Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human BehaviourEditorialImproved Group Key Agreement for Emergency Cognitive Radio Mobile Ad hoc NetworksTopological Broadcasting Using Parameter Sensitivity-Based Logical Proximity Graphs in Coordinated Ground-Flying Ad Hoc NetworksReal Experience with IPv6 Communications in HighwaysA Survey of Android Security Threats and DefensesEditorialPrivacy Enhancing Factors in People-Nearby ApplicationsA Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETsSecuring mobile devices: malware mitigation methods