Journal: JoWUA

Volume 9, Issue 4

1 -- 25Clémentine Gritti, Melek Önen, Refik Molva, Willy Susilo, Thomas Plantard. Device Identification and Personal Data Attestation in Networks
26 -- 40Damjan Buhov, Julian Rauchberger, Sebastian Schrittwieser. FLASH: Is the 20th Century Hero Really Gone? Large-Scale Evaluation on Flash Usage & Its Security and Privacy Implications
41 -- 70Gaurav Choudhary, Jiyoon Kim, Vishal Sharma. Security of 5G-Mobile Backhaul Networks: A Survey
71 -- 102Cheyenne Atapour, Ioannis Agrafiotis, Sadie Creese. Modeling Advanced Persistent Threats to enhance anomaly detection techniques

Volume 9, Issue 3

1 -- 10Guanglei Li, Huachun Zhou, Guanwen Li, Bohao Feng, Hyo-Beom Ahn. Towards Traffic-Driven VNF Scaling: A Preliminary Case Study based on Container
11 -- 24Kazy Noor E. Alam Siddiquee, Karl Andersson, Francisco Javier Moreno Arrebola, Zainal Abedin, Mohammad Shahadat Hossain. Estimation of Signal Coverage and Localization in Wi-Fi Networks with AODV and OLSR
25 -- 38Mookyu Park, Junwoo Seo, Jaehyeok Han, Haengrok Oh, Kyungho Lee. Situational Awareness Framework for Threat Intelligence Measurement of Android Malware
39 -- 49Jongsu Lim, Yonggu Shin, Sunjun Lee, Kyuho Kim, Jeong Hyun Yi. Survey of Dynamic Anti-Analysis Schemes for Mobile Malware
50 -- 61Seong Je Cho, Kyeonghwan Lim, Jungkyu Han, Byoung-chir Kim, Minkyu Park, Sangchul Han. Open-Source Android App Detection considering the Effects of Code Obfuscation

Volume 9, Issue 2

1 -- 25Alessio Viticchié, Cataldo Basile, Fulvio Valenza, Antonio Lioy. On the impossibility of effectively using likely-invariants for software attestation purposes
26 -- 41Mohammad Shahadat Hossain, Abdullah Al Hasan, Sunanda Guha, Karl Andersson. A Belief Rule Based Expert System to Predict Earthquake under Uncertainty
42 -- 56Mohammad Shahriar Rahman, Anirban Basu, Toru Nakamura, Haruo Takasaki, Shinsaku Kiyomoto. PPM: Privacy Policy Manager for Home Energy Management System
57 -- 73Igor V. Kotenko, Maxim Kolomeets, Andrey Chechulin, Yannick Chevalier. A visual analytics approach for the cyber forensics based on different views of the network traffic

Volume 9, Issue 1

1 -- 3Igor V. Kotenko. Guest Editorial: Managing Insider Security Threats
4 -- 29Pablo Moriano, Jared Pendleton, Steven Rich, L. Jean Camp. Stopping the Insider at the Gates: Protecting Organizational Assets through Graph Mining
30 -- 53Alexander Hartl, Robert Annessi, Tanja Zseby. Subliminal Channels in High-Speed Signatures
54 -- 85Athul Harilal, Flavio Toffalini, Ivan Homoliak, John Henry Castellanos, Juan Guarnizo, Soumik Mondal, Martín Ochoa. The Wolf Of SUTD (TWOS): A Dataset of Malicious Insider Threat Behavior Based on a Gamified Competition
86 -- 99Nir Drucker, Shay Gueron. Achieving trustworthy Homomorphic Encryption by combining it with a Trusted Execution Environment