Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee |
Real-Time supports on Tablet PC Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-7, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ali Raya, K. Mariyappn |
Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-8, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Al-Fawa'reh, Amal Saif, Mousa Tayseer Jafar, Ammar Elhassan |
Malware Detection by Eating a Whole APK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-7, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Luca Deri, Daniele Sartiano |
Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Raadhesh Kannan, Ji-Jian Chin, Xiaoning Guo |
Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-4, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Dhruva Hunusekattte |
Smart Parking With Automated Billing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-5, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zongchao Qiao, Ina Taralova, Safwan El Assad |
A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-5, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Felix Larbi Aryeh, Boniface Kayode Alese |
A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Fethi Dridi, Safwan El Assad, Carinelle Atamech, Wajih El Hadj Youssef, Mohsen Machhout |
Design and Implementation on FPGA Board of a Chaos-based Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-5, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Schillinger, Christian Schindelhauer |
Partitioned Private User Storages in End-to-End Encrypted Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-8, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sook-Yan Hue, Nor Haniza Sarmin, Eddie Shahril Ismail, Ji-Jian Chin |
Easy Simple Factoring-based Digital Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-4, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh |
Evolution of Bitcoin Addresses from Security Perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | |
15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![IEEE, 978-1-913572-21-1 The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim |
Performance Evaluation of RPL and DODAG Formations for IoTs Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-7, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ezekiel Uzor Okike, Gofaone Mogapi |
A Pedagogic Analysis of Information Systems Security Measures in Online Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malik Qasaimeh |
Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-10, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Chunxiao Yang, Ina Taralova, Jean-Jacques Loiseau, Safwan El Assad |
A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Saad Al-Ahmari, Karen Renaud, Inah Omoronyia |
Implement a Model for Describing and Maximising Security Knowledge Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-4, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tabisa Ncubukezi, Laban Mwansa, François Rocaries |
A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Harris Anthonio, Yvonne Hwei-Syn Kam |
A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-5, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Huangxiaolie Liu, Dong Zhang, Huijun Chen |
Towards robust classification detection for adversarial examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-7, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Song-Kyoo Amang Kim |
Toward Compact Data from Big Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-5, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Esau Bermudez, Djamel Fawzi Hadj Sadok |
Energy Consumption of a LoRaWAN Network using Jarvis Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | May Medhat, Menna Essa, Hend Faisal, Samir G. Sayed |
YARAMON: A Memory-based Detection Framework for Ransomware Families. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Kosakatani, Tetsutaro Uehara, Songpon Teerakanok |
Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-6, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kitty Kioskli, Nineta Polemi |
Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-4, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Masum, Hossain Shahriar |
TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-7, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Loreen Mahmoud, Raja Praveen |
Network Security Evaluation Using Deep Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020, pp. 1-4, 2020, IEEE, 978-1-913572-21-1. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Walter Blair, Aspen Olmsted, Paul Anderson |
Docker vs. KVM: Apache spark application performance and ease of use. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 199-201, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Philip McShane, Darryl Stewart |
Challenge based visual speech recognition using deep learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 405-410, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Elizabeth Healy, Husna Siddiqui, Aspen Olmsted |
Classifying influenza outbreaks by analyzing and filtering Twitter data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 205-207, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shuaiyi Bu, Shuxin Yang, Haoming Ji |
Distributed computing framework in security: Case study of encryption method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 311-318, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Bennakhi, Mohamed A. Jeragh |
Applying dynamic verification tagging to the k-anonymity model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 439-443, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Alhumaidi Alotaibi, Marios C. Angelides |
A hybrid approach for femtocell co-tier interference mitigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 148-153, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Basil Alothman, Prapa Rattadilok |
Towards using transfer learning for Botnet Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 281-282, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahana Roy, Louis Mejia, Paul Helling, Aspen Olmsted |
Automation of cyber-reconnaissance: A Java-based open source tool for information gathering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 424-426, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Zefferer, Dominik Ziegler 0001, Andreas Reiter |
Best of two worlds: Secure cloud federations meet eIDAS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 396-401, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Goeddel, Pasha Sadeghian, Aspen Olmsted |
Weighing the shopping benefits of a smarter refrigerator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 377-378, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Roland Pellegrini, Patrick Rottmann, Georg Strieder |
Preventing vendor lock-ins via an interoperable multi-cloud deployment approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 382-387, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anna V. Sandifer, Casey Wilson, Aspen Olmsted |
Detection of fake online hotel reviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 501-502, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Clara Bertolissi, Omar Boucelma, Worachet Uttha |
Enhancing security in the cloud: When traceability meets access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 365-366, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Haya Alshehri, Farid Meziane |
The influence of advanced and secure e-commerce environments on customers behaviour: The case of Saudis in the UK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 332-337, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahyoung Kim, Junwoo Lee |
Mobile business performance metrics: Framework and case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 179-184, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lamya Alqaydi, Chan Yeob Yeun, Ernesto Damiani |
Security enhancements to TLS for improved national control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 274-279, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aspen Olmsted |
Entity identity, performance, and storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 155-160, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Callum Brill, Thomas Nash |
A comparative analysis of MANET routing protocols through simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 244-247, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tasnime Omrani, Rabei Becheikh, Olfa Mannai, Rhouma Rhouma, Safya Belghith |
RARE: A robust algorithm for rapid encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 23-28, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Desislav Andreev, Simona Petrakieva, Ina Taralova |
Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 39-42, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Juhua Liu, Wei Li, Guoqiang Bai 0001 |
Efficient hardware implementation of ITUbee for lightweight application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 372-376, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alaa Altorbaq, Fredrik Blix, Stina Sorman |
Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 305-310, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted |
Evaluate action primitives for human activity recognition using unsupervised learning approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 186-188, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ashik Mostafa Alvi, Md. Faqrul Islam Shaon, Prithvi Ranjan Das, Manazir Mustafa, Mohammad Rezaul Bari |
Automated course management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 161-166, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Saja Alqurashi, Omar Batarfi |
A comparison between API call sequences and opcode sequences as reflectors of malware behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 105-110, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Cameron Hamilton, Aspen Olmsted |
Database multi-factor authentication via pluggable authentication modules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 367-368, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luis F. Mejia-Ricart, Aspen Olmsted |
Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 472-474, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rio Guntur Utomo, Robert John Walters, Gary B. Wills |
Factors affecting the implementation of information assurance for eGovernment in Indonesia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 225-230, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Bissada, Aspen Olmsted |
Mobile multi-factor authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 210-211, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rachael Shaw, Enda Howley, Enda Barrett |
An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 61-66, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Victor Clincy, Hossain Shahriar |
Web service injection attack detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 173-178, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wayne Chen, Aspen Olmsted |
Considerations for OSV over Linux-based virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 346-348, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Norah S. Farooqi |
Intelligent safety management system for crowds using sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 144-147, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kouya Tochikubo |
Multiple assignment secret sharing scheme using hierarchical threshold scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 456-461, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marwa Saidi, Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith |
LSB-hamming based chaotic steganography (LH-Steg). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 29-34, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong |
Data protection by design in systems development: From legal requirements to technical solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 98-103, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Malfa |
Keynote speaker 6: Steel made in Europe: The backbone of sustainability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 20, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Husna Siddiqui, Aspen Olmsted, Brendan Keane |
Venmo: Exposing a user's lifestyle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 403-404, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahana Roy, Aspen Olmsted |
Distributed query processing and data sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 221-224, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![IEEE, 978-1-908320-93-3 The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
1 | Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer |
Towards comparing programming paradigms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 436-437, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Nash, Aspen Olmsted |
shinySDM: Point and click species distribution modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 450-451, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chatipot Srimuang, Nagul Cooharojananone, Uthai Tanlamai, Achara Chandrachai, Kanokwan Atchariyachanvanich |
The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 231-236, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ferda Ernawan, Muhammad Nomani Kabir, Zuriani Mustaffa |
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 92-97, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | W. P. Yuen, K. B. Chuah |
Data visibility and trust enhancement of enterprise customers in cloud computing services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 417-422, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Seamus Dowling, Michael Schukat, Hugh Melvin |
Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 349-354, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki |
Enhancing cyber security awareness with mobile games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 129-134, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Preston T. Owens, Aspen Olmsted |
Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 379-380, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Keshnee Padayachee, Elias Worku |
Shared situational awareness in information security incident management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 479-483, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Blake Badders, Aspen Olmsted |
Improve CRUD performance on hierarchical data: Nested interval model vs. nested set model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 370-371, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Faris A. Almalki, Marios C. Angelides |
Propagation modelling and performance assessment of aerial platforms deployed during emergencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 238-243, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq |
Role of transformational leadership on e-govemment switching: Multi-channel and digital divide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 475-478, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus, Erik H. A. Proper |
Towards a security and privacy co-creation method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 75-80, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Omotayo Kayode Abatan, Manoj S. Maharaj |
Change management and the integration of information technology: Research notes from selected African universities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 167-172, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Nash, Aspen Olmsted |
Performance vs. security: Implementing an immutable database in MySQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 290-291, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Lile, Aspen Olmsted |
Meaningful sandbox data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 203-204, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michelle G. Cacais, Gilvandenys Leite Sales |
A collaborative system for corporate performance evaluation using gamification and the learning vectors model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 484-489, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos |
An architecture for privacy-preserving sharing of CTI with 3rd party analysis services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 293-297, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wren Chan, Aspen Olmsted |
Ethereum transaction graph analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 498-500, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pasha Sadeghian, Aspen Olmsted |
Assessment of fuzzy min-max neural networks for classification tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 193-196, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Basil Alothman, Prapa Rattadilok |
Android botnet detection: An integrated source code mining approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 111-115, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Briggs, Aspen Olmsted |
Client side calculation of 'bacon number'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 356-358, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yichen Ma, Fuyao Wang, Zhuozheng Wang |
Intelligent laboratory management system based on Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 464-467, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daehee Kim 0001, Jaekeun Yun, Sungjun Kim |
Hybrid public key authentication for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 142-143, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shinsaku Kiyomoto, Anirban Basu 0001, Mohammad Shahriar Rahman, Sushmita Ruj |
On blockchain-based authorization architecture for beyond-5G mobile services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 136-141, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | William Kennedy, Aspen Olmsted |
Three factor authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 212-213, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Messaouda Boumaraf, Fatiha Merazka |
Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 87-91, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin Duggan, Karl Mason, Jim Duggan, Enda Howley, Enda Barrett |
Predicting host CPU utilization in cloud computing using recurrent neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 67-72, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Saqib Niaz, Gunter Saake |
Forward secure searchable symmetric encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 49-54, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shahlaa Mashhadani, Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li 0001 |
A novel multimedia-forensic analysis tool (M-FAT). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 388-395, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Abeer F. Alkhwaldi, Mumtaz M. Kamala, Rami Qahwaji |
From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 298-304, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Huicong Loi, Aspen Olmsted |
Low-cost detection of backdoor malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017, pp. 197-198, 2017, IEEE, 978-1-908320-93-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|