{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:25:58Z","timestamp":1738819558624,"version":"3.37.0"},"reference-count":8,"publisher":"Academy Publisher","issue":"11","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.11.2875-2877","type":"journal-article","created":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T01:56:03Z","timestamp":1414979763000},"source":"Crossref","is-referenced-by-count":0,"title":["Guest Editorial"],"prefix":"10.4304","volume":"9","author":[{"given":"Jemal H.","family":"Abawajy","sequence":"first","affiliation":[]},{"given":"Rafiqul","family":"Islam","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[1969,12,31]]},"reference":[{"issue":"no. 11","key":"ref1","first-page":"2878","article-title":"A Hybrid Wrapper-Filter Approach for Malware Detection","volume":"9","author":"Alazab","year":"2014","unstructured":"[1] Mamoun Alazab, Shamsul Huda, Jemal Abawajy, Rafiqul Islam, John Yearwood and Sitalakshmi Venkatraman, A Hybrid Wrapper-Filter Approach for Malware Detection, Journal of Networks, vol. 9, no. 11, pp. 2878-2891, 2014.","journal-title":"Journal of Networks"},{"issue":"no. 11","key":"ref2","first-page":"2892","article-title":"Pollution-Free Regenerating Codes With Fast Reconstruction Verification for Verifiable Cloud Storage","volume":"9","author":"Corena","year":"2014","unstructured":"[2] Juan C. Corena and Tomoaki Ohtsuki, Pollution-Free Regenerating Codes With Fast Reconstruction Verification for Verifiable Cloud Storage, Journal of Networks, vol. 9, no. 11, pp. 2892-2904, 2014.","journal-title":"Journal of Networks"},{"issue":"no. 11","key":"ref3","first-page":"2905","article-title":"Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework","volume":"9","author":"Kajiwara","year":"2014","unstructured":"[3] Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimoto, Yoshiaki Hori and Kouichi Sakurai, Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework, Journal of Networks, vol. 9, no. 11, pp. 2905-2913, 2014.","journal-title":"Journal of Networks"},{"issue":"no. 11","key":"ref4","first-page":"2914","article-title":"Anomaly Detection in Wireless Sensor Network","volume":"9","author":"Mamun","year":"2014","unstructured":"[4] Quazi Mamun, Rafiqul Islam, and Mohammed Kaosar, Anomaly Detection in Wireless Sensor Network, Journal of Networks, vol. 9, no. 11, pp. 2914-2924, 2014.","journal-title":"Journal of Networks"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.9.8.2089-2098"},{"issue":"no. 11","key":"ref6","first-page":"2925","article-title":"Securing a Smart Anti-counterfeit Web Application","volume":"9","author":"Chowdhury","year":"2014","unstructured":"[6] Belal Chowdhury and Morshed Chowdhury, Securing a Smart Anti-counterfeit Web Application, Journal of Networks, vol. 9, no. 11, pp. 2925-2933, 2014.","journal-title":"Journal of Networks"},{"issue":"no. 11","key":"ref7","first-page":"2934","article-title":"A Novel Approach for the Remedial of Security Concerns in a Cloud-based E-learning System","volume":"9","author":"Md","year":"2014","unstructured":"[7] Md Anwar Hossain Masud, Xiaodi Huang and Md Rafiqul Islam, A Novel Approach for the Remedial of Security Concerns in a Cloud-based E-learning System, Journal of Networks, vol. 9, no. 11, pp. 2934-2942, 2014.","journal-title":"Journal of Networks"},{"issue":"no. 11","key":"ref8","first-page":"2943","article-title":"Simple Power Analysis Attacks for Energy Evaluation of Elliptic Curve Cryptography Operations","volume":"9","author":"Ghanmy","year":"2014","unstructured":"[8] Nabil Ghanmy, Lamia Chaarifourat and Lotfi Kamoun, Simple Power Analysis Attacks for Energy Evaluation of Elliptic Curve Cryptography Operations, Journal of Networks, vol. 9, no. 11, pp. 2943-2950, 2014.","journal-title":"Journal of Networks"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:08:26Z","timestamp":1738775306000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1969,12,31]]},"references-count":8,"journal-issue":{"issue":"11","published-online":{"date-parts":[[1969,12,31]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.11.2875-2877","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[1969,12,31]]}}}