Journal: JoWUA

Volume 7, Issue 4

1 -- 19Fábio Correia, Artur Mariano, Alberto Proença, Christian H. Bischof, Erik Agrell. Parallel Improved Schnorr-Euchner Enumeration SE++ on Shared and Distributed Memory Systems, With and Without Extreme Pruning
20 -- 40Enrico Carniani, Gianpiero Costantino, Francesco Marino, Fabio Martinelli, Paolo Mori. Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions
41 -- 64Enrico Carniani, Gianpiero Costantino, Francesco Marino, Fabio Martinelli, Paolo Mori. Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions

Volume 7, Issue 3

1 -- 21Sébastien Faye, Nicolas Louveton, Gabriela Gheorghe, Thomas Engel. A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data
22 -- 39Subhashree V. K., Tharini C.. A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data
40 -- 52Kyeonghwan Lim, Younsik Jeong, Seong Je Cho, Minkyu Park, Sangchul Han. An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks
53 -- 76Sumeet Thombre, Raihan Ul Islam, Karl Andersson, Mohammad Shahadat Hossain. IP based Wireless Sensor Networks: Performance Analysis using Simulations and Experiments
77 -- 98Hassan Sbeyti, Mohamad Malli, Khalid Al-Tahat, Ahmad Fadlallah, Mohamad Youssef. Scalable extensible middleware framework for context-aware mobile applications (SCAMMP)

Volume 7, Issue 2

1 -- 2Igor V. Kotenko. Guest Editorial: Advances in Secure Distributed and Network-Based Computing
3 -- 19Huihui Yang, Vladimir A. Oleshchuk, Andreas Prinz. Verifying Group Authentication Protocols by Scyther
20 -- 40István Hegedüs, Árpád Berta, Márk Jelasity. Robust Decentralized Differentially Private Stochastic Gradient Descent
41 -- 59Fabrizio Baiardi, Federico Tonelli, Lorenzo Isoni. Application Vulnerabilities in Risk Assessment and Management
60 -- 80Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin, Igor V. Kotenko. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System

Volume 7, Issue 1

1 -- 22Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan. A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers
23 -- 38Tomotaka Kimura, Chinthaka Premachandra. Optimal Relay Node Selection in Two-Hop Routing for Intermittently Connected MANETs
39 -- 57Chika Eze, Jason R. C. Nurse, Jassim Happa. Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices
58 -- 78Maxim Kolomeec, Andrey Chechulin, Anton Pronoza, Igor V. Kotenko. Technique of Data Visualization: Example of Network Topology Display for Security Monitoring
79 -- 96Bharat K. Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, Pelin Angin. A Systematic Approach for Attack Analysis and Mitigation in V2V Networks
97 -- 117William Casey, Jose Andre Morales, Bud Mishra. Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model