The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee Real-Time supports on Tablet PC Platforms. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ali Raya, K. Mariyappn Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammad Al-Fawa'reh, Amal Saif, Mousa Tayseer Jafar, Ammar Elhassan Malware Detection by Eating a Whole APK. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Luca Deri, Daniele Sartiano Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Raadhesh Kannan, Ji-Jian Chin, Xiaoning Guo Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dhruva Hunusekattte Smart Parking With Automated Billing System. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zongchao Qiao, Ina Taralova, Safwan El Assad A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Felix Larbi Aryeh, Boniface Kayode Alese A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fethi Dridi, Safwan El Assad, Carinelle Atamech, Wajih El Hadj Youssef, Mohsen Machhout Design and Implementation on FPGA Board of a Chaos-based Stream Cipher. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fabian Schillinger, Christian Schindelhauer Partitioned Private User Storages in End-to-End Encrypted Online Social Networks. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sook-Yan Hue, Nor Haniza Sarmin, Eddie Shahril Ismail, Ji-Jian Chin Easy Simple Factoring-based Digital Signature Scheme. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh Evolution of Bitcoin Addresses from Security Perspectives. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020 Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Khalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim Performance Evaluation of RPL and DODAG Formations for IoTs Applications. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ezekiel Uzor Okike, Gofaone Mogapi A Pedagogic Analysis of Information Systems Security Measures in Online Services. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Zein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malik Qasaimeh Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chunxiao Yang, Ina Taralova, Jean-Jacques Loiseau, Safwan El Assad A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Saad Al-Ahmari, Karen Renaud, Inah Omoronyia Implement a Model for Describing and Maximising Security Knowledge Sharing. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Tabisa Ncubukezi, Laban Mwansa, François Rocaries A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Harris Anthonio, Yvonne Hwei-Syn Kam A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Huangxiaolie Liu, Dong Zhang, Huijun Chen Towards robust classification detection for adversarial examples. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Song-Kyoo Amang Kim Toward Compact Data from Big Data. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Esau Bermudez, Djamel Fawzi Hadj Sadok Energy Consumption of a LoRaWAN Network using Jarvis Algorithm. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1May Medhat, Menna Essa, Hend Faisal, Samir G. Sayed YARAMON: A Memory-based Detection Framework for Ransomware Families. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Satoshi Kosakatani, Tetsutaro Uehara, Songpon Teerakanok Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kitty Kioskli, Nineta Polemi Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammad Masum, Hossain Shahriar TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Loreen Mahmoud, Raja Praveen Network Security Evaluation Using Deep Neural Network. Search on Bibsonomy ICITST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Walter Blair, Aspen Olmsted, Paul Anderson Docker vs. KVM: Apache spark application performance and ease of use. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Philip McShane, Darryl Stewart Challenge based visual speech recognition using deep learning. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elizabeth Healy, Husna Siddiqui, Aspen Olmsted Classifying influenza outbreaks by analyzing and filtering Twitter data. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shuaiyi Bu, Shuxin Yang, Haoming Ji Distributed computing framework in security: Case study of encryption method. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmad Bennakhi, Mohamed A. Jeragh Applying dynamic verification tagging to the k-anonymity model. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abdullah Alhumaidi Alotaibi, Marios C. Angelides A hybrid approach for femtocell co-tier interference mitigation. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Basil Alothman, Prapa Rattadilok Towards using transfer learning for Botnet Detection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahana Roy, Louis Mejia, Paul Helling, Aspen Olmsted Automation of cyber-reconnaissance: A Java-based open source tool for information gathering. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Zefferer, Dominik Ziegler 0001, Andreas Reiter Best of two worlds: Secure cloud federations meet eIDAS. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stephen Goeddel, Pasha Sadeghian, Aspen Olmsted Weighing the shopping benefits of a smarter refrigerator. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roland Pellegrini, Patrick Rottmann, Georg Strieder Preventing vendor lock-ins via an interoperable multi-cloud deployment approach. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anna V. Sandifer, Casey Wilson, Aspen Olmsted Detection of fake online hotel reviews. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Clara Bertolissi, Omar Boucelma, Worachet Uttha Enhancing security in the cloud: When traceability meets access control. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Haya Alshehri, Farid Meziane The influence of advanced and secure e-commerce environments on customers behaviour: The case of Saudis in the UK. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahyoung Kim, Junwoo Lee Mobile business performance metrics: Framework and case study. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lamya Alqaydi, Chan Yeob Yeun, Ernesto Damiani Security enhancements to TLS for improved national control. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aspen Olmsted Entity identity, performance, and storage. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Callum Brill, Thomas Nash A comparative analysis of MANET routing protocols through simulation. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tasnime Omrani, Rabei Becheikh, Olfa Mannai, Rhouma Rhouma, Safya Belghith RARE: A robust algorithm for rapid encryption. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Desislav Andreev, Simona Petrakieva, Ina Taralova Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Juhua Liu, Wei Li, Guoqiang Bai 0001 Efficient hardware implementation of ITUbee for lightweight application. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alaa Altorbaq, Fredrik Blix, Stina Sorman Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted Evaluate action primitives for human activity recognition using unsupervised learning approach. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ashik Mostafa Alvi, Md. Faqrul Islam Shaon, Prithvi Ranjan Das, Manazir Mustafa, Mohammad Rezaul Bari Automated course management system. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saja Alqurashi, Omar Batarfi A comparison between API call sequences and opcode sequences as reflectors of malware behavior. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cameron Hamilton, Aspen Olmsted Database multi-factor authentication via pluggable authentication modules. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luis F. Mejia-Ricart, Aspen Olmsted Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rio Guntur Utomo, Robert John Walters, Gary B. Wills Factors affecting the implementation of information assurance for eGovernment in Indonesia. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrew Bissada, Aspen Olmsted Mobile multi-factor authentication. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rachael Shaw, Enda Howley, Enda Barrett An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centers. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Victor Clincy, Hossain Shahriar Web service injection attack detection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wayne Chen, Aspen Olmsted Considerations for OSV over Linux-based virtual machines. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Norah S. Farooqi Intelligent safety management system for crowds using sensors. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kouya Tochikubo Multiple assignment secret sharing scheme using hierarchical threshold scheme. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marwa Saidi, Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith LSB-hamming based chaotic steganography (LH-Steg). Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong Data protection by design in systems development: From legal requirements to technical solutions. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Enrico Malfa Keynote speaker 6: Steel made in Europe: The backbone of sustainability. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Husna Siddiqui, Aspen Olmsted, Brendan Keane Venmo: Exposing a user's lifestyle. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahana Roy, Aspen Olmsted Distributed query processing and data sharing. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017 Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  BibTeX  RDF
1Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer Towards comparing programming paradigms. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Nash, Aspen Olmsted shinySDM: Point and click species distribution modeling. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chatipot Srimuang, Nagul Cooharojananone, Uthai Tanlamai, Achara Chandrachai, Kanokwan Atchariyachanvanich The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ferda Ernawan, Muhammad Nomani Kabir, Zuriani Mustaffa A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1W. P. Yuen, K. B. Chuah Data visibility and trust enhancement of enterprise customers in cloud computing services. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seamus Dowling, Michael Schukat, Hugh Melvin Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki Enhancing cyber security awareness with mobile games. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Preston T. Owens, Aspen Olmsted Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Keshnee Padayachee, Elias Worku Shared situational awareness in information security incident management. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Blake Badders, Aspen Olmsted Improve CRUD performance on hierarchical data: Nested interval model vs. nested set model. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Faris A. Almalki, Marios C. Angelides Propagation modelling and performance assessment of aerial platforms deployed during emergencies. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq Role of transformational leadership on e-govemment switching: Multi-channel and digital divide. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christophe Feltus, Erik H. A. Proper Towards a security and privacy co-creation method. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Omotayo Kayode Abatan, Manoj S. Maharaj Change management and the integration of information technology: Research notes from selected African universities. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Nash, Aspen Olmsted Performance vs. security: Implementing an immutable database in MySQL. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ryan Lile, Aspen Olmsted Meaningful sandbox data. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michelle G. Cacais, Gilvandenys Leite Sales A collaborative system for corporate performance evaluation using gamification and the learning vectors model. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos An architecture for privacy-preserving sharing of CTI with 3rd party analysis services. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wren Chan, Aspen Olmsted Ethereum transaction graph analysis. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pasha Sadeghian, Aspen Olmsted Assessment of fuzzy min-max neural networks for classification tasks. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Basil Alothman, Prapa Rattadilok Android botnet detection: An integrated source code mining approach. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Briggs, Aspen Olmsted Client side calculation of 'bacon number'. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yichen Ma, Fuyao Wang, Zhuozheng Wang Intelligent laboratory management system based on Internet of Things. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daehee Kim 0001, Jaekeun Yun, Sungjun Kim Hybrid public key authentication for wireless sensor networks. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shinsaku Kiyomoto, Anirban Basu 0001, Mohammad Shahriar Rahman, Sushmita Ruj On blockchain-based authorization architecture for beyond-5G mobile services. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1William Kennedy, Aspen Olmsted Three factor authentication. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Messaouda Boumaraf, Fatiha Merazka Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Duggan, Karl Mason, Jim Duggan, Enda Howley, Enda Barrett Predicting host CPU utilization in cloud computing using recurrent neural networks. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Muhammad Saqib Niaz, Gunter Saake Forward secure searchable symmetric encryption. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shahlaa Mashhadani, Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li 0001 A novel multimedia-forensic analysis tool (M-FAT). Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abeer F. Alkhwaldi, Mumtaz M. Kamala, Rami Qahwaji From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public services. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Huicong Loi, Aspen Olmsted Low-cost detection of backdoor malware. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 998 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license