default search action
Journal of Cyber Security and Mobility, Volume 4
Volume 4, Number 1, January 2015
- Kyriakos Manousakis, Sharanya Eswaran, David Shur, Gaurav Naik, Pavan Kantharaju, William C. Regli, Brian Adamson:
Torrent-Based Dissemination in Infrastructure-Less Wireless Networks. 1-22 - Vandana Milind Rohokale, Ramjee Prasad:
Cyber Security for IntelligentWorld with Internet of Things and Machine to Machine Communication. 23-40 - Tommi Meskanen, Valtteri Niemi, Noora Nieminen:
How to Use Garbling for Privacy Preserving Electronic Surveillance Services. 41-64 - Mohamed Abomhara, Geir M. Køien:
Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks. 65-88
Volume 4, Numbers 2-3, April/July 2015
- Matija Stevanovic, Jens Myrup Pedersen:
On the use of machine learning for identifying botnet network traffic. 1-32 - Greig Paul, James Irvine:
Practical Attacks on Security and Privacy Through a Low-Cost Android Device. 33-52 - Goldendeep Kaur, Jyoteesh Malhotra:
Comparative Investigation of ARP Poisoning mitigation techniques using Standard Testbed for Wireless Networks. 53-64 - Kristian Herland, Heikki Hämmäinen, Pekka Kekolahti:
Information Security Risk Assessment of Smartphones using Bayesian Networks. 65-86 - Ezer Osei Yeboah-Boateng, Elvis Akwa-Bonsu:
Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-crimes. 87-104 - Kwame Simpe Ofori, Otu Larbi-Siaw, Eli Emmanuel Fianu, Richard Eddie Gladjah, Ezer Osei Yeboah-Boateng:
Factors Influencing the Continuance Use of Mobile Social Media: The effect of Privacy Concerns. 105-124 - Vedashree Takalkar, Parikshit N. Mahalle:
Confidentiality in Online Social Networks; ATrust-based Approach. 125-144
Volume 4, Number 4, October 2015
- Rayyan Sayeed, Ray Miller, Zulfiquar Sayeed:
Throughput Prediction Across Heterogeneous Boundaries in Wireless Communications. 233-258 - Ziqian Dong, Zheng Wang, Wen Xie, Obinna Emelumadu, Chuan-Bi Lin, Roberto Rojas-Cessa:
An Experimental Study of SmallWorld Network Models for Wireless Networks. 259-278 - Shweta Jain, Christian Barona, Nicholas Madamopoulos:
Modelling Wireless Propagation for Indoor Localization. 279-304 - Harshvardhan P. Joshi, Aravindhan Dhanasekaran, Rudra Dutta:
Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of ROP Attacks. 305-324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.