Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke |
Information security policies: A review of challenges and influencing factors. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yi Hu, Dustin Sulek, Anthony Carella, Joshua Cox, Allyson Frame, Karen Cipriano |
Employing miniaturized computers for distributed vulnerability assessment. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Prathap Siddavaatam, Reza Sedaghat, Min Hsuan Cheng |
An adaptive security framework with extensible computational complexity for cipher systems. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki |
A survey of cyber-security awareness in Saudi Arabia. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Kamel Alomari |
Digital divide impact on e-voting adoption in middle eastern country. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Al-Smadi, Omar Qawasmeh, Bashar Talafha, Mahmoud Al-Ayyoub, Yaser Jararweh, Elhadj Benkhelifa |
An enhanced framework for aspect-based sentiment analysis of Hotels' reviews: Arabic reviews case study. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aasim Rafique, Shoaib Azam, Moongu Jeon, Sangwook Lee |
Face-deidentification in images using Restricted Boltzmann Machines. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yousuf Alsalami, Chan Yeob Yeun, Thomas Martin 0002, Majid Khonji |
Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Zakia El Uahhabi, Hanan El Bakkali |
An approach for evaluating trust in X.509 certificates. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ons Jallouli, Safwan El Assad, Maryline Chetto |
Robust chaos-based stream-cipher for secure public communication channels. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Amano, Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura |
Gaze network extraction from bookmarks in accordance with search intentions. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Belghachi Mohamed, Feham Mohamed |
Experimental evaluation of RPL protocol. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ilaria Torre 0001, Frosina Koceva, Odnan Ref Sanchez, Giovanni Adorni |
A framework for personal data protection in the IoT. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | T. Nawrath, Daniel Fischer 0003, Bernd Markscheffel |
Privacy-sensitive data in connected cars. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Murizah Kassim, Nor Azura Ayop |
Adaptive Policing Algorithms on inbound internet traffic using Generalized Pareto model. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chung Kwan Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong |
System and Protocols for secure Intercloud Communications. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Neamah Al-Naffakh, Nathan L. Clarke, Paul Dowland 0001, Fudong Li 0001 |
Activity Recognition using wearable computing. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016 |
ICITST |
2016 |
DBLP BibTeX RDF |
|
1 | Sandra Stincic Clarke |
Keynote speaker 4: Data silos of the IoT kind. |
ICITST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mirko Koscina, Daniel Caragata |
Bench-marking of traditional cryptographic algorithms and chaos-based algorithms with DNA operations. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Kimak, Jeremy Ellman |
The role of HTML5 IndexedDB, the past, present and future. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Md. Rahatur Rahman, Shamim Akhter |
Bi-directional traffic management support system with decision tree based dynamic routing. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rwan Mahmoud, Tasneem Yousuf, Fadi A. Aloul, Imran A. Zualkernan |
Internet of things (IoT) security: Current status, challenges and prospective measures. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Azerikatoa D. Ayoung, Boyce Sigweni, Pamela Abbott |
Case-based reasoning system for predicting the sustainability of a telecentre. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Masahiro Yamada, Masanobu Morinaga, Yuki Unno, Satoru Torii, Masahiko Takenaka |
RAT-based malicious activities detection on enterprise internal networks. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aspen Olmsted |
Long running, consistent, web service transactions. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kheng Kok Mar, Chee Yong Law, Victoria Chin |
Secure personal cloud storage. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Min-Gu Kim, Sung Bum Pan |
A study on the flame detection and object classification technique using the color information. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bandar Aldawsari, Thar Baker, David England |
Towards a holistic brokerage system for multi-cloud environment. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kennedy A. Torkura, Feng Cheng 0002, Christoph Meinel |
Application of quantitative security metrics in cloud computing. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fatiha Merazka, Fulvio Babich |
Dynamic forward error correction algorithm over IP network services for ITU-T G.722.2 codec. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Abhijit Kiran Valluri |
Equilibrium properties of rate control protocols. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wahiba Hentabli, Fatiha Merazka |
An extension of RSA_512 to RSA_1024 core under hardware platform based on montgomery powering. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qutaibah Althebyan, Rami Mohawesh, Qussai Yaseen, Yaser Jararweh |
Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ons Jallouli, Safwan El Assad, Maryline Chetto, René Lozi, Daniel Caragata |
A novel chaotic generator based on weakly-coupled discrete skewtent maps. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Clinton Medbery, Aspen Olmsted |
HeartSync: Mobile pacemaker failure detector. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed AbuTaha, Safwan El Assad, Mousa Farajallah, Audrey Queudet, Olivier Déforges |
Chaos-based cryptosystems using dependent diffusion: An overview. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Darren Hurley-Smith, Jodie Wetherall, Andrew A. Adekunle |
Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Martin Visser |
Keynote speaker 2: Swimming against the current - Dealing with ICS cyber threats in the Water Sector. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rachid Aouami, Essaid Sabir, Mounir Rifi, Mohamed Ouzzif |
Fountain-code-enabled DCF for optimazing throughput in wireless sensors. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gui-hyun Baek, Su-kyoung Kim, Ki-hong Ahn |
Framework for automatically construct ontology knowledge base from semi-structured datasets. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | G. Reshmi, C. S. Rakshmy |
A survey of authentication methods in mobile cloud computing. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shirish Kumar Singh, Bharavi Mishra, Saket Singh |
Detecting intelligent malware on dynamic Android analysis environments. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Batsayan Das, Lakshmipadmaja Maddali, Harshita Vani Nallagonda |
Role-based privilege isolation: A novel authorization model for Android smart devices. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ishmael Makitla, Jabu Mtsweni |
A generalized web service response time metric to support collaborative and corroborative web service monitoring. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ebrahim Al Alkeem, Chan Yeob Yeun, M. Jamal Zemerly |
Security and privacy framework for ubiquitous healthcare IoT devices. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Pletea, Saeed Sedghi, Meilof Veeningen, Milan Petkovic |
Secure distributed key generation in attribute based encryption systems. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ronald M. Campbell, Keshnee Padayachee, Themba Masombuka |
A survey of honeypot research: Trends and opportunities. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aisha Suliaman Alazri |
The awareness of social engineering in information revolution: Techniques and challenges. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Duygu Sinanc Terzi, Ramazan Terzi, Seref Sagiroglu |
A survey on security and privacy issues in big data. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maha Althobaiti 0002, Pam J. Mayhew |
Usable security of authentication process: New approach and practical assessment. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nabil Abdoun, Safwan El Assad, Mohammad AbuTaha, Rima Assaf, Olivier Déforges, Mohamad Khalil |
Hash function based on efficient Chaotic Neural Network. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kennedy A. Torkura, Feng Cheng 0002, Christoph Meinel |
A proposed framework for proactive vulnerability assessments in cloud deployments. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Waqas Aman, Einar Snekkenes |
Managing security trade-offs in the Internet of Things using adaptive security. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Saud Alotaibi, Steven Furnell, Nathan L. Clarke |
Transparent authentication systems for mobile device security: A review. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, London, United Kingdom, December 14-16, 2015 |
ICITST |
2015 |
DBLP BibTeX RDF |
|
1 | Emad Sherif, Steven Furnell, Nathan L. Clarke |
Awareness, behaviour and culture: The ABC in cultivating security compliance. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christos Ntrigkogias, Nineta Polemi |
Assessment of research efforts in surveillance systems. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Warwick |
ICITST honorary chair and distinguished keynote speaker: The cyborg experiments. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Richard Dennis, Gareth Owen |
Rep on the block: A next generation reputation system based on the blockchain. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Frank Zhigang Wang |
Keynote speaker 1: Computer Evolution over the next decade: Fact or fiction? |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | David Lebron, Hossain Shahriar, Rubana Yasmin Lupu |
Security concerns and mitigation approaches for MOOC-based applications. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Payingat Jilna, P. P. Deepthi, U. K. Jayaraj |
Optimized hardware design and implementation of EC based key management scheme for WSN. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mashail Al-khomsan, Alaa Al-Arjan, Abrar Al-Amro, Khalid Al-Nafjan |
Usability evaluation of Twitter on Android platform for elderly Arab users using morae evaluation tool. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Peter Hillmann, Lars Stiemert, Gabi Dreo Rodosek, Oliver Rose |
Dragoon: Advanced modelling of IP geolocation by use of latency measurements. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Buti Al Delail, Chan Yeob Yeun |
Recent advances of smart glass application security and privacy. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lifei Zhan, Yuesheng Zhu |
Passive forensics for image splicing based on PCA noise estimation. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Himanshu Vats, Ron Ruhl, Shaun Aghili |
Fingerprint security for protecting EMV payment cards. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sajjad Ahmed Ghauri, Hasan Humayun, Mobeen Iqbal |
Low complexity linear equalization of doubly selective channel. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shafiq ur Réhman |
iBook: An interactive book system. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wong Seng Yue, Wong Lai Wan |
The effectiveness of digital game for introductory programming concepts. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yannis Soupionis, Thierry Benoist |
Cyber-physical testbed - The impact of cyber attacks and the human factor. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gabriel Biedima Peterside, Pavol Zavarsky, Sergey Butakov |
Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aspen Olmsted |
Keynote speaker 3: Secure software engineering in the cloud. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mincheol Kim |
Application of theory of reasoned action in u-health system. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Guanyuan Feng, Xuezhi Tan, Lin Ma 0001 |
Visual location recognition using smartphone sensors for indoor environment. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maryline Chetto |
Keynote speaker 5: Issues in energy harvesting cyber-physical systems. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Al-Khasawneh |
Toward power consumption in partitioned Wireless Sensors Networks routing technique. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nineta Polemi, Spyros Papastergiou |
Current efforts in ports and supply chains risk assessment. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Naomi Kuze, Shu Ishikura, Takeshi Yagi, Daiki Chiba 0001, Masayuki Murata 0001 |
Crawler classification using ant-based clustering scheme. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim Lahmer, Ning Zhang 0001 |
MapReduce: A critical analysis of existing authentication methods. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Soojin Yoon, JongHun Jung, Hwan-Kuk Kim |
Attacks on Web browsers with HTML5. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rohit Beniwal, Pavol Zavarsky, Dale Lindskog |
Study of compliance of Apple's location based APIs with recommendations of the IETF Geopriv. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vimal Kumar SathiyaBalan, Pavol Zavarsky, Dale Lindskog, Sergey Butakov |
Study of applicability of Chinese remainder theorem based group key management for cloud environment. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fatema Al Mansoori, Chan Yeob Yeun |
Emerging new trends of location based systems security. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sabah Al-Fedaghi |
Conceptual maps for physical security. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Parvez, Pavol Zavarsky, Nidal Khoury |
Analysis of effectiveness of black-box web application scanners in detection of stored SQL injection and stored XSS vulnerabilities. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gabriele Spenger, Jörg Keller 0001 |
Security aspects of PRNGs with large state spaces. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Frank W. Geels |
Keynote speaker 4: Socio-technical transitions towards sustainability. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Norulzahrah Mohd. Zainudin, Suzaimah Ramli, Tuan Khalisah Tan Zizi, Nor Asiakin Hasbullah, Norazlin Ibrahim |
Facial expression change detection algorithm using optical flow technique. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | François Siewe, Ahmed Al-alshuhai |
From use case diagrams to executable context-aware ambients. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mehdi Fallahpour, David Megías 0001 |
Transparent high capacity audio watermarking in wavelet domain. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chit Nyi Nyi Hlyne, Pavol Zavarsky, Sergey Butakov |
SCAP benchmark for Cisco router security configuration compliance. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ruairí de Fréin |
Load-adjusted video quality prediction methods for missing data. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ali Farooq 0001, Syed Rameez Ullah Kakakhel, Seppo Virtanen, Jouni Isoaho |
A taxonomy of perceived information security and privacy threats among IT security students. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Abdulrazaq Almutairi, David J. Parish, James A. Flint |
Predicting multi-stage attacks based on IP information. |
ICITST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zobeida Jezabel Guzman-Zavaleta, Claudia Feregrino Uribe, Alejandra Menendez-Ortiz, Jose Juan Garcia-Hernandez |
A robust audio fingerprinting method using spectrograms saliency maps. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bamidele Moses Kuboye, Boniface Kayode Alese, Olumide Sunday Adewale |
Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networks. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Osama M. Ben Omran, Brajendra Panda |
A new technique to partition and manage data security in cloud databases. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Natalija Vlajic, Armin Slopek |
Performance and economies of 'bot-less' application-layer DDoS attacks. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|