Journal: JoWUA

Volume 12, Issue 4

1 -- 3Luca Caviglione, Steffen Wendzel, Aleksandra Mileva, Simon Vrhovec. Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges
4 -- 21Johannes Bouché, Lukas Atkinson, Martin Kappes. ShadowHeap: Memory Safety through Efficient Heap Metadata Validation
22 -- 36Corinna Heinz, Marco Zuppelli, Luca Caviglione. Covert Channels in Transport Layer Security: Performance and Security Assessment
37 -- 61Maria Leitner, Maximilian Frank, Gregor Langner, Max Landauer, Florian Skopik, Paul Smith 0001, Benjamin Akhras, Wolfgang Hotwagner, Stela Kucek, Timea Pahi, Lenhard Reuter, Manuel Warum. Enabling exercises, education and research with a comprehensive cyber range
62 -- 88André Prata Ferreira, Chetna Gupta, Pedro R. M. Inácio, Mário M. Freire. Behaviour-based Malware Detection in Mobile AndroidPlatforms Using Machine Learning Algorithms
89 -- 108Marco Zuppelli, Alessandro Carrega, Matteo Repetto. An Effective and Efficient Approach to Improve Visibility Over Network Communications

Volume 12, Issue 3

1 -- 28Giovanni Lacava, Angelica Marotta, Fabio Martinelli, Andrea Saracino, Antonio La Marra, Endika Gil-Uriarte, Victor Mayoral Vilches. Cybsersecurity Issues in Robotics
29 -- 46Bambang Soelistijanto, Geraldev Manoah. Network Size Estimation in Opportunistic Mobile Networks: The Mark-Recapture Method
47 -- 64Francesco Pagano, Luca Verderame, Alessio Merlo. Understanding Fuchsia Security
65 -- 86Husam Suleiman, Mohammad Hamdan. Adaptive Probabilistic Model for Energy-Efficient Distance-based Clustering in WSNs (Adapt-P): A LEACH-based Analytical Study
87 -- 115Patrício Domingues, Ruben Nogueira, José Carlos Francisco, Miguel Frade. Analyzing TikTok from a Digital Forensics Perspective

Volume 12, Issue 2

1 -- 2Ioannis Agrafiotis, Gökhan Kul. Guest Editorial: Special Issue on Advances in Insider Threat Detection
3 -- 47Frank L. Greitzer, Justin Purl, Paul J. Sticha, Martin C. Yu, James Lee. Use of Expert Judgments to Inform Bayesian Models of Insider Threat Risk
48 -- 84Alexander Walls, Ioannis Agrafiotis. A Bayesian approach to insider threat detection
85 -- 98Akash Sundararaj, Gökhan Kul. Impact Analysis of Training Data Characteristics for Phishing Email Classification
99 -- 113Arun Kumar 0013, Sanjay K. Dhurandher, Isaac Woungang, Joel J. P. C. Rodrigues. Securing Opportunistic Networks: An Encounter-based Trust-driven Barter Mechanism
114 -- 140Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim, Wei Zong. Exploiting QR Code Error Correction for Digital Image Watermarking
141 -- 159Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko. Bot detection by friends graph in social networks

Volume 12, Issue 1

1 -- 2Peter Kieseberg, Simon Tjoa. Guest Editorial: Special Issue on the ARES-Workshops 2020
3 -- 19Mikolaj Komisarek, Marek Pawlicki, Rafal Kozik, Michal Choras. Machine Learning Based Approach to Anomaly and Cyberattack Detection in Streamed Network Traffic Data
20 -- 43Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk. Detecting Network Covert Channels using Machine Learning, Data Mining and Hierarchical Organisation of Frequent Sets
44 -- 63Rosangela Casolare, Carlo De Dominicis, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. Dynamic Mobile Malware Detection through System Call-based Image representation
64 -- 84Daniela Pöhn, Wolfgang Hommel. Universal Identity and Access Management Framework for Future Ecosystems
85 -- 110Claudia Negri Ribalta, Marius Lombard-Platet, Camille Salinesi, Pascal Lafourcade 0001. Blockchain Mirage or Silver Bullet? A Requirements-driven Comparative Analysis of Business and Developers' Perceptions in the Accountancy Domain
111 -- 131Angela Borchert, Maritta Heisel. Conflict Identification and Resolution for Trust-Related Requirements Elicitation A Goal Modeling Approach