Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

ISSNs: 2093-5374

Local database

Journal

  1. 2011
  2. Published

    Insiders and Insider Threats : An Overview of Definitions and Mitigation Techniques. / Hunker, Jeffrey; Probst, Christian W.

    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 2, No. 1, 2011, p. 4-27.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

  3. 2010
  4. Published

    A Generic Role Based Access Control Model for Wind Power Systems. / Nagarajan, Anand; Jensen, Christian D.

    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 1, No. 4, 2010, p. 35-49.

    Publication: Research - peer-reviewJournal article – Annual report year: 2010

  5. Published

    Extending Security-by-Contract with Quantitative Trust on Mobile Devices. / Costa, Gabriele; Lazouski, Aliaksandr; Martinelli, Fabio; Matteucci, Ilaria; Issarny, Valerie; Saadi, Rachid; Dragoni, Nicola; Massacci, Fabio.

    In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 1, No. 4, 2010, p. 75-91.

    Publication: Research - peer-reviewJournal article – Annual report year: 2011

Download list:
Download as PDF
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBEHarvardMLAStandardVancouverShortLong
Word