilsun You:
Editorial. 1-2 - Andrew Stephen McGough, Budi Arief, Carl Gamble, David Wall, John Brennan, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis, Georgios Theodoropoulos, Ed Ruck-Keene:
Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software. 3-46 - Gaurang Gavai, Kumar Sricharan, Dave Gunning, John Hanley, Mudita Singhal, Rob Rolleston:
Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data. 47-63 - Gökhan Kul, Shambhu J. Upadhyaya:
Towards a Cyber Ontology for Insider Threats in the Financial Sector. 64-85 - Jonghwa Park, Hyojung Kim, Younsik Jeong, Seong-je Cho, Sangchul Han, Minkyu Park:
Effects of Code Obfuscation on Android App Similarity Analysis. 86-98
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.