Search dblp for Publications

export results for "toc:db/journals/jowua/jowua7.bht:"

 download as .bib file

@article{DBLP:journals/jowua/BaiardiTI16,
  author       = {Fabrizio Baiardi and
                  Federico Tonelli and
                  Lorenzo Isoni},
  title        = {Application Vulnerabilities in Risk Assessment and Management},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {41--59},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.041},
  doi          = {10.22667/JOWUA.2016.06.31.041},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BaiardiTI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BhargavaJMA16,
  author       = {Bharat K. Bhargava and
                  Amber M. Johnson and
                  Gisele Izera Munyengabe and
                  Pelin Angin},
  title        = {A Systematic Approach for Attack Analysis and Mitigation in {V2V}
                  Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {79--96},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.079},
  doi          = {10.22667/JOWUA.2016.03.31.079},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BhargavaJMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CarnianiCMMM16,
  author       = {Enrico Carniani and
                  Gianpiero Costantino and
                  Francesco Marino and
                  Fabio Martinelli and
                  Paolo Mori},
  title        = {Enhancing Video Surveillance with Usage Control and Privacy-Preserving
                  Solutions},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {4},
  pages        = {20--40},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.12.31.020},
  doi          = {10.22667/JOWUA.2016.12.31.020},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CarnianiCMMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CarnianiCMMM16a,
  author       = {Borja Bordel S{\'{a}}nchez and
                  Ram{\'{o}}n Alcarria and
                  Diego S{\'{a}}nchez de Rivera and
                  {\'{A}}lvaro S{\'{a}}nchez{-}Picot},
  title        = {Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical
                  Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {4},
  pages        = {41--64},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.12.31.041},
  doi          = {10.22667/JOWUA.2016.12.31.041},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CarnianiCMMM16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CaseyMM16,
  author       = {William Casey and
                  Jose Andre Morales and
                  Bud Mishra},
  title        = {Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based
                  Model},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {97--117},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.097},
  doi          = {10.22667/JOWUA.2016.03.31.097},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CaseyMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChakrabortyRR16,
  author       = {Suvradip Chakraborty and
                  Srinivasan Raghuraman and
                  C. Pandu Rangan},
  title        = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange
                  Protocol Secure Against Memory-Scrapers},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {1--22},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.001},
  doi          = {10.22667/JOWUA.2016.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChakrabortyRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CorreiaMPBA16,
  author       = {F{\'{a}}bio Correia and
                  Artur Mariano and
                  Alberto Proen{\c{c}}a and
                  Christian H. Bischof and
                  Erik Agrell},
  title        = {Parallel Improved Schnorr-Euchner Enumeration {SE++} on Shared and
                  Distributed Memory Systems, With and Without Extreme Pruning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {4},
  pages        = {1--19},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.12.31.001},
  doi          = {10.22667/JOWUA.2016.12.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CorreiaMPBA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/DesnitskyLCK16,
  author       = {Vasily Desnitsky and
                  Dmitry Levshun and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Design Technique for Secure Embedded Devices: Application for Creation
                  of Integrated Cyber-Physical Security System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {60--80},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.060},
  doi          = {10.22667/JOWUA.2016.06.31.060},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/DesnitskyLCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EzeNH16,
  author       = {Chika Eze and
                  Jason R. C. Nurse and
                  Jassim Happa},
  title        = {Using Visualizations to Enhance Users' Understanding of App Activities
                  on Android Devices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {39--57},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.039},
  doi          = {10.22667/JOWUA.2016.03.31.039},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EzeNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FayeLGE16,
  author       = {S{\'{e}}bastien Faye and
                  Nicolas Louveton and
                  Gabriela Gheorghe and
                  Thomas Engel},
  title        = {A Two-Level Approach to Characterizing Human Activities from Wearable
                  Sensor Data},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {1--21},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.001},
  doi          = {10.22667/JOWUA.2016.09.31.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FayeLGE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HegedusBJ16,
  author       = {Istv{\'{a}}n Heged{\"{u}}s and
                  {\'{A}}rp{\'{a}}d Berta and
                  M{\'{a}}rk Jelasity},
  title        = {Robust Decentralized Differentially Private Stochastic Gradient Descent},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {20--40},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.020},
  doi          = {10.22667/JOWUA.2016.06.31.020},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HegedusBJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KC16,
  author       = {Subhashree V. K. and
                  Tharini C.},
  title        = {Real-Time Implementation of Locality Sensitive Hashing Using {NI}
                  {WSN} and LabVIEW for Outlier Detection in Wireless Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {22--39},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.022},
  doi          = {10.22667/JOWUA.2016.09.31.022},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KimuraP16,
  author       = {Tomotaka Kimura and
                  Chinthaka Premachandra},
  title        = {Optimal Relay Node Selection in Two-Hop Routing for Intermittently
                  Connected MANETs},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {23--38},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.023},
  doi          = {10.22667/JOWUA.2016.03.31.023},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KimuraP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KolomeecCPK16,
  author       = {Maxim Kolomeec and
                  Andrey Chechulin and
                  Anton Pronoza and
                  Igor V. Kotenko},
  title        = {Technique of Data Visualization: Example of Network Topology Display
                  for Security Monitoring},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {1},
  pages        = {58--78},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.03.31.058},
  doi          = {10.22667/JOWUA.2016.03.31.058},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KolomeecCPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kotenko16,
  author       = {Igor V. Kotenko},
  title        = {Guest Editorial: Advances in Secure Distributed and Network-Based
                  Computing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {1--2},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.001},
  doi          = {10.22667/JOWUA.2016.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kotenko16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LimJCPH16,
  author       = {Kyeonghwan Lim and
                  Younsik Jeong and
                  Seong{-}je Cho and
                  Minkyu Park and
                  Sangchul Han},
  title        = {An Android Application Protection Scheme against Dynamic Reverse Engineering
                  Attacks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {40--52},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.040},
  doi          = {10.22667/JOWUA.2016.09.31.040},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LimJCPH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SbeytiMAFY16,
  author       = {Hassan Sbeyti and
                  Mohamad Malli and
                  Khalid Suliman Al{-}Tahat and
                  Ahmad Fadlallah and
                  Mohamad Youssef},
  title        = {Scalable extensible middleware framework for context-aware mobile
                  applications {(SCAMMP)}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {77--98},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.077},
  doi          = {10.22667/JOWUA.2016.09.31.077},
  timestamp    = {Fri, 19 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SbeytiMAFY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ThombreIAH16,
  author       = {Sumeet Thombre and
                  Raihan Ul Islam and
                  Karl Andersson and
                  Mohammad Shahadat Hossain},
  title        = {{IP} based Wireless Sensor Networks: Performance Analysis using Simulations
                  and Experiments},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {3},
  pages        = {53--76},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.09.31.053},
  doi          = {10.22667/JOWUA.2016.09.31.053},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ThombreIAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YangOP16,
  author       = {Huihui Yang and
                  Vladimir A. Oleshchuk and
                  Andreas Prinz},
  title        = {Verifying Group Authentication Protocols by Scyther},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {7},
  number       = {2},
  pages        = {3--19},
  year         = {2016},
  url          = {https://doi.org/10.22667/JOWUA.2016.06.31.003},
  doi          = {10.22667/JOWUA.2016.06.31.003},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YangOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics