Volume 6, Number 4 (December 2015) BibTex

  • pp. 1-2 (10.22670/JOWUA.2015.12.31.001)
  • Editorial
  • Ilsun You

  • pp. 3-46 (10.22670/JOWUA.2015.12.31.003)
  • Ben-ware: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software
  • Andrew Stephen McGough, Budi Arief, Carl Gamble, David Wall, John Brennan, John Fitzgerald, Aad van Moorsel,
    Sujeewa Alwis, Georgios Theodoropoulos, and Ed Ruck-Keene
    [Abstract]
  • pp. 47-63 (10.22670/JOWUA.2015.12.31.047)
  • Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data
    Gaurang Gavai, Kumar Sricharan, Dave Gunning, John Hanley, Mudita Singhal, and Rob Rolleston 
  • [Abstract]
  • pp. 64-85 (10.22670/JOWUA.2015.12.31.064)
  • Towards a Cyber Ontology for Insider Threats in the Financial Sector
    Gokhan Kul and Shambhu Upadhyaya
    [Abstract]
  • pp. 86-98 (10.22670/JOWUA.2015.12.31.086)
  • Effects of Code Obfuscation on  Android App Similarity Analysis
    Jonghwa Park, Hyojung Kim, Younsik Jeong, Seong-je Cho, Sangchul Han, and Minkyu Park
    [Abstract]

[Return to Archives]