default search action
Journal of Cyber Security and Mobility, Volume 6
Volume 6, Number 1, January 2017
- Jamison Rose, Yudong Liu, Ahmed Awad:
Biometric Authentication Using Mouseand Eye Movement Data. 1-16 - Khalid Shahbar, Nur Zincir-Heywood:
Packet Momentum for Identificationof Anonymity Networks. 27-56 - Asma Elmangoush, Thomas Magedanz:
Adaptable Protocol Selection for Reliable Smart City Services. 57-76 - Oliver Gasser, Quirin Scheitle, Benedikt Rudolph, Carl Denis, Nadja Schricker, Georg Carle:
The Amplification Threat Posed by PubliclyReachable BACnet Devices. 77-104
Volume 6, Number 2, April 2017
- Steffen Wendzel, Wojciech Mazurczyk, Georg Haas:
Steganography for Cyber-physicalSystems. 105-126 - Paolo Palmieri, Luca Calderoni, Dario Maio:
An Anonymous Inter-Network RoutingProtocol for the Internet of Things. 127-146 - Jörg Keller, Gabriele Spenger, Steffen Wendzel:
Enhanced Ant Colony-Inspired ParallelAlgorithm to Improve Cryptographic PRNGs. 147-170 - Elike Hodo, Xavier J. A. Bellekens, Ephraim Iorkyase, Andrew W. Hamilton, Christos Tachtatzis, Robert C. Atkinson:
Machine Learning Approach for Detectionof nonTor Traffic. 171-194 - Xue Ying Shi, Natalija Vlajic, Hamzeh Roumani, Pooria Madani:
Rethinking the Use of Resource Hints in HTML5: Is Faster Always Better!? 195-226
Volume 6, Number 3, July 2017
- Zhenyan Liu, Yifei Zeng, Yida Yan, Pengfei Zhang, Yong Wang:
Machine Learning for Analyzing Malware. 227-244 - Félix Iglesias Vázquez, Robert Annessi, Tanja Zseby:
Analytic Study of Features for the Detection of Covert Timing Channels in NetworkTraffic. 225-270 - Ahmad M. K. Nasser, Di Ma, Priya Muralidharan:
An Approach for Building Security Resilience in AUTOSAR Based Safety Critical Systems. 271-304 - Dang Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma:
Random Number Generators Basedon EEG Non-linear and ChaoticCharacteristics. 305-338 - Masoomeh Sepehri, Alberto Trombetta, Maryam Sepehri:
Secure Data Sharing in Cloud Usingan Efficient Inner-Product ProxyRe-Encryption Scheme. 339-378
Volume 6, Number 4, October 2017
- B. Partibane, Rajakani Kalidoss, R. Karthipan:
Security Improvement in Next GenerationWireless System by Interleaverin Transceiver Structures. 379-396 - Ari Moesriami Barmawi, Deden Pradeka:
Information Hiding Based on Histogramand Pixel Pattern. 397-426 - Avinash Srinivasan, Hunter Dong:
SURE-FIT - SecURE and AdaptiveFramework for Information Hidingwith Fault-Tolerance. 427-456
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.