


default search action
Journal of Cyber Security and Mobility, Volume 3
Volume 3, Number 1, January 2014
- George Markowsky:
The Sad History of Random Bits. 1-24 - Igor V. Kotenko
, Andrey Chechulin
:
Fast Network Attack Modeling and Security Evaluation based on Attack Graphs. 27-46 - Peter Jurnecka, Petr Hanácek
, Matej Kacic:
Code Search API, Base of Parallel Code Refactoring System For Safety Standards Compliance. 47-66 - Stefan Balogh
:
Memory Acquisition by Using Network Card. 65-76 - Oksana V. Pomorova
, Dmytro O. Ivanchyshyn:
Making Static Code Analysis More Efficient. 77-88
Volume 3, Number 2, April 2014
- Abdullah J. Alzahrani, Nataliav Stakhanoa, Hugo Gonzalez
, Ali A. Ghorbani:
Characterizing Evaluation Practicesof Intrusion Detection Methodsfor Smartphones. 89-132 - Stephan Kornemann, Steffen Ortmann, Peter Langendörfer
, Alexandros G. Fragkiadakis
:
Enabling Wireless Sensor Nodes for Self-Contained Jamming Detection. 133-158 - Jill Jermyn, Gabriel Salles-Loustau, Saman A. Zonouz:
An Analysis of DoS Attack Strategies Against the LTE RAN. 159-180 - Arati Baliga, Jeffrey Bickford, Neil Daswani:
Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware. 181-212 - Marc Lichtman, Jeffrey H. Reed:
Reinforcement Learning for Reactive Jamming Mitigation. 213-230
Volume 3, Number 3, July 2014
- Cody Miller, Dae Glendowne, David A. Dampier, Kendall Blaylock:
Forensicloud: An Architecture for Digital Forensic Analysis in the Cloud. 231-262 - Ju Shen, Jianjun Yang, Sami Taha-abusneineh, Bryson Payne
, Markus A. Hitz:
Structure Preserving Large Imagery Reconstruction. 263-288 - Yue Zhao, Kenji Yoshigoe, Mengjun Xie
, Suijian Zhou, Remzi Seker, Jiang Bian:
Evaluation and Analysis of Distributed Graph-Parallel Processing Frameworks. 289-316 - Lava Al-Doski, Seshadri Mohan
:
A Cached Registration Scheme for IP Multimedia Subsystem (IMS). 317-338 - Ashley L. Podhradsky
, Larry J. LeBlanc, Michael R. Bartolacci:
Personal Denial of Service Attacks (PDOS) and Online Misbehavior: The Need for Cyber Ethics and Information Security Education on University Campuses. 339-356
Volume 3, Number 4, October 2014
- Lars R. Knudsen:
Dynamic Encryption. 357-370 - Josef Noll, Iñaki Garitano
, Seraj Fayyad
, Erik Åsberg, Habtamu Abie:
Measurable Security, Privacy and Dependability in Smart Grids. 371-398 - Izabella Lokshina:
Study on Estimating Buffer Overflow Probabilities in High-Speed Communication Networks. 399-426

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.