Journal: JoWUA

Volume 8, Issue 4

1 -- 18Abhishta, Reinoud Joosten, Lambert J. M. Nieuwenhuis. Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices
19 -- 36Vincenzo Conti, Leonardo Rundo, Carmelo Militello, Giancarlo Mauri, Salvatore Vitabile. Resource-Efficient Hardware Implementation of a Neural-based Node for Automatic Fingerprint Classification
37 -- 59Eyad Taqieddin, Fahed Awad, Hani Ahmad. Location-Aware and Mobility-Based Performance Optimization for Wireless Sensor Networks
60 -- 74Igor V. Kotenko, Igor Saenko, Alexey Kushnerevich. Parallel big data processing system for security monitoring in Internet of Things networks

Volume 8, Issue 3

1 -- 17Kazy Noor E. Alam Siddiquee, Karl Andersson, Faria Farjana Khan, Mohammad Shahadat Hossain. A Scalable and Secure MANET for an i-Voting System
18 -- 35Yang-Wai Chow, Willy Susilo, James G. Phillips, Joonsang Baek, Elena Vlahu-Gjorgievska. Video Games and Virtual Reality as Persuasive Technologies for Health Care: An Overview
36 -- 56Amjed Majeed, Tanveer A. Zia. Multi-Layer Network Architecture for Supporting Multiple Applications in Wireless Sensor Networks
57 -- 66Noriki Uchida, Shoma Takeuchi, Tomoyuki Ishida, Yoshitaka Shibata. Mobile Traffic Accident Prevention System based on Chronological Changes of Wireless Signals and Sensors

Volume 8, Issue 2

1 -- 18Ryo Watanabe, Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa. A Simply Energy-efficient Migration Algorithm of Processes with Virtual Machines in Server Clusters
19 -- 43Elena Torroglosa-García, Antonio F. Skarmeta-Gómez. Towards Interoperabilty in Identity Federation Systems
44 -- 63Giovanni Pau 0002, Mario Collotta, Salvatore Tirrito, Riccardo Caponetto. An Innovative Approach for the Management of Cross-Coupling Interference in Street Lighting Networks
64 -- 78Meriem Guerar, Alessio Merlo, Mauro Migliardi. ClickPattern: A Pattern Lock System Resilient to Smudge and Side-channel Attacks

Volume 8, Issue 1

1 -- 3Jason R. C. Nurse, Elisa Bertino. Guest Editorial: Insider Threat Solutions - Moving from Concept to Reality
4 -- 25Peter Mell, James M. Shook, Richard E. Harang, Serban I. Gavrila. Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems
26 -- 43Ioannis Agrafiotis, Arnau Erola, Michael Goldsmith, Sadie Creese. Formalising Policies for Insider-threat Detection: A Tripwire Grammar
44 -- 78Florian Kammüller, Manfred Kerber, Christian W. Probst. Insider Threats and Auctions: Formalization, Mechanized Proof, and Code Generation
79 -- 100Fulvio Valenza, Tao Su, Serena Spinoso, Antonio Lioy, Riccardo Sisto, Marco Vallini. A formal approach for network security policy validation