|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 23 publication records. Showing 23 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Xiaodong Lin 0001, Ali A. Ghorbani 0001, Kui Ren 0001, Sencun Zhu, Aiqing Zhang (eds.) |
Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings |
ATCS/SePrIoT@SecureComm |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Sharmin Jahan, Mozammel Chowdhury, Rafiqul Islam 0002, Junaid Ahsenali Chaudhry |
Securing Healthcare Data Using Biometric Authentication. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ying Lin, Bo Li 0005 |
WebAD ^2 2 : A Cascading Model Based on Machine Learning for Web Attacks Detection. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Md Samsul Haque, Morshed U. Chowdhury |
A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV). |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Riyadh Abdmeziem, François Charoy |
Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Dustin Mink, William Bradley Glisson, Ryan Benton, Kim-Kwang Raymond Choo |
Manipulating the Five V's in the Next Generation Air Transportation System. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yeslam Al-Saggaf |
An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Sevil Sen, Ahmet Ilhan Aysan, John A. Clark |
SAFEDroid: Using Structural Features for Detecting Android Malwares. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chaz Vidal, Kim-Kwang Raymond Choo |
Situational Crime Prevention and the Mitigation of Cloud Computing Threats. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Erdal Ozkaya, Rafiqul Islam 0002 |
Privacy in Social Media. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Jafer, M. Arif Khan, Sabih ur Rehman, Tanveer A. Zia |
Exploring Secure Communication in VANET Broadcasting. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Wang 0014, Meilin Qin, Mengqi Chen, Chunfu Jia |
Hiding Fast Flux Botnet in Plain Email Sight. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Itzael Jiménez Aranda, Eleazar Aguirre Anaya, Raúl Acosta Bermejo, Ponciano Jorge Escamilla-Ambrosio |
Possible Keyloggers Without Implementing a Keyboard in Android. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Eirini Anthi, George Theodorakopoulos 0001 |
Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted? |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mozammel Chowdhury, Rafiqul Islam 0002, Junbin Gao |
Fast and Robust Biometric Authentication Scheme Using Human Ear. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maxwell G. Dondo |
Cyber Security Decision Support for Remediation in Automated Computer Network Defence. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Li Wang, Dinghao Wu |
SecControl: Bridging the Gap Between Security Tools and SDN Controllers. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Cory Smith, Glenn Dietrich, Kim-Kwang Raymond Choo |
Identification of Forensic Artifacts in VMWare Virtualized Computing. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alfonso Blanco Blanco, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas, Agustín Martín Muñoz, José Luis Rodrigo Oliva, J. Ignacio Sánchez García |
A Framework for Acquiring and Analyzing Traces from Cryptographic Devices. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ken Eustace, Rafiqul Islam 0002, Philip Tsang, Geoffrey Fellows |
Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jemal H. Abawajy, A. Richard, Zaher Al Aghbari |
Securing Websites Against Homograph Attacks. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lorena González-Manzano, Mark Slaymaker, José María de Fuentes, Dimitris Vayenas |
SoNeUCONABCPro: An Access Control Model for Social Networks with Translucent User Provenance. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jemal H. Abawajy, Mohd Izuan Hafez Ninggal, Zaher Al Aghbari, Abdul Basit Darem, Asma Alhashmi |
Privacy Threat Analysis of Mobile Social Network Data Publishing. |
ATCS/SePrIoT@SecureComm |
2017 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #23 of 23 (100 per page; Change: )
|
|