The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICGS3"( http://dblp.L3S.de/Venues/ICGS3 )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icgs3

Publication years (Num. hits)
2010 (32) 2015 (32) 2019 (56)
Publication types (Num. hits)
inproceedings(117) proceedings(3)
Venues (Conferences, Journals, ...)
ICGS3(120)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 120 publication records. Showing 120 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jake L. Beavers, Michael Faulks, Jims Marchang Hacking NHS Pacemakers: A Feasibility Study. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nishan Chelvachandran, Hamid Jahankhani A Study on Keyword Analytics as a Precursor to Machine Learning to Evaluate Radicalisation on Social Media. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Amal Durou, Somaya Al-Máadeed, Ibrahim A. Aref, Ahmed Bouridane, Mosa Elbendak A Comparative Study of Machine Learning Approaches for Handwriter Identification. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Danisa Nkomo, Ray Brown Hybrid Cybersecurity Framework for the Internet of Medical Things (IOMT). Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Martin J. Tunnicliffe, Omego Obinna, Eckhard Pflügel Hidden Protocol Strengthening with Random Sentences as Cryptographic Nonces. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohan Krishna Kagita Security and Privacy Issues for Business Intelligence in lOT. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Halima Abdul Halime Shnishah, David Mulvaney Encryption of Text File Using a User Controlled Automatically-Generated Key. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1 12th IEEE International Conference on Global Security, Safety and Sustainability, ICGS3 2019, London, UK, January 16-18, 2019 Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  BibTeX  RDF
1Nuno Castro, Henrique M. Dinis Santos, Vítor J. Sá, Maria José Magalhães Study of the Means of Online Payment in the Portuguese Population. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bobby L. Tait Behavioural Biometrics Authentication Tested Using EyeWriter Technology. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jaime Ibarra Jimenez, Hamid Jahankhani "Privacy by Design" Governance Framework to Achieve Privacy Assurance of Personal Health Information (PHI) Processed by IoT-based Telemedicine Devices and Applications Within Healthcare Services. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gabriela Ahmadi-Assalemi, Haider M. Al-Khateeb, Gregory Epiphaniou, Jon Cosson, Hamid Jahankhani, Prashant Pillai Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yvan Da Silva Ramos, John McCarthy 0006 Management Versus Technical Perspectives on Threats. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stefan Kendzierskyj, Hamid Jahankhani The Role of Blockchain in Supporting Critical National Infrastructure. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Joseph Waldu Woensdregt, Haider M. Al-Khateeb, Gregory Epiphaniou, Hamid Jahankhani AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohamed Shaik Honnurvali, Naren Gupta, Keng Goh, Tariq Umar, Adnan Kabbani, Needa Nazecma Can Future Smart Cities Powered by 100% Renewables and Made Cyber Secured-A Analytical Approach. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Binay Dahal, Yoohwan Kim AutoEncoded Domains with Mean Activation for DGA Botnet Detection. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Grace Adedotun-Ogundeji, Hamid Jahankhani Preparing 11- 17 Years Old Girls to Become Cyber Security Experts in the Future. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sina Pournouri, Shahrzad Zargari, Babak Akhgar An Investigation of Using Classification Techniques in Prediction of Type of Targets in Cyber Attacks. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1David A. E. Haddon, Haider M. Al-Khateeb Investigating Data Exfiltration in DNS Over HTTPS Queries. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Bharat Manya BRT - (Blockchain Relevance Theory): A Theoretical Framework for Blockchain & DLT in Cyber Security Using CISv7 Controls. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Uzma Mustafa, Eckhard Pflügel, Nada Philip A Novel Privacy Framework for Secure M-Health Applications: The Case of the GDPR. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sherese Bishop The Internet of Things: Implications for Consumer Privacy & Security. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Homan Forouzan, Hamid Jahankhani An Examination into the Level of Training, Education and Awareness Among Officers in Tackling Cybercrime within the Metropolitan Police Service. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sergio De Abreu A Feasibility Study on Machine Learning Techniques for APT Detection and Protection in VANETs. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Rodrigo Ruiz A Study of the UK Undergraduate Computer Science Curriculum: A Vision of Cybersecurity. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Anita Collins, Hamid Jahankhani Blockchain as a Tool for Financial Transparency in Development Aid. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1William Jahankhani, Liang Chen Email Verification Fake or Genuine? Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Elias Pimenidis, Nikolaos Polatidis Secure Social Media Spaces for Communities of Vulnerable People. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Reza Montasari, Richard Hill Next-Generation Digital Forensics: Challenges and Future Paradigms. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Joseph Zernik Cybersecurity and Law in Israel - A Case Study. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tariq Abdullah, Andrew Jones eHealth: Challenges Far Integrating BlockChain within Healthcare. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Firas Hazzaa, Sufian Yousef, Nada H. Ali, Erika Sanchez The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Anh Do, John McCarthy 0006 Categorization of Threats and their Impacts on Critical National Infrastructure Systems. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Asifa Shad, Tariq Abdullah, Usman Butt Web Accessibility Adoption Framework (WAAF) for Businesses and Web Professionals. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yousuf AlBlooshi, Amin Hosseinian Far A Novel Framework for Identification of Critical Business Processes. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Rahul Ravindran Circle of Trust: A High Volume, Energy Efficient, Stake Blind and High Attack Tolerant Blockchain Consensus Protocol. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Liam Odell, Hamid Jahankhani AI: The Cyber-Physical Project Manager and their Digital Twin. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Abeer F. Alkhwaldi, Mumtaz M. Kamala, Rami Qahwaji Security Perceptions in Cloud-Based e-Govemment Services. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Farah Ahmed, Fouad Khelifi, Ashref Lawgaly, Ahmed Bouridane Comparative Analysis of a Deep Convolutional Neural Network for Source Camera Identification. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ian Mitchell 0002, Sukhvinder Hara, M. Sheriff dAppER: Decentralised Application for Examination Review. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jamie O'Hare, Rich Macfarlane, Owen Lo Identifying Vulnerabilities Using Internet-Wide Scanning Data. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1George Copeland, John McCarthy 0006 Practical Cybersecurity for Digital Trains. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ahuokpeme Chibueze Brendan, John McCarthy 0006 Taxonomy of Threat Categorization and Threat Intelligence Platform. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Usman Javed Butt, Maysam Abbod, Anzor Lors, Hamid Jahankhani, Arshad Jamal, Arvind Kumar Ransomware Threat and its Impact on SCADA. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jon Cosson, Haider Alhateeb An Approach to Identify Risk Based Human Behaviour Profiling within an Office Environment. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Samar Muslah Albladi, George R. S. Weir A Conceptual Model to Predict Social Engineering Victims. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jacopo Semeraro An Investigatory Project on the Anonymity of Blockchain and Cryptocurrencies. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stephen S. Sampana FoRCE (Forensic Recovery of Cloud Evidence): A Digital Cloud Forensics Framework. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nishan Chelvachandran, Hamid Jahankhani Data Mining Metrics to Identify and Evaluate Potential Radicalisation Through Social Media. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1John Goldie, Hamid Jahankhani Ethical Considerations of People with Autistic Spectrum Disorder. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jabran Riaz Retail Industry Gift Card Hacking Technique Challenges. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Thomas Welsh A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Stefan Kendzierskyj, Hamid Jahankhani Blockchain as an Efficient and Alternative Mechanism for Strengthening and Securing the Privacy of Healthcare Patient and Clinical Research Data. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jaime Ibarra Jimenez, Usman Javed Butt, Anh Do, Hamid Jahankhani, Arshad Jamal Ransomware Impact to SCADA Systems and its Scope to Critical Infrastructure. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Uzma Mustafa, Nada Philip Group-Based Key Exchange for Medical IoT Device-to-Device Communication (D2D) Combining Secret Sharing and Physical Layer Key Exchange. Search on Bibsonomy ICGS3 The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Daniel Ganji, Haralambos Mouratidis, Saeed Malekshahi Gheytassi, Miltos Petridis Conflicts Between Security and Privacy Measures in Software Requirements Engineering. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Petra Saskia Bayerl, Babak Akhgar Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence? Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chris Moore 0001, Ameer Al-Nemrat An Analysis of Honeypot Programs and the Attack Data Collected. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marko Uotinen Detecting Deceit - Guessing or Assessing? Study on the Applicability of Veracity Assessment Methods in Human Intelligence. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sina Pournouri, Babak Akhgar Improving Cyber Situational Awareness Through Data Mining and Predictive Analytic Techniques. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammed Fakrudeen, Sufian Yousef Securing the Blind User Visualization and Interaction in Touch Screen. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Reza Alavi, Shareeful Islam, Haris Mouratidis Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gregor Robinson, George R. S. Weir Understanding Android Security. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ali Hosseinpour, Amin Hosseinian Far, Hamid Jahankhani, Alireza Ghadrdanizadi Security and Feasibility of Power Line Communication System. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Reza Montasari, Pekka Peltola, David Evans 0002 Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Lilburn Watson Some Security Perils of Smart Living - (A Day in the Life of John Q Smith, a Citizen of Utopia, and His Twin Brother, Who Isn't). Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ali G. Hessami, Hamid Jahankhani, Mathews Z. Nkhoma Responsive Cyber-Physical Risk Management (RECYPHR) - A Systems Framework. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Reynolds The Enemy Within: The Challenge for Business from Cyber-attack. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Henrique M. Dinis Santos, Sérgio Tenreiro de Magalhães, Maria José Magalhães An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wakas Mahmood, Hamid Jahankhani, Aykut Ozkaya Cloud Forensics Challenges Faced by Forensic Investigators. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Luigi Laura, Gianluigi Me Searching the Web for Illegal Content: The Anatomy of a Semantic Search Engine. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Eleni-Laskarina Makri, Costas Lambrinoudakis Towards a Common Security and Privacy Requirements Elicitation Methodology. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giovanni Bottazzi, Gianluigi Me A Survey on Financial Botnets Threat. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hamid Jahankhani, Alex Carlile, Babak Akhgar, Amie Taal, Ali G. Hessami, Amin Hosseinian Far (eds.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fathiya Al Izki, George R. S. Weir Gender Impact on Information Security in the Arab World. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amie Taal, Jenny Le, James A. Sherer A Consideration of eDiscovery Technologies for Internal Investigations. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anwar Ul Haq, Arshad Jamal, Usman Butt, Asim Majeed, Aykut Ozkaya Understanding Privacy Concerns in Online Courses: A Case Study of Proctortrack. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Reza Montasari, Pekka Peltola Computer Forensic Analysis of Private Browsing Modes. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Akbar Sheikh Akbari, Pooneh Bagheri Zadeh Wavelet Based Image Enlargement Technique. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Krishan Chand, Muthu Ramachandran, Ah-Lian Kor Simulation of Cloud Data Security Processes and Performance. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bobby L. Tait Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Muthu Ramachandran Software Security Requirements Engineering: State of the Art. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Umar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis A Framework for Cloud Security Audit. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Babak Akhgar, Helen Gibson Processing Social Media Data for Crisis Management in Athena. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hamid Jahankhani, Najib Altawell, Ali G. Hessami Risk and Privacy Issues of Digital Oil Fields in the Cloud. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nor Fatimah Bt. Awang, Azizah Abd Manaf Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Faris Al-Baadani, Sufian Yousef A Comparison Study for Different Wireless Sensor Network Protocols. Search on Bibsonomy ICGS3 The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Annette Tolnai, Sebastiaan H. von Solms The Cloud's Core Virtual Infrastructure Security. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jyoti Navare, Orhan Gemikonakli Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Filipe Caldeira, Edmundo Monteiro, Paulo Simões 0001 Trust and Reputation Management for Critical Infrastructure Protection. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hamid Reza Peikari A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trust. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Abolfazl Falahati, Mahdi Azarafrooz Mitigation of Control Channel Jamming via Combinatorial Key Distribution. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Paulo Mourão "Fiscal Illusion Causes Fiscal Delusion - Please Be Careful!". Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tapio Saarelainen, Jorma Jormakka Collaboration and Command Tools for Crises Management. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Saeed Ebadi Tavallaei, Abolfazl Falahati Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bobby L. Tait Secure Biometric Multi-Logon System Based on Current Authentication Technologies. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hossein Jahankhani, Maktuba Mohid Analysis of Fingerprint Image to Verify a Person. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Isabel F. Loureiro, Celina P. Leão, Pedro M. Arezes Management of the Benefits on the Client's Involvement on Ergonomic Analysis. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Morran, George R. S. Weir An Approach to Textual Steganography. Search on Bibsonomy ICGS3 The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 120 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license