Journal: JoWUA

Volume 10, Issue 4

1 -- 21Chi-Sheng Shih, Wei-Yu Hsieh, Chia-Lung Kao. Traceability for Vehicular Network Real-Time Messaging Based on Blockchain Technology
22 -- 30Minjae Park, Geunha You, Seong Je Cho, Minkyu Park, Sangchul Han. A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning
31 -- 45Jui-Chun Liu, Yi-Quan Ke, Yi-Chih Kao, Shi-Chun Tsai, Yi-Bing Lin. A Dual-Stack Authentication Mechanism Through SNMP
46 -- 67Aram Kim, Junhyoung Oh, Jinho Ryu, Jemin Lee, Kookheui Kwon, Kyungho Lee. SoK: A Systematic Review of Insider Threat Detection
68 -- 87Yang Wang, Willy Susilo, Joonsang Baek, Jongkil Kim, Intae Kim. Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator
88 -- 108Gwangbae Choi, Serge Vaudenay. Timed-Release Encryption With Master Time Bound Key (Extended)
109 -- 125Maxim Kolomeets, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker, Igor V. Kotenko. Reference architecture for social networks graph analysis

Volume 10, Issue 3

1 -- 20Pairat Thorncharoensri, Willy Susilo, Joonsang Baek. Efficient Controlled Signature for a Large Network with Multi Security-level Setting
21 -- 44Zeynep Mavus, Pelin Angin. A Secure Model For Efficient Live Migration of Containers
45 -- 64Mario Giliberto, Fabio Arena, Giovanni Pau 0002. A fuzzy-based Solution for Optimized Management of Energy Consumption in e-bikes
65 -- 80Shing Ki Wong, Siu-Ming Yiu. Detection on auto clickers in mobile games

Volume 10, Issue 2

1 -- 21Viktoriia Korzhuk, Anton Groznykh, Alexander Menshikov, Martin Strecker. Identification of Attacks against Wireless Sensor Networks Based on Behaviour Analysis
22 -- 36Davide Fiorino, Mario Collotta, Renato Ferrero. Usability evaluation of touch gestures for Mobile Augmented Reality applications
37 -- 54Mohammad Shahadat Hossain, Zinnia Sultana, Lutfun Nahar, Karl Andersson. An Intelligent System to Diagnose Chikungunya under Uncertainty
55 -- 75Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko. Social networks analysis by graph algorithms on the example of the VKontakte social network

Volume 10, Issue 1

1 -- 3Joonsang Baek, Willy Susilo, Jongkil Kim. Guest Editorial: Security and Privacy for Contemporary Network Computing Environment
4 -- 22Zheng Yang, Kimmo Järvinen 0001. Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its Application
23 -- 41Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin. BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing
42 -- 57Carol J. Fung, Bahman Rashidi, Vivian Genaro Motti. Multi-View Permission Risk Notification for Smartphone System
58 -- 74Hassan Khader Almathami, Majed A. Alrafiee, Elena Vlahu-Gjorgievska, Khin Than Win. An Analytical Approach to Using and Implementing Beacons: Opportunities and Challenges
75 -- 85Ziba Eslami, Mahnaz Noroozi, Joonsang Baek. On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme