Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Sanjay Kumar, Ari Viinikainen, Timo Hämäläinen 0002 |
Evaluation of ensemble machine learning methods in mobile threat detection. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ali Aydin Selçuk, Fatih Orhan, Berker Batur |
Undecidable problems in malware analysis. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Seth Stoudenmier, Aspen Olmsted |
Efficient retrieval of information from hierarchical REST requests. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nabil Abdoun, Safwan El Assad, Khodor Hammoud, Rima Assaf, Mohamad Khalil, Olivier Déforges |
New keyed chaotic neural network hash function based on sponge construction. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Casey Wilson, Aspen Olmsted |
Handling an organization's communication needs with a single web service. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Walter Blair, Aspen Olmsted, Paul Anderson |
Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input files. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Md. Tomig Uddin Ahmed, Nazrul Islam Bhuiya, Md. Mahbubur Rahman |
A secure enterprise architecture focused on security and technology-transformation (SEAST). |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ta Thi Kim Hue, Thang Manh Hoang, An Braeken |
Lightweight signcryption scheme based on discrete Chebyshev maps. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Omego Obinna, Eckhard Pfluegel, Charles A. Clarke, Martin J. Tunnicliffe |
A multi-channel steganographic protocol for secure SMS mobile banking. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Prathap Siddavaatam, Reza Sedaghat, Aakriti Tarun Sharma |
intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gary B. Wills |
Keynote speaker 3: Looking after our IP in supply chain. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian |
Work in Progress: Nobody knows who you really are online/on the world wide web - Amazon-recognition-service based 'Virtualnet' supported authentication: How certain are you it is indeed you in front of a screen? |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Paweena Wanchai |
Customer churn analysis : A case study on the telecommunication industry of Thailand. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anne E. James |
Keynote speaker 4: Cloud forensics. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kritika Kongsoontornkijkul, Rath Pichyangkura, Pakpachong Vadhanasindhu, Kanlaya Vanichbuncha |
A study of factors effecting Thailand talent mobility programme: Case of university and food technology industry. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shaikha AlShehyari, Chan Yeob Yeun, Ernesto Damiani |
Monitoring darknet activities by using network telescope. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Fischer 0003, Bernd Markscheffel, K. Scherr |
Secure e-mail communication - Comparison and selection of encryption solutions using an utility value analysis approach. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Abidullah Zarghoon, Irfan Awan, Jules Pagna Disso, Richard Dennis |
Evaluation of AV systems against modern malware. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Charles Kim |
Keynote speaker 1: Cyber-resilient ICS through diversified redundancy and intrusion detection. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer |
Towards a security baseline for IaaS-cloud back-ends in Industry 4.0. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fayez Alotaibi, Nathan L. Clarke, Steven Furnell |
An analysis of home user security awareness & education. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Husna Siddiqui, Elizabeth Healy, Aspen Olmsted |
Bot or not. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Deepak Janardhanan, Enda Barrett |
CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yen-Mei Lee |
Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Roman Graf, Ross King |
Secured transactions technique based on smart contracts for situational awareness tools. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Timibloudi S. Enamamu, Nathan L. Clarke, Paul S. Haskell-Dowland, Fudong Li 0001 |
Transparent authentication: Utilising heart rate for user authentication. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pasha Sadeghian, Casey Wilson, Stephen Goeddel, Aspen Olmsted |
Classification of music by composer using fuzzy min-max neural networks. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Steven Furnell |
Keynote speaker 5: Taming security technology. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nagul Cooharojananone, Krittika Akasarakul, Thipsuda Wongkhamdi, Phonkornkrit Pruetthiwongwanich, Kanokwan Atchariyachanvanich |
The study of the local community products (OTOP) website characteristics toward buyer decision using eye tracking. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Gerhard Tauber |
On the cost of cyber security in smart business. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Paul Helling, Ahana Roy, Aspen Olmsted |
Effects of lexicon size on solving bananagrams. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Casey Wilson, Anna V. Sandifer, Aspen Olmsted |
Designing an assembly language using MIT App inventor. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Evangelos Pournaras |
Keynote speaker 2: Participatory self-management systems for resilient smart cities. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tiago Vieira, Carlos Serrão |
Web security in the finance sector. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kheng Kok Mar, ZhengQing Hu, Chee Yong Law, Meifen Wang |
Secure cloud distributed file system. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav Varshney, Manoj Misra, Pradeep K. Atrey |
Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Robin Fay, Christoph Ruland |
Compressive Sensing encryption modes and their security. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Leandro Ordoñez-Ante, Thomas Vanhove, Gregory van Seghbroeck, Tim Wauters, Filip De Turck |
Interactive querying and data visualization for abuse detection in social network sites. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Martin Visser |
Keynote speaker 1: Critical Infrastructures SMART ready? |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alex M. S. Orozco, Charles V. Neu, Regio A. Michelin, Avelino F. Zorzo |
Security analysis of forwarding strategies in network time measurements using Openflow. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Arakawa, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura |
Dynamically visualizing the relationships between Web pages depending on user's search viewpoints. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim Almarashdeh, Mutasem Alsmadi |
Heuristic evaluation of mobile government portal services: An experts' review. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera |
Range query integrity in the cloud: the case of video surveillance. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gabriele Spenger, Jörg Keller 0001 |
Structural improvements of chaotic PRNG implementations. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hlib Mykhailenko, Giovanni Neglia, Fabrice Huet |
Which metrics for vertex-cut partitioning? |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Adnan Ahmed 0001, Pardeep Kumar 0003, Ali Raza Bhangwar, Muhammad Ibrahim Channa |
A secure and QoS aware routing protocol for Wireless Sensor Network. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gozde Ozcan, Sule Gündüz Ögüdücü |
Applying different classification techniques in reciprocal job recommender system for considering job candidate preferences. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michal Kvet, Monika Vajsová |
Performance study of the index structures in audited environment. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Steven Furnell, Charles A. Shoniregun |
Welcome message. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Greco, Alberto Caponi, Giuseppe Bianchi 0001 |
Facing lateral movements using widespread behavioral probes. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Niranjan Sivakumar, Maxime Crepel, Dominique Boullier |
Risk management in payment system architectures. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Isil Karabey, Gamze Akman |
A cryptographic approach for secure client - server chat application using public key infrastructure (PKI). |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sanjay Kumar, Ari Viinikainen, Timo Hämäläinen 0002 |
Machine learning classification model for Network based Intrusion Detection System. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Mohammed A. Shehab, Yaser Jararweh, Bernard J. Jansen |
Using the Panama Papers to explore the financial networks of the Middle East. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Khawla Alghafli 0001, Thomas Martin 0002 |
Identification and recovery of video fragments for forensics file carving. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Dennis M. Lupiana, Fredrick Mtenzi |
KiCM: A knowledge-intensive context model. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gerard Vidal, Rabei Bechikh, Rhouma Rhouma, Safya Belghith |
A commercial application of a chaos-based-stream cipher: Performance and Security analysis. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jarkko Kuusijärvi, Reijo Savola, Pekka Savolainen, Antti Evesti |
Mitigating IoT security threats with a trusted Network element. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aneesha Sethi, Federica Paci, Gary B. Wills |
EEVi - framework for evaluating the effectiveness of visualization in cyber-security. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Radu Velea, Noel Gordon |
Comparison of color profile gamut coverage for computer monitors. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Oleg Garasym, Ina Taralova, René Lozi |
Key requirements for the design of robust chaotic PRNG. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aspen Olmsted |
Modeling cloud applications for partition contingency. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aymen J. Salman, Adil Al-Yasiri |
Developing Domain-Specific Language for Wireless Sensor Network application development. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Emad Al-Mohammed, Nigel Linge |
A generic, personalized electronic program guide system for accessing multiple online TV providers. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Louis Tajan, Dirk Westhoff, Christian A. Reuter, Frederik Armknecht |
Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Lopez Hernandez-Ardieta |
Keynote speaker 2: Cyber ranges: The (r)evolution in cybersecurity training. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Óscar Corcho |
Keynote speaker 3: Open Data city portals: Working towards their homogeneisation. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas, Thales Guimaraes Marques |
Virtualization technologies in web conferencing systems: A performance overview. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andres Paz Sampedro, Shantanu Srivastava |
Cost to serve of large scale online systems. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nouredine Seddiki, Amel Douli |
Maximizing the wireless sensor networks lifetime. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sophia Moganedi, Njabulo Mkhonto, Jabu Mtsweni |
Evaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing services. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Asad Masood Khattak, Farkhund Iqbal, Patrick C. K. Hung, Jwo-Shiun Sun, Guan-Pu Pan, Jing-Jie Lin |
Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD). |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Amina Djellalbia, Nadjib Badache, Souad Benmeziane, Sihem Bensimessaoud |
Anonymous authentication scheme in e-Health Cloud environment. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aisha Suliaman Alazri |
Telecommunication traffic through submarine cables: Security and vulnerabilities. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Carles Antón-Haro |
Invited speaker (IEEE Spain section professional activities): Scientific resumes and job interviews - how to make (a positive) impact. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Madeline Little, Aspen Olmsted |
Temporal resource scheduling equity. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Nardone, Ricardo J. Rodríguez, Stefano Marrone 0001 |
Formal security assessment of Modbus protocol. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tomas Marques-Arpa, Jordi Serra-Ruiz |
PRS signal in acquiring evidence of Digital Chain of Custody. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sean T. Miller, Curtis Busby-Earle |
The role of machine learning in botnet detection. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Seyed Mahdi Jameii, Mohsen Maadani |
Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Benfilali Mostefa, Sofiane Boukli Hacene |
Adaptive image compression in wireless sensor networks. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lotfi Hajjem, Salah Benabdallah |
An MMAS-GA for resource allocation in multi-cloud systems. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed A. Nassar, Layla A. A. El-Sayed, Yousry Taha |
Efficient parallel Stochastic Gradient Descent for matrix factorization using GPU. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aiman Ghannami, Chenxi Shao |
Efficient fast recovery mechanism in Software-Defined Networks: Multipath routing approach. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Moses Moyo, Marianne Loock |
South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Norah Ahmed Almubairik, Gary B. Wills |
Automated penetration testing based on a threat model. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Regio A. Michelin, Avelino F. Zorzo, Marcia B. Campos, Charles V. Neu, Alex M. S. Orozco |
Smartphone as a biometric service for web authentication. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | S. Srinivasan |
Data privacy concerns involving cloud. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tasneem Salah, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi |
The evolution of distributed systems towards microservices architecture. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Samaneh Rashidibajgan |
A trust structure for detection of sybil attacks in opportunistic networks. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gaseb Alotibi, Nathan L. Clarke, Fudong Li 0001, Steven Furnell |
User profiling from network traffic via novel application-level interactions. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Antonis Michalas |
Sharing in the rain: Secure and efficient data sharing for the Cloud. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Lizbeth Guzman-Candelario, Jose Juan Garcia-Hernandez, Loreto Gonzalez-Hernandez |
A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tiago Santos, Carlos Serrão |
Secure Javascript Object Notation (SecJSON) Enabling granular confidentiality and integrity of JSON documents. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Charles V. Neu, Avelino F. Zorzo, Alex M. S. Orozco, Regio A. Michelin |
An approach for detecting encrypted insider attacks on OpenFlow SDN Networks. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lo'ai Ali Tawalbeh, Turki F. Al-Somani, Hilal Houssain |
Towards secure communications: Review of side channel attacks and countermeasures on ECC. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aiman Ghannami, Chenxi Shao |
Experience-based learning for identifying sub-regions in Wireless Sensor Networks. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Neyire Deniz Sarier |
Efficient biometric-based Encryption for fingerprints. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, Hiroaki Kaminaga, Youzou Miyadera |
Learning History Transition Graphs for understanding the programming learning situations. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sihem Bensimessaoud, Nadjib Badache, Souad Benmeziane, Amina Djellalbia |
An enhanced approach to preserving privacy in social network data publishing. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|