Journal: JoWUA

Volume 6, Issue 4

1 -- 2Ilsun You. Editorial
3 -- 46Andrew Stephen McGough, Budi Arief, Carl Gamble, David Wall, John Brennan, John S. Fitzgerald, Aad P. A. van Moorsel, Sujeewa Alwis, Georgios Theodoropoulos, Ed Ruck-Keene. Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software
47 -- 63Gaurang Gavai, Kumar Sricharan, Dave Gunning, John Hanley, Mudita Singhal, Rob Rolleston. Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data
64 -- 85Gökhan Kul, Shambhu J. Upadhyaya. Towards a Cyber Ontology for Insider Threats in the Financial Sector
86 -- 98Jonghwa Park, Hyojung Kim, Younsik Jeong, Seong Je Cho, Sangchul Han, Minkyu Park. Effects of Code Obfuscation on Android App Similarity Analysis

Volume 6, Issue 3

1 -- 2Ilsun You. Editorial
3 -- 35Bahman Rashidi, Carol J. Fung. A Survey of Android Security Threats and Defenses
36 -- 53José Santa, Pedro J. Fernández, Fernando Pereñíguez-Garcia, Antonio F. Skarmeta. Real Experience with IPv6 Communications in Highways
54 -- 72Vishal Sharma, Rajesh Kumar, Neeraj Rathore. Topological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc Networks
73 -- 86N. Renugadevi, C. Mala. Improved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc Networks
87 -- 110Carlos Vazquez, Ram Krishnan, Eugene John. Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning

Volume 6, Issue 2

1 -- 3Igor V. Kotenko. Guest Editorial: Security in Distributed and Network-Based Computing
4 -- 20Giuseppe Cicotti, Luigi Coppolino, Salvatore D'Antonio, Luigi Romano. Runtime Model Checking for SLA Compliance Monitoring and QoS Prediction
21 -- 40Roland Rieke, Maria Zhdanova, Jürgen Repp. Security Compliance Tracking of Processes in Networked Cooperating Systems
41 -- 57Andrey Fedorchenko, Igor V. Kotenko, Andrey Chechulin. Integrated Repository of Security Information for Network Security Evaluation
58 -- 77Fabrizio Baiardi, Federico Tonelli, Alessandro Bertolini, Roberto Bertolotti. Selecting Countermeasures for ICT Systems Before They are Attacked
78 -- 97Anastasia Skovoroda, Dennis Gamayunov. Securing mobile devices: malware mitigation methods
98 -- 112Lewis Nkenyereye, Bayu Adhi Tama, Youngho Park 0004, Kyung Hyune Rhee. A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs
113 -- 121Sehrish Malik, Jong-Hyouk Lee. Privacy Enhancing Factors in People-Nearby Applications

Volume 6, Issue 1

1 -- 3Antonio F. Skarmeta, María Victoria Moreno Cano, Antonio Iera. Guest Editorial: Smart Things, Big Data Technology and Ubiquitous Computing solutions for the future Internet of Things
4 -- 23Tomás Robles, Ramón Alcarria, Diego Martín de Andrés, Mariano Navarro, Rodrigo Calero, Sofía Iglesias, Manuel López 0001. An IoT based reference architecture for smart water management processes
24 -- 36David Guillén Jiménez, Franck Le Gall. Testing a Commercial Sensor Platform for Wideband Applications based on the 802.15.4 standard
37 -- 55Boris Pokric, Srdjan Krco, Dejan Drajic, Maja Pokric, Vladimir Rajs, Zivorad Mihajlovic, Petar Knezevic, Dejan Jovanovic. Augmented Reality Enabled IoT Services for Environmental Monitoring Utilising Serious Gaming Concept
56 -- 73Nam Ky Giang, Janggwan Im, Daeyoung Kim 0001, Markus Jung, Wolfgang Kastner. Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach
74 -- 97Siamak Aram, Ikramullah Khosa, Eros Pasero. Conserving Energy Through Neural Prediction of Sensed Data