The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WorldCIS"( http://dblp.L3S.de/Venues/WorldCIS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/worldcis

Publication years (Num. hits)
2011 (47) 2012 (42) 2013 (30) 2014 (16) 2015 (32)
Publication types (Num. hits)
inproceedings(162) proceedings(5)
Venues (Conferences, Journals, ...)
WorldCIS(167)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 167 publication records. Showing 167 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Khalil A. Abuosba Multiagent trust management of Web services: The "Asynchronous Computing Environment Profile Unification Methodology" (ACEPUM). Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Melanie Volkamer Exploring mental models underlying PIN management strategies. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aspen Olmsted Ecurrency threat modeling and hardening. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tanjila Farah, Delwar Alam, Md. Alamgir Kabir, Touhid Bhuiyan SQLi penetration testing of financial Web applications: Investigation of Bangladesh region. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrews Greig, Karen Renaud, Stephen Flowerday An ethnographic study to assess the enactment of information security culture in a retail store. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yangseo Choi, Jooyoung Lee 0005, Sunoh Choi, Jong-Hyun Kim, Ikkyun Kim Transmitted file extraction and reconstruction from network packets. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ayahiko Niimi Deep learning for credit card data analysis. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sven Schindler, Bettina Schnor, Thomas Scheffler Taming the Ipv6 address space with hyhoneydv6. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gyu-Sang Cho Development of an anti-forensic tool for hiding message in a directory index of NTFS. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Charles A. Shoniregun PhD and doctorate consortium. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yong Sun, Feng Liu A cascaded feature selection approach in network intrusion detection. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Neyire Deniz Sarier Security analysis of revocable and bipartite biotokens. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Minho Han, Ikkyun Kim Anomaly detection method using network pattern analysis of process. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kholoud Althobaiti, Sara Jeza Alotaibi, Hend Alqahtani Random walk with jumps: A new query search method based on analysing Gnutella protocol. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christina-Angeliki Toli, Bart Preneel Provoking security: Spoofing attacks against crypto-biometric systems. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Matt Piazza, Aspen Olmsted Founding a cybersecurity club in a higher education environment: A case study. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 2015 World Congress on Internet Security, WorldCIS 2015, Dublin, Ireland, October 19-21, 2015 Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  BibTeX  RDF
1Abdurrahman Pektas, Tankut Acarman, Yliès Falcone, Jean-Claude Fernandez Runtime-behavior based malware classification using online machine learning. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sebastian Kurowski, Richard Litwing, Gero Lückemeyer A view on ISO/IEC 27001 compliant identity lifecycles for IT service providers. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sara Jeza Alotaibi Attendance system based on the Internet of Things for supporting blended learning. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Samuel Moses, Dale C. Rowe The SNAP principle for mitigating privileged account breaches: How secondary non-admin privileged accounts can reduce breach impact. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Taniza Binti Tajuddin, Azizah Abd Manaf Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shane Miller, Kevin Curran, Tom Lunney Securing the internet through the detection of anonymous proxy usage. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rodrigo Borges Nogueira, Ricardo Staciarini Puttini Reasoning on personal identifiers: A guideline for design and maintenance. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Liqun Chen Keynote speaker 1: Global harmonization of cryptographic standards. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Milliken, Yaxin Bi, Leo Galway, Glenn I. Hawe Ensemble learning utilising feature pairings for intrusion detection. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aspen Olmsted Keynote speaker 2: Secure software engineering in the cloud. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Galyna A. Akmayeva, George Ghinea Panel discussion: Secured environment for end-users and contents. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Suleyman Kondakci Human-related IT security: A reliability model for network and computer maintenance. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fara Yahya, Robert John Walters, Gary B. Wills Analysing threats in cloud storage. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1T. Divya Sai Keerthi, Pallapa Venkataram AODV route maintenance using HoneyPots in MANETs. Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Charles A. Shoniregun Keynote speaker 3: Can the Cloud be secured...? Search on Bibsonomy WorldCIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Roxanne Piderit, Stephen Flowerday The risk relationship between trust and information sharing in automotive supply chains. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera Fortifying TripAdvisor against reputation-system attacks. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Samuel Laurén, Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen Symbol diversification of linux binaries. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Natasa Suteva, Aleksandra Mileva, Mario Loleski Computer forensic analisys of some web attacks. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dalal Al-Azizy, David E. Millard, Nigel Shadbolt, Kieron O'Hara Deanonymisation in Linked Data: A research roadmap. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omer Ozulku, Nawfal F. Fadhel, David Argles, Gary B. Wills Anomaly detection system: Towards a framework for enterprise log management of security services. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Liezel Cilliers, Stephen Flowerday Information security in a public safety, participatory crowdsourcing smart city project. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bhawani Shanker Bhati, Pallapa Venkataram Data privacy preserving scheme in MANETs. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 2014 World Congress on Internet Security, WorldCIS 2014, London, United Kingdom, December 8-10, 2014 Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  BibTeX  RDF
1Nawfal F. Fadhel, Richard M. Crowder, Fatimah Y. Akeel, Gary B. Wills Component for 3D printing provenance framework: Security properties components for provenance framework. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pryde N. Sema, Pavol Zavarsky, Ron Ruhl A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear Facilities. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tamir Tsegaye, Stephen Flowerday Controls for protecting critical information infrastructure from cyberattacks. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hiroyuki Yoshimura Fingerprint templates generated by the fractional fourier, cosine and sine transforms and their generation conditions. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Akinola Ajijola, Pavol Zavarsky, Ron Ruhl A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nihar Vuppalapati, Joon S. Park Online Behavioral Advertising (OBA) with privacy protection. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zeyad S. Aaber, Richard M. Crowder, Nawfal F. Fadhel, Gary B. Wills Preventing document leakage through active document. Search on Bibsonomy WorldCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Takeshi Matsuda Feature extraction of web application attacks based on zeta distributions. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jeffrey J. Wiley WorldCIS-2013: Keynote speaker 1. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Naif Alajlan, Md. Saiful Islam 0001, Nassim Ammour Fusion of fingerprint and heartbeat biometrics using fuzzy adaptive genetic algorithm. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1SeongHan Shin, Kazukuni Kobara RSA-based Password-Authenticated Key Retrieval using multiple servers. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1William A. R. De Souza, Allan Tomlinson Understanding threats in a cloud infrastructure with no hypervisor. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Heba Kamal Aslan, Mohamed Rasslan A new multicast authentication protocol using erasure code functions and signcryption techniques. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christopher Hudel, Mohamed Shehab Optimizing search for malware by hashing smaller amounts of data. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Azin Moradmand Badie, Dale Lindskog, Ron Ruhl Responding to intrusions in mobile ad hoc networks. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ting Zhang, Dale Lindskog Full function Firewalls on MANETs: A routing storage and query mechanism for ROFL. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hanim Eken Security threats and solutions in cloud computing. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alexander Zhirov, Olga Zhirova, Sergey Krendelev Practical fully homomorphic encryption over polynomial quotient rings. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hamed Momeni, Massoud Masoumi, Ali Dehghan 0001 A practical fault induction attack against an FPGA implementation of AES cryptosystem. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yanzhen Qu, Kelly Hughes Detecting metamorphic malware by using behavior-based aggregated signature. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Stupples WorldCIS-2013: Keynote speaker 2. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Juraj Masar, Jirí Bartos, Cyril Klimes Deployment of mandatory access control policies of operating system under uncertainty. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed Ismael Ahmed, Mohamed Aborizka Remote Internet voting: Security and performance issues. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 2013 World Congress on Internet Security, WorldCIS 2013, London, United Kingdom, December 9-12, 2013 Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sajjad Ahmed Ghauri, H. Humayun Shah, Hira Sajjad Comparison of different population strategies for multiuser detection using Genetic Algorithm. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nawfal F. Fadhel, Richard M. Crowder, Gary B. Wills Approaches to maintaining provenance throughout the additive manufacturing process. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tyson T. Brooks WorldCIS-2013: Keynote speaker 3. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pasquale Stirparo, Igor Nai Fovino, Marco Taddeo, Ioannis Kounelis In-memory credentials robbery on android phones. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Azzat Al-Sadi, Manaf Bin-Yahya, Ahmad Almulhem Identification of image fragments for file carving. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed Alenezi, Martin J. Reed Denial of service detection through TCP congestion window analysis. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Antonia Rana, Andrea Ciardulli Identity verification through face recognition, Android smartphones and NFC. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Divyajyoti Das, Somesh Nanda Securing computer networks by networking multiple OS kernels. Revisting network security: Protecting computer networks from malwares. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Charles A. Shoniregun WorldCIS-2013: Keynote speaker 4. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Irvin Homem, Spyridon Dosis, Oliver Popov LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jiang Wang, Leif Arne Rønningen Collaboration oriented 3D video encoding approach for the distributed multimedia plays. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed A. Alhomidi, Martin J. Reed Risk assessment and analysis through population-based attack graph modelling. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Taha Lebbadi, Jackson Adams Integrating information technology (IT) to enhance compliance of safety management system in Syrian shipping companies. Search on Bibsonomy WorldCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Taiwo Ayodele, Charles A. Shoniregun, Galyna A. Akmayeva Anti-phishing prevention measure for email systems. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1C. F. Larry Heimann, Alan Nochenson The effects of loss profiles in interdependent network security. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Radek Holy, Jana Kalikova, Jan Scherks Security concept of individual identification in academic environment of CTU in Prague. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1M. Fahim Ferdous Khan, Ken Sakamura Toward a synergy among discretionary, role-based and context-aware access control models in healthcare information technology. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Nashwa A. F. Mohamed, Mohsin H. A. Hashim, Eihab B. M. Bashier, Mohammed Hassouna Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Emre Erturk A case study in open source software security and privacy: Android adware. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Ping Lin, Sunil Menon, Shailesh Patel, Lin Lin Single Sign-On for multiple unified communications applications. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Prithviraj Patil, Sunil Pawar Remote agent based automated framework for threat modelling, vulnerability testing of SOA solutions and web services. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Thomas Scheffler, Sven Schindler, Bettina Schnor Enforcing location privacy policies through an AOP-based reference monitor. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Vorapong Suppakitpaisarn, Hiroshi Imai, Masato Edahiro Fastest multi-scalar multiplication based on optimal double-base chains. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Des Fernando, Pavol Zavarsky Secure decommissioning of confidential electronically stored information (CESI): A framework for managing CESI in the disposal phaseas needed. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Sara Jeza Alotaibi, Mike Wald IAMS framework: A new framework for acceptable user experiences for integrating physical and virtual identity access management systems. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Constantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban Using associative memories in coding theory for communication channels. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Chad M. S. Steel The Mask-SIFT cascading classifier for pornography detection. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Said Rabah Azzam, Shikun Zhou Developing compositional ontology alignment framework. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Eyad Abdullah Bogari, Pavol Zavarsky, Dale Lindskog, Ron Ruhl An analysis of security weaknesses in the evolution of RFID enabled passport. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Iain Kyte, Pavol Zavarsky, Dale Lindskog, Ron Ruhl Enhanced side-channel analysis method to detect hardware virtualization based rootkits. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Prince Onabajo, Pavol Zavarsky, Dale Lindskog, Ron Ruhl The study of civil litigation in data storage environment. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Dimitry Drinfeld, Natalija Vlajic Smart crawlers for flash-crowd DDoS: The attacker's perspective. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1P. R. Lakshmi Eswari, N. Sarat Chandra Babu A practical business security framework to combat malware threat. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Ho-Seok Kang, Sung-Ryul Kim Small DDoS defense system using routing deployment method. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
1Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish A multi-layer data fusion system for Wi-Fi attack detection using automatic belief assignment. Search on Bibsonomy WorldCIS The full citation details ... 2012 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 167 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license