default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 11
Volume 11, Number 1, March 2020
- Ilsun You:
2020 Letter from the Editor-in-Chief. 1 - Ivan Kholod, Andrey Shorov, Sergei Gorlatch:
Efficient Distribution and Processing of Data for Parallelizing Data Mining in Mobile Clouds. 2-17 - Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa:
On the Invisibility and Anonymity of Undeniable Signature Schemes. 18-34 - Davide Caputo, Luca Verderame, Andrea Ranieri, Alessio Merlo, Luca Caviglione:
Fine-hearing Google Home: why silence will not protect your privacy. 35-53 - Valentim Realinho, Teresa Romão, A. Eduardo Dias:
A Language for the End-user Development of Mobile Context-Aware Applications. 54-80 - Lamri Laouamer, Jalel Euchi, Salah Zidi, Alaeddine Mihoub:
Image-to-Tree to Select Significant Blocks for Image Watermarking. 81-115
Volume 11, Number 2, June 2020
- Igor V. Kotenko:
Guest Editorial: Intelligent Distributed Computing. 1-2 - Abhishta Abhishta, Wouter van Heeswijk, Marianne Junger, Lambert J. M. Nieuwenhuis, Reinoud Joosten:
Why would we get attacked? An analysis of attacker's aims behind DDoS attacks. 3-22 - Oleg V. Baranov, Nikolay V. Smirnov, Tatyana E. Smirnova, Yefim V. Zholobov:
Design of a quadrocopter with PID-controlled fail-safe algorithm. 23-33 - Diana Berbecaru, Antonio Lioy, Cesare Cameroni:
Supporting Authorize-then-Authenticate for Wi-Fi access based on an electronic identity infrastructure. 34-54 - Yulia A. Shichkina, Galina V. Kataeva, Yulia A. Irishina, Elizaveta S. Stanevich:
The use of mobile phones to monitor the status of patients with Parkinson's disease. 55-73 - Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh:
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key. 74-86 - Yaser M. Khamayseh, Wail Mardini, Monther Aldwairi, Hussein T. Mouftah:
On the Optimality of Route Selection in Grid Wireless Sensor Networks: Theory and Applications. 87-105 - Al-Hussein Hameed Jasim, Niclas Ögren, Dimitar Minovski, Karl Andersson:
Packet Probing Study to Assess Sustainability in Available Bandwidth Measurements: Case of High-Speed Cellular Networks. 106-125
Volume 11, Number 3, September 2020
- Antonio La Marra, Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Mina Sheikhalishahi:
D-BRIDEMAID: A Distributed Framework for Collaborative and Dynamic Analysis of Android Malware. 1-28 - Mohammad Newaj Jamil, Mohammad Shahadat Hossain, Raihan Ul Islam, Karl Andersson:
Technological Innovation Capability Evaluation of High-Tech Firms Using Conjunctive and Disjunctive Belief Rule-Based Expert System: A Comparative Study. 29-49 - Robert Bembenik, Krzysztof Falcman:
BLE Indoor Positioning System Using RSSI-based Trilateration. 50-69 - Ahmed M. Khedr, P. V. Pravija Raj, Amal Al Ali:
An Energy-Efficient Data Acquisition Technique for Hierarchical Cluster-Based Wireless Sensor Networks. 70-86 - Slawomir Nowaczewski, Wojciech Mazurczyk:
Securing Future Internet and 5G using Customer Edge Switching using DNSCrypt and DNSSEC. 87-106 - Birger Schacht, Peter Kieseberg:
An Analysis of 5 Million OpenPGP Keys. 107-140
Volume 11, Number 4, December 2020
- Naiwei Liu, Meng Yu, Wanyu Zang, Ravi S. Sandhu:
Cost and Effectiveness of TrustZone Defense and Side-Channel Attack on ARM Platform. 1-15 - Shing Ki Wong, Siu-Ming Yiu:
Location spoofing attack detection with pre-installed sensors in mobile devices. 16-30 - Clayton Johnson, Bishal Khadka, Ram B. Basnet, Tenzin Doleck:
Towards Detecting and Classifying Malicious URLs Using Deep Learning. 31-48 - G. S. Kasturi, Ansh Jain, Jagdeep Singh:
Detection and Classification of Radio Frequency Jamming Attacks using Machine learning. 49-62 - Myungseo Park, Soram Kim, Jongsung Kim:
Research on Note-Taking Apps with Security Features. 63-76 - Pelin Angin, Mohammad Hossein Anisi, Furkan Göksel, Ceren Gürsoy, Asaf Büyükgülcü:
AgriLoRa: A Digital Twin Framework for Smart Agriculture. 77-96
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.