Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jowua/jowua7.bht:"
@article{DBLP:journals/jowua/BaiardiTI16, author = {Fabrizio Baiardi and Federico Tonelli and Lorenzo Isoni}, title = {Application Vulnerabilities in Risk Assessment and Management}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {41--59}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.041}, doi = {10.22667/JOWUA.2016.06.31.041}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BaiardiTI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BhargavaJMA16, author = {Bharat K. Bhargava and Amber M. Johnson and Gisele Izera Munyengabe and Pelin Angin}, title = {A Systematic Approach for Attack Analysis and Mitigation in {V2V} Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {79--96}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.079}, doi = {10.22667/JOWUA.2016.03.31.079}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BhargavaJMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CarnianiCMMM16, author = {Enrico Carniani and Gianpiero Costantino and Francesco Marino and Fabio Martinelli and Paolo Mori}, title = {Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {4}, pages = {20--40}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.12.31.020}, doi = {10.22667/JOWUA.2016.12.31.020}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CarnianiCMMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CarnianiCMMM16a, author = {Borja Bordel S{\'{a}}nchez and Ram{\'{o}}n Alcarria and Diego S{\'{a}}nchez de Rivera and {\'{A}}lvaro S{\'{a}}nchez{-}Picot}, title = {Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {4}, pages = {41--64}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.12.31.041}, doi = {10.22667/JOWUA.2016.12.31.041}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CarnianiCMMM16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CaseyMM16, author = {William Casey and Jose Andre Morales and Bud Mishra}, title = {Threats from Inside: Dynamic Utility (Mis)Alignments in an Agent based Model}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {97--117}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.097}, doi = {10.22667/JOWUA.2016.03.31.097}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CaseyMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChakrabortyRR16, author = {Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan}, title = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {1--22}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.001}, doi = {10.22667/JOWUA.2016.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChakrabortyRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CorreiaMPBA16, author = {F{\'{a}}bio Correia and Artur Mariano and Alberto Proen{\c{c}}a and Christian H. Bischof and Erik Agrell}, title = {Parallel Improved Schnorr-Euchner Enumeration {SE++} on Shared and Distributed Memory Systems, With and Without Extreme Pruning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {4}, pages = {1--19}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.12.31.001}, doi = {10.22667/JOWUA.2016.12.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CorreiaMPBA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/DesnitskyLCK16, author = {Vasily Desnitsky and Dmitry Levshun and Andrey Chechulin and Igor V. Kotenko}, title = {Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {60--80}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.060}, doi = {10.22667/JOWUA.2016.06.31.060}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/DesnitskyLCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EzeNH16, author = {Chika Eze and Jason R. C. Nurse and Jassim Happa}, title = {Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {39--57}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.039}, doi = {10.22667/JOWUA.2016.03.31.039}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EzeNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FayeLGE16, author = {S{\'{e}}bastien Faye and Nicolas Louveton and Gabriela Gheorghe and Thomas Engel}, title = {A Two-Level Approach to Characterizing Human Activities from Wearable Sensor Data}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {1--21}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.001}, doi = {10.22667/JOWUA.2016.09.31.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FayeLGE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HegedusBJ16, author = {Istv{\'{a}}n Heged{\"{u}}s and {\'{A}}rp{\'{a}}d Berta and M{\'{a}}rk Jelasity}, title = {Robust Decentralized Differentially Private Stochastic Gradient Descent}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {20--40}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.020}, doi = {10.22667/JOWUA.2016.06.31.020}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HegedusBJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KC16, author = {Subhashree V. K. and Tharini C.}, title = {Real-Time Implementation of Locality Sensitive Hashing Using {NI} {WSN} and LabVIEW for Outlier Detection in Wireless Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {22--39}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.022}, doi = {10.22667/JOWUA.2016.09.31.022}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KimuraP16, author = {Tomotaka Kimura and Chinthaka Premachandra}, title = {Optimal Relay Node Selection in Two-Hop Routing for Intermittently Connected MANETs}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {23--38}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.023}, doi = {10.22667/JOWUA.2016.03.31.023}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KimuraP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KolomeecCPK16, author = {Maxim Kolomeec and Andrey Chechulin and Anton Pronoza and Igor V. Kotenko}, title = {Technique of Data Visualization: Example of Network Topology Display for Security Monitoring}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {1}, pages = {58--78}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.03.31.058}, doi = {10.22667/JOWUA.2016.03.31.058}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KolomeecCPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kotenko16, author = {Igor V. Kotenko}, title = {Guest Editorial: Advances in Secure Distributed and Network-Based Computing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {1--2}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.001}, doi = {10.22667/JOWUA.2016.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kotenko16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LimJCPH16, author = {Kyeonghwan Lim and Younsik Jeong and Seong{-}je Cho and Minkyu Park and Sangchul Han}, title = {An Android Application Protection Scheme against Dynamic Reverse Engineering Attacks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {40--52}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.040}, doi = {10.22667/JOWUA.2016.09.31.040}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LimJCPH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SbeytiMAFY16, author = {Hassan Sbeyti and Mohamad Malli and Khalid Suliman Al{-}Tahat and Ahmad Fadlallah and Mohamad Youssef}, title = {Scalable extensible middleware framework for context-aware mobile applications {(SCAMMP)}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {77--98}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.077}, doi = {10.22667/JOWUA.2016.09.31.077}, timestamp = {Fri, 19 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SbeytiMAFY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ThombreIAH16, author = {Sumeet Thombre and Raihan Ul Islam and Karl Andersson and Mohammad Shahadat Hossain}, title = {{IP} based Wireless Sensor Networks: Performance Analysis using Simulations and Experiments}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {3}, pages = {53--76}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.09.31.053}, doi = {10.22667/JOWUA.2016.09.31.053}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ThombreIAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YangOP16, author = {Huihui Yang and Vladimir A. Oleshchuk and Andreas Prinz}, title = {Verifying Group Authentication Protocols by Scyther}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {7}, number = {2}, pages = {3--19}, year = {2016}, url = {https://doi.org/10.22667/JOWUA.2016.06.31.003}, doi = {10.22667/JOWUA.2016.06.31.003}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YangOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.