Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Khalil A. Abuosba |
Multiagent trust management of Web services: The "Asynchronous Computing Environment Profile Unification Methodology" (ACEPUM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 55-59, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Karen Renaud, Melanie Volkamer |
Exploring mental models underlying PIN management strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 18-23, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aspen Olmsted |
Ecurrency threat modeling and hardening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 49-54, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tanjila Farah, Delwar Alam, Md. Alamgir Kabir, Touhid Bhuiyan |
SQLi penetration testing of financial Web applications: Investigation of Bangladesh region. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 146-151, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrews Greig, Karen Renaud, Stephen Flowerday |
An ethnographic study to assess the enactment of information security culture in a retail store. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 61-66, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yangseo Choi, Jooyoung Lee 0005, Sunoh Choi, Jong-Hyun Kim, Ikkyun Kim |
Transmitted file extraction and reconstruction from network packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 164-165, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ayahiko Niimi |
Deep learning for credit card data analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 73-77, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sven Schindler, Bettina Schnor, Thomas Scheffler |
Taming the Ipv6 address space with hyhoneydv6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 113-118, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gyu-Sang Cho |
Development of an anti-forensic tool for hiding message in a directory index of NTFS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 144-145, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Charles A. Shoniregun |
PhD and doctorate consortium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 15, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yong Sun, Feng Liu |
A cascaded feature selection approach in network intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 119-124, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Neyire Deniz Sarier |
Security analysis of revocable and bipartite biotokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 97-103, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Minho Han, Ikkyun Kim |
Anomaly detection method using network pattern analysis of process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 159-163, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kholoud Althobaiti, Sara Jeza Alotaibi, Hend Alqahtani |
Random walk with jumps: A new query search method based on analysing Gnutella protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 125-130, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christina-Angeliki Toli, Bart Preneel |
Provoking security: Spoofing attacks against crypto-biometric systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 67-72, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Matt Piazza, Aspen Olmsted |
Founding a cybersecurity club in a higher education environment: A case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 139-143, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![IEEE, 978-1-908320-50-6 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Abdurrahman Pektas, Tankut Acarman, Yliès Falcone, Jean-Claude Fernandez |
Runtime-behavior based malware classification using online machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 166-171, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Kurowski, Richard Litwing, Gero Lückemeyer |
A view on ISO/IEC 27001 compliant identity lifecycles for IT service providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 85-90, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sara Jeza Alotaibi |
Attendance system based on the Internet of Things for supporting blended learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 78, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Moses, Dale C. Rowe |
The SNAP principle for mitigating privileged account breaches: How secondary non-admin privileged accounts can reduce breach impact. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 32-38, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Taniza Binti Tajuddin, Azizah Abd Manaf |
Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 132-138, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shane Miller, Kevin Curran, Tom Lunney |
Securing the internet through the detection of anonymous proxy usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 153-158, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rodrigo Borges Nogueira, Ricardo Staciarini Puttini |
Reasoning on personal identifiers: A guideline for design and maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 39-42, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen |
Keynote speaker 1: Global harmonization of cryptographic standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 11, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael Milliken, Yaxin Bi, Leo Galway, Glenn I. Hawe |
Ensemble learning utilising feature pairings for intrusion detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 24-31, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aspen Olmsted |
Keynote speaker 2: Secure software engineering in the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 12, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Galyna A. Akmayeva, George Ghinea |
Panel discussion: Secured environment for end-users and contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 14, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Suleyman Kondakci |
Human-related IT security: A reliability model for network and computer maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 91-96, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fara Yahya, Robert John Walters, Gary B. Wills |
Analysing threats in cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 44-48, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | T. Divya Sai Keerthi, Pallapa Venkataram |
AODV route maintenance using HoneyPots in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 105-112, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Charles A. Shoniregun |
Keynote speaker 3: Can the Cloud be secured...? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015, pp. 13, 2015, IEEE, 978-1-908320-50-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Roxanne Piderit, Stephen Flowerday |
The risk relationship between trust and information sharing in automotive supply chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 80-85, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera |
Fortifying TripAdvisor against reputation-system attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 20-21, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Laurén, Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen |
Symbol diversification of linux binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 74-79, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Natasa Suteva, Aleksandra Mileva, Mario Loleski |
Computer forensic analisys of some web attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 42-47, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dalal Al-Azizy, David E. Millard, Nigel Shadbolt, Kieron O'Hara |
Deanonymisation in Linked Data: A research roadmap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 48-52, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omer Ozulku, Nawfal F. Fadhel, David Argles, Gary B. Wills |
Anomaly detection system: Towards a framework for enterprise log management of security services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 97-102, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liezel Cilliers, Stephen Flowerday |
Information security in a public safety, participatory crowdsourcing smart city project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 36-41, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bhawani Shanker Bhati, Pallapa Venkataram |
Data privacy preserving scheme in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 22-23, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![IEEE, 978-1-908320-42-1 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
1 | Nawfal F. Fadhel, Richard M. Crowder, Fatimah Y. Akeel, Gary B. Wills |
Component for 3D printing provenance framework: Security properties components for provenance framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 91-96, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pryde N. Sema, Pavol Zavarsky, Ron Ruhl |
A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 87-90, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tamir Tsegaye, Stephen Flowerday |
Controls for protecting critical information infrastructure from cyberattacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 24-29, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hiroyuki Yoshimura |
Fingerprint templates generated by the fractional fourier, cosine and sine transforms and their generation conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 30-34, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Akinola Ajijola, Pavol Zavarsky, Ron Ruhl |
A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 66-73, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nihar Vuppalapati, Joon S. Park |
Online Behavioral Advertising (OBA) with privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 60-65, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zeyad S. Aaber, Richard M. Crowder, Nawfal F. Fadhel, Gary B. Wills |
Preventing document leakage through active document. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014, pp. 53-58, 2014, IEEE, 978-1-908320-42-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Matsuda |
Feature extraction of web application attacks based on zeta distributions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 119-122, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey J. Wiley |
WorldCIS-2013: Keynote speaker 1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 7, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Naif Alajlan, Md. Saiful Islam 0001, Nassim Ammour |
Fusion of fingerprint and heartbeat biometrics using fuzzy adaptive genetic algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 76-81, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | SeongHan Shin, Kazukuni Kobara |
RSA-based Password-Authenticated Key Retrieval using multiple servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 106-111, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | William A. R. De Souza, Allan Tomlinson |
Understanding threats in a cloud infrastructure with no hypervisor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 128-133, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Heba Kamal Aslan, Mohamed Rasslan |
A new multicast authentication protocol using erasure code functions and signcryption techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 99-105, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Hudel, Mohamed Shehab |
Optimizing search for malware by hashing smaller amounts of data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 112-117, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Azin Moradmand Badie, Dale Lindskog, Ron Ruhl |
Responding to intrusions in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 30-34, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ting Zhang, Dale Lindskog |
Full function Firewalls on MANETs: A routing storage and query mechanism for ROFL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 25-29, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hanim Eken |
Security threats and solutions in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 139-143, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Zhirov, Olga Zhirova, Sergey Krendelev |
Practical fully homomorphic encryption over polynomial quotient rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 70-75, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hamed Momeni, Massoud Masoumi, Ali Dehghan 0001 |
A practical fault induction attack against an FPGA implementation of AES cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 134-138, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yanzhen Qu, Kelly Hughes |
Detecting metamorphic malware by using behavior-based aggregated signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 13-18, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Stupples |
WorldCIS-2013: Keynote speaker 2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 8, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Juraj Masar, Jirí Bartos, Cyril Klimes |
Deployment of mandatory access control policies of operating system under uncertainty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 123-127, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Ismael Ahmed, Mohamed Aborizka |
Remote Internet voting: Security and performance issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 56-64, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013 ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![IEEE, 978-1-908320-22-3 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sajjad Ahmed Ghauri, H. Humayun Shah, Hira Sajjad |
Comparison of different population strategies for multiuser detection using Genetic Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 65-68, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nawfal F. Fadhel, Richard M. Crowder, Gary B. Wills |
Approaches to maintaining provenance throughout the additive manufacturing process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 82-87, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tyson T. Brooks |
WorldCIS-2013: Keynote speaker 3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 9, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pasquale Stirparo, Igor Nai Fovino, Marco Taddeo, Ioannis Kounelis |
In-memory credentials robbery on android phones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 88-93, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Azzat Al-Sadi, Manaf Bin-Yahya, Ahmad Almulhem |
Identification of image fragments for file carving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 151-155, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Alenezi, Martin J. Reed |
Denial of service detection through TCP congestion window analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 145-150, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Antonia Rana, Andrea Ciardulli |
Identity verification through face recognition, Android smartphones and NFC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 162-163, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Divyajyoti Das, Somesh Nanda |
Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 95-98, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charles A. Shoniregun |
WorldCIS-2013: Keynote speaker 4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 10, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Irvin Homem, Spyridon Dosis, Oliver Popov |
LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 156-161, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jiang Wang, Leif Arne Rønningen |
Collaboration oriented 3D video encoding approach for the distributed multimedia plays. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 36-40, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed A. Alhomidi, Martin J. Reed |
Risk assessment and analysis through population-based attack graph modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 19-24, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Taha Lebbadi, Jackson Adams |
Integrating information technology (IT) to enhance compliance of safety management system in Syrian shipping companies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013, pp. 41-55, 2013, IEEE, 978-1-908320-22-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Taiwo Ayodele, Charles A. Shoniregun, Galyna A. Akmayeva |
Anti-phishing prevention measure for email systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 208-211, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | C. F. Larry Heimann, Alan Nochenson |
The effects of loss profiles in interdependent network security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 87-92, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Radek Holy, Jana Kalikova, Jan Scherks |
Security concept of individual identification in academic environment of CTU in Prague. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 71-76, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | M. Fahim Ferdous Khan, Ken Sakamura |
Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 66-70, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Nashwa A. F. Mohamed, Mohsin H. A. Hashim, Eihab B. M. Bashier, Mohammed Hassouna |
Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 167-172, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Emre Erturk |
A case study in open source software security and privacy: Android adware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 189-191, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Ping Lin, Sunil Menon, Shailesh Patel, Lin Lin |
Single Sign-On for multiple unified communications applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 110-116, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Prithviraj Patil, Sunil Pawar |
Remote agent based automated framework for threat modelling, vulnerability testing of SOA solutions and web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 127-131, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Thomas Scheffler, Sven Schindler, Bettina Schnor |
Enforcing location privacy policies through an AOP-based reference monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 51-56, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Vorapong Suppakitpaisarn, Hiroshi Imai, Masato Edahiro |
Fastest multi-scalar multiplication based on optimal double-base chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 93-98, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Des Fernando, Pavol Zavarsky |
Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phaseas needed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 218-222, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Sara Jeza Alotaibi, Mike Wald |
IAMS framework: A new framework for acceptable user experiences for integrating physical and virtual identity access management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 17-22, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Constantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban |
Using associative memories in coding theory for communication channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 245-248, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Chad M. S. Steel |
The Mask-SIFT cascading classifier for pornography detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 139-142, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Said Rabah Azzam, Shikun Zhou |
Developing compositional ontology alignment framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 123-125, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl |
An analysis of security weaknesses in the evolution of RFID enabled passport. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 158-166, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl |
Enhanced side-channel analysis method to detect hardware virtualization based rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 192-201, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Prince Onabajo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl |
The study of civil litigation in data storage environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 224-230, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Dimitry Drinfeld, Natalija Vlajic |
Smart crawlers for flash-crowd DDoS: The attacker's perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 37-44, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | P. R. Lakshmi Eswari, N. Sarat Chandra Babu |
A practical business security framework to combat malware threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 77-80, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Ho-Seok Kang, Sung-Ryul Kim |
Small DDoS defense system using routing deployment method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 204-206, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
1 | Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish |
A multi-layer data fusion system for Wi-Fi attack detection using automatic belief assignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WorldCIS ![In: 2012 World Congress on Internet Security, WorldCIS 2012, Guelph, ON, Canada, June 10-12, 2012, pp. 45-50, 2012, IEEE, 978-1-4673-1108-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|