Guest Editorial: Advances in Secure Distributed and Network-Based ComputingThreats from Inside: Dynamic Utility (Mis)Alignments in an Agent based ModelA Systematic Approach for Attack Analysis and Mitigation in V2V NetworksTechnique of Data Visualization: Example of Network Topology Display for Security MonitoringUsing Visualizations to Enhance Users’ Understanding of App Activities on Android DevicesOptimal Relay Node Selection in Two-Hop Routing for Intermittently Connected MANETsA Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-ScrapersEffects of Code Obfuscation on Android App Similarity AnalysisTowards a Cyber Ontology for Insider Threats in the Financial SectorSupervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data