The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke Information security policies: A review of challenges and influencing factors. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yi Hu, Dustin Sulek, Anthony Carella, Joshua Cox, Allyson Frame, Karen Cipriano Employing miniaturized computers for distributed vulnerability assessment. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Prathap Siddavaatam, Reza Sedaghat, Min Hsuan Cheng An adaptive security framework with extensible computational complexity for cipher systems. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki A survey of cyber-security awareness in Saudi Arabia. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammad Kamel Alomari Digital divide impact on e-voting adoption in middle eastern country. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammad Al-Smadi, Omar Qawasmeh, Bashar Talafha, Mahmoud Al-Ayyoub, Yaser Jararweh, Elhadj Benkhelifa An enhanced framework for aspect-based sentiment analysis of Hotels' reviews: Arabic reviews case study. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aasim Rafique, Shoaib Azam, Moongu Jeon, Sangwook Lee Face-deidentification in images using Restricted Boltzmann Machines. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yousuf Alsalami, Chan Yeob Yeun, Thomas Martin 0002, Majid Khonji Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zakia El Uahhabi, Hanan El Bakkali An approach for evaluating trust in X.509 certificates. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ons Jallouli, Safwan El Assad, Maryline Chetto Robust chaos-based stream-cipher for secure public communication channels. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Takashi Amano, Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura Gaze network extraction from bookmarks in accordance with search intentions. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Belghachi Mohamed, Feham Mohamed Experimental evaluation of RPL protocol. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ilaria Torre 0001, Frosina Koceva, Odnan Ref Sanchez, Giovanni Adorni A framework for personal data protection in the IoT. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1T. Nawrath, Daniel Fischer 0003, Bernd Markscheffel Privacy-sensitive data in connected cars. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Murizah Kassim, Nor Azura Ayop Adaptive Policing Algorithms on inbound internet traffic using Generalized Pareto model. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chung Kwan Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong System and Protocols for secure Intercloud Communications. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Neamah Al-Naffakh, Nathan L. Clarke, Paul Dowland 0001, Fudong Li 0001 Activity Recognition using wearable computing. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016 Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  BibTeX  RDF
1Sandra Stincic Clarke Keynote speaker 4: Data silos of the IoT kind. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mirko Koscina, Daniel Caragata Bench-marking of traditional cryptographic algorithms and chaos-based algorithms with DNA operations. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefan Kimak, Jeremy Ellman The role of HTML5 IndexedDB, the past, present and future. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Md. Rahatur Rahman, Shamim Akhter Bi-directional traffic management support system with decision tree based dynamic routing. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rwan Mahmoud, Tasneem Yousuf, Fadi A. Aloul, Imran A. Zualkernan Internet of things (IoT) security: Current status, challenges and prospective measures. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Azerikatoa D. Ayoung, Boyce Sigweni, Pamela Abbott Case-based reasoning system for predicting the sustainability of a telecentre. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Masahiro Yamada, Masanobu Morinaga, Yuki Unno, Satoru Torii, Masahiko Takenaka RAT-based malicious activities detection on enterprise internal networks. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aspen Olmsted Long running, consistent, web service transactions. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kheng Kok Mar, Chee Yong Law, Victoria Chin Secure personal cloud storage. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Min-Gu Kim, Sung Bum Pan A study on the flame detection and object classification technique using the color information. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bandar Aldawsari, Thar Baker, David England Towards a holistic brokerage system for multi-cloud environment. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kennedy A. Torkura, Feng Cheng 0002, Christoph Meinel Application of quantitative security metrics in cloud computing. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fatiha Merazka, Fulvio Babich Dynamic forward error correction algorithm over IP network services for ITU-T G.722.2 codec. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Abhijit Kiran Valluri Equilibrium properties of rate control protocols. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wahiba Hentabli, Fatiha Merazka An extension of RSA_512 to RSA_1024 core under hardware platform based on montgomery powering. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qutaibah Althebyan, Rami Mohawesh, Qussai Yaseen, Yaser Jararweh Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ons Jallouli, Safwan El Assad, Maryline Chetto, René Lozi, Daniel Caragata A novel chaotic generator based on weakly-coupled discrete skewtent maps. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Clinton Medbery, Aspen Olmsted HeartSync: Mobile pacemaker failure detector. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammed AbuTaha, Safwan El Assad, Mousa Farajallah, Audrey Queudet, Olivier Déforges Chaos-based cryptosystems using dependent diffusion: An overview. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Darren Hurley-Smith, Jodie Wetherall, Andrew A. Adekunle Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin Visser Keynote speaker 2: Swimming against the current - Dealing with ICS cyber threats in the Water Sector. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rachid Aouami, Essaid Sabir, Mounir Rifi, Mohamed Ouzzif Fountain-code-enabled DCF for optimazing throughput in wireless sensors. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gui-hyun Baek, Su-kyoung Kim, Ki-hong Ahn Framework for automatically construct ontology knowledge base from semi-structured datasets. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1G. Reshmi, C. S. Rakshmy A survey of authentication methods in mobile cloud computing. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shirish Kumar Singh, Bharavi Mishra, Saket Singh Detecting intelligent malware on dynamic Android analysis environments. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Batsayan Das, Lakshmipadmaja Maddali, Harshita Vani Nallagonda Role-based privilege isolation: A novel authorization model for Android smart devices. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ishmael Makitla, Jabu Mtsweni A generalized web service response time metric to support collaborative and corroborative web service monitoring. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ebrahim Al Alkeem, Chan Yeob Yeun, M. Jamal Zemerly Security and privacy framework for ubiquitous healthcare IoT devices. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel Pletea, Saeed Sedghi, Meilof Veeningen, Milan Petkovic Secure distributed key generation in attribute based encryption systems. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ronald M. Campbell, Keshnee Padayachee, Themba Masombuka A survey of honeypot research: Trends and opportunities. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aisha Suliaman Alazri The awareness of social engineering in information revolution: Techniques and challenges. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Duygu Sinanc Terzi, Ramazan Terzi, Seref Sagiroglu A survey on security and privacy issues in big data. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maha Althobaiti 0002, Pam J. Mayhew Usable security of authentication process: New approach and practical assessment. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nabil Abdoun, Safwan El Assad, Mohammad AbuTaha, Rima Assaf, Olivier Déforges, Mohamad Khalil Hash function based on efficient Chaotic Neural Network. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kennedy A. Torkura, Feng Cheng 0002, Christoph Meinel A proposed framework for proactive vulnerability assessments in cloud deployments. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Waqas Aman, Einar Snekkenes Managing security trade-offs in the Internet of Things using adaptive security. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Saud Alotaibi, Steven Furnell, Nathan L. Clarke Transparent authentication systems for mobile device security: A review. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, London, United Kingdom, December 14-16, 2015 Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  BibTeX  RDF
1Emad Sherif, Steven Furnell, Nathan L. Clarke Awareness, behaviour and culture: The ABC in cultivating security compliance. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christos Ntrigkogias, Nineta Polemi Assessment of research efforts in surveillance systems. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kevin Warwick ICITST honorary chair and distinguished keynote speaker: The cyborg experiments. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Richard Dennis, Gareth Owen Rep on the block: A next generation reputation system based on the blockchain. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Frank Zhigang Wang Keynote speaker 1: Computer Evolution over the next decade: Fact or fiction? Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Lebron, Hossain Shahriar, Rubana Yasmin Lupu Security concerns and mitigation approaches for MOOC-based applications. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Payingat Jilna, P. P. Deepthi, U. K. Jayaraj Optimized hardware design and implementation of EC based key management scheme for WSN. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mashail Al-khomsan, Alaa Al-Arjan, Abrar Al-Amro, Khalid Al-Nafjan Usability evaluation of Twitter on Android platform for elderly Arab users using morae evaluation tool. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, Oliver Rose Dragoon: Advanced modelling of IP geolocation by use of latency measurements. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Buti Al Delail, Chan Yeob Yeun Recent advances of smart glass application security and privacy. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lifei Zhan, Yuesheng Zhu Passive forensics for image splicing based on PCA noise estimation. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Himanshu Vats, Ron Ruhl, Shaun Aghili Fingerprint security for protecting EMV payment cards. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sajjad Ahmed Ghauri, Hasan Humayun, Mobeen Iqbal Low complexity linear equalization of doubly selective channel. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shafiq ur Réhman iBook: An interactive book system. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wong Seng Yue, Wong Lai Wan The effectiveness of digital game for introductory programming concepts. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yannis Soupionis, Thierry Benoist Cyber-physical testbed - The impact of cyber attacks and the human factor. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gabriel Biedima Peterside, Pavol Zavarsky, Sergey Butakov Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aspen Olmsted Keynote speaker 3: Secure software engineering in the cloud. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mincheol Kim Application of theory of reasoned action in u-health system. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guanyuan Feng, Xuezhi Tan, Lin Ma 0001 Visual location recognition using smartphone sensors for indoor environment. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maryline Chetto Keynote speaker 5: Issues in energy harvesting cyber-physical systems. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ahmad Al-Khasawneh Toward power consumption in partitioned Wireless Sensors Networks routing technique. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nineta Polemi, Spyros Papastergiou Current efforts in ports and supply chains risk assessment. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba 0001, Masayuki Murata 0001 Crawler classification using ant-based clustering scheme. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ibrahim Lahmer, Ning Zhang 0001 MapReduce: A critical analysis of existing authentication methods. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Soojin Yoon, JongHun Jung, Hwan-Kuk Kim Attacks on Web browsers with HTML5. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rohit Beniwal, Pavol Zavarsky, Dale Lindskog Study of compliance of Apple's location based APIs with recommendations of the IETF Geopriv. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vimal Kumar SathiyaBalan, Pavol Zavarsky, Dale Lindskog, Sergey Butakov Study of applicability of Chinese remainder theorem based group key management for cloud environment. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fatema Al Mansoori, Chan Yeob Yeun Emerging new trends of location based systems security. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sabah Al-Fedaghi Conceptual maps for physical security. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Muhammad Parvez, Pavol Zavarsky, Nidal Khoury Analysis of effectiveness of black-box web application scanners in detection of stored SQL injection and stored XSS vulnerabilities. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gabriele Spenger, Jörg Keller 0001 Security aspects of PRNGs with large state spaces. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Frank W. Geels Keynote speaker 4: Socio-technical transitions towards sustainability. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Norulzahrah Mohd. Zainudin, Suzaimah Ramli, Tuan Khalisah Tan Zizi, Nor Asiakin Hasbullah, Norazlin Ibrahim Facial expression change detection algorithm using optical flow technique. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1François Siewe, Ahmed Al-alshuhai From use case diagrams to executable context-aware ambients. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mehdi Fallahpour, David Megías 0001 Transparent high capacity audio watermarking in wavelet domain. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chit Nyi Nyi Hlyne, Pavol Zavarsky, Sergey Butakov SCAP benchmark for Cisco router security configuration compliance. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ruairí de Fréin Load-adjusted video quality prediction methods for missing data. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ali Farooq 0001, Syed Rameez Ullah Kakakhel, Seppo Virtanen, Jouni Isoaho A taxonomy of perceived information security and privacy threats among IT security students. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Abdulrazaq Almutairi, David J. Parish, James A. Flint Predicting multi-stage attacks based on IP information. Search on Bibsonomy ICITST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zobeida Jezabel Guzman-Zavaleta, Claudia Feregrino Uribe, Alejandra Menendez-Ortiz, Jose Juan Garcia-Hernandez A robust audio fingerprinting method using spectrograms saliency maps. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bamidele Moses Kuboye, Boniface Kayode Alese, Olumide Sunday Adewale Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networks. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Osama M. Ben Omran, Brajendra Panda A new technique to partition and manage data security in cloud databases. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Natalija Vlajic, Armin Slopek Performance and economies of 'bot-less' application-layer DDoS attacks. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 998 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license