The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "FGIT-SecTech/DRBC"( http://dblp.L3S.de/Venues/FGIT-SecTech/DRBC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/fgit

Publication years (Num. hits)
2010 (35)
Publication types (Num. hits)
inproceedings(34) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 35 publication records. Showing 35 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Davrondzhon Gafurov Emerging Biometric Modalities: Challenges and Opportunities. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Davrondzhon Gafurov, Patrick Bours Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1A. J. Clark, Patton Holliday, Robyn Chau, Harris Eisenberg, Melinda Chau Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pranab Kumar Dhar, Mohammad Ibrahim Khan, Cheol Hong Kim, Jong-Myon Kim An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kenji Yamamoto, Toshihiro Yamauchi Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tai-Hoon Kim, Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-Jo Kang, Dominik Slezak (eds.) Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hsiang-Cheh Huang, Ting-Hsuan Wang, Wai-Chi Fang Histogram-Based Reversible Data Hiding with Quadtree Concepts. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rosslin John Robles, Haeng-Kon Kim, Tai-Hoon Kim Internet SCADA Utilizing API's as Data Source. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Taehyoung Kim, Inhyuk Kim, Changwoo Min, Young Ik Eom MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal 0001, Lalit M. Patnaik Human Authentication Based on ECG Waves Using Radon Transform. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mushtaq Ahmad Wireless Network Security Vulnerabilities and Concerns. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi Proxy Re-encryption with Keyword Search: New Definitions and Algorithms. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Maricel O. Balitanas, Tai-Hoon Kim Insecure Information System's Solution Using Isolation Method. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rosslin John Robles, Tai-Hoon Kim Communication Security for Control Systems in Smart Grid. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Syed Irfan Nabi, Syed Waqar Nabi, Syed Awais Ahmed Tipu, Bushra Haqqi, Zahra Abid, Khaled Alghathbar Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Raed Alosaimy, Khaled Alghathbar, Alaaeldin M. Hafez, Mohamed Hamdy Eldefrawy NMACA Approach Used to Build a Secure Message Authentication Code. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aneel Rahim, Fahad Bin Muhaya Discovering the Botnet Detection Techniques. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hong-bin Yim, Jae-Il Jung Probabilistic Route Selection Algorithm for IP Traceback. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing Fusion of Moving and Static Facial Features for Robust Face Recognition. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid Issues of Security and Network Load in Presence - A Survey. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ju-Sung Kang, Okyeon Yi On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wei Huang, Arthur Mynnet Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bo-heung Chung, Jung-nye Kim Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Abdullah Sharaf Alghamdi, Syed Amanullah Quadri, Iftikhar Ahmad 0002, Khalid Al-Nafjan A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jemal H. Abawajy, Tai-Hoon Kim Performance Analysis of Cyber Security Awareness Delivery Methods. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar Contactless Biometrics in Wireless Sensor Network: A Survey. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hoon Ko, Zita A. Vale Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar One-Time Password System with Infinite Nested Hash Chains. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Intae Kim, Keewook Rim, Junghyun Lee Secure OSGi Platform against Service Injection. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pranab Kumar Dhar, Cheol Hong Kim, Jong-Myon Kim Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji Using Arabic CAPTCHA for Cyber Security. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Davrondzhon Gafurov, Patrick Bours, Bian Yang, Christoph Busch 0001 Impact of Finger Type in Fingerprint Authentication. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nagaraj Ambika, G. T. Raju Figment Authentication Scheme in Wireless Sensor Network. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Syed Irfan Nabi, Abdulrahman A. Mirza, Khaled Alghathbar Information Assurance in Saudi Organizations - An Empirical Study. Search on Bibsonomy FGIT-SecTech/DRBC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #35 of 35 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license