Network Size Estimation in Opportunistic Mobile Networks: The Mark-Recapture MethodCybsersecurity Issues in RoboticsBot detection by friends graph in social networksExploiting QR Code Error Correction for Digital Image WatermarkingSecuring Opportunistic Networks: An Encounter-based Trust-driven Barter MechanismImpact Analysis of Training Data Characteristics for Phishing Email ClassificationA Bayesian approach to insider threat detectionUse of Expert Judgments to Inform Bayesian Models of Insider Threat RiskGuest Editorial: Special Issue on Advances in Insider Threat DetectionConflict Identification and Resolution for Trust-Related Requirements Elicitation A Goal Modeling Approach