Journal: JoWUA

Volume 11, Issue 4

1 -- 15Naiwei Liu, Meng Yu 0001, Wanyu Zang, Ravi S. Sandhu. Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform
16 -- 30Shing Ki Wong, Siu-Ming Yiu. Location spoofing attack detection with pre-installed sensors in mobile devices
31 -- 48Clayton Johnson, Bishal Khadka, Ram B. Basnet, Tenzin Doleck. Towards Detecting and Classifying Malicious URLs Using Deep Learning
49 -- 62G. S. Kasturi, Ansh Jain, Jagdeep Singh. Detection and Classification of Radio Frequency Jamming Attacks using Machine learning
63 -- 76Myungseo Park, Soram Kim, Jongsung Kim. Research on Note-Taking Apps with Security Features
77 -- 96Pelin Angin, Mohammad Hossein Anisi, Furkan Göksel, Ceren Gürsoy, Asaf Büyükgülcü. AgriLoRa: A Digital Twin Framework for Smart Agriculture

Volume 11, Issue 3

1 -- 28Antonio La Marra, Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Mina Sheikhalishahi. D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware
29 -- 49Mohammad Newaj Jamil, Mohammad Shahadat Hossain, Raihan Ul Islam, Karl Andersson 0001. Technological Innovation Capability Evaluation of High-Tech Firms Using Conjunctive and Disjunctive Belief Rule-Based Expert System: A Comparative Study
50 -- 69Robert Bembenik, Krzysztof Falcman. BLE Indoor Positioning System Using RSSI-based Trilateration
70 -- 86Ahmed M. Khedr, P. V. Pravija Raj, Amal Al Ali. An Energy-Efficient Data Acquisition Technique for Hierarchical Cluster-Based Wireless Sensor Networks
87 -- 106Slawomir Nowaczewski, Wojciech Mazurczyk. Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSEC
107 -- 140Birger Schacht, Peter Kieseberg. An Analysis of 5 Million OpenPGP Keys

Volume 11, Issue 2

1 -- 2Igor V. Kotenko. Guest Editorial: Intelligent Distributed Computing
3 -- 22Abhishta Abhishta, Wouter van Heeswijk, Marianne Junger, Lambert J. M. Nieuwenhuis, Reinoud Joosten. Why would we get attacked? An analysis of attacker's aims behind DDoS attacks
23 -- 33Oleg V. Baranov, Nikolay V. Smirnov, Tatyana E. Smirnova, Yefim V. Zholobov. Design of a quadrocopter with PID-controlled fail-safe algorithm
34 -- 54Diana Berbecaru, Antonio Lioy, Cesare Cameroni. Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure
55 -- 73Yulia A. Shichkina, Galina V. Kataeva, Yulia A. Irishina, Elizaveta S. Stanevich. The use of mobile phones to monitor the status of patients with Parkinson's disease
74 -- 86Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh. Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key
87 -- 105Yaser M. Khamayseh, Wail Mardini, Monther Aldwairi, Hussein T. Mouftah. On the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications
106 -- 125Al-Hussein Hameed Jasim, Niclas Ögren, Dimitar Minovski, Karl Andersson 0001. Packet Probing Study to Assess Sustainability in Available Bandwidth Measurements: Case of High-Speed Cellular Networks

Volume 11, Issue 1

1 -- 0Ilsun You. 2020 Letter from the Editor-in-Chief
2 -- 17Ivan Kholod, Andrey Shorov, Sergei Gorlatch. Efficient Distribution and Processing of Data for Parallelizing Data Mining in Mobile Clouds
18 -- 34Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa. On the Invisibility and Anonymity of Undeniable Signature Schemes
35 -- 53Davide Caputo, Luca Verderame, Andrea Ranieri, Alessio Merlo, Luca Caviglione. Fine-hearing Google Home: why silence will not protect your privacy
54 -- 80Valentim Realinho, Teresa Romão, A. Eduardo Dias. A Language for the End-user Development of Mobile Context-Aware Applications
81 -- 115Lamri Laouamer, Jalel Euchi, Salah Zidi, Alaeddine Mihoub. Image-to-Tree to Select Significant Blocks for Image Watermarking