The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICCST"( http://dblp.L3S.de/Venues/ICCST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iccst

Publication years (Num. hits)
2011 (59) 2012 (59) 2014 (85) 2015 (76) 2016 (54) 2017 (76) 2018 (53) 2019 (40) 2021 (34) 2022 (27) 2023 (41)
Publication types (Num. hits)
inproceedings(593) proceedings(11)
Venues (Conferences, Journals, ...)
ICCST(604)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 604 publication records. Showing 604 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ranjith Jayapal, Pramod Biometric encryption system for increased security. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stephen C. Stubberud, Kathleen A. Kramer Evidence accrual technique for information assurance. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shanta Rangaswamy, Shubham Ghosh, Srishti Jha, Soodamani Ramalingam Metadata extraction and classification of YouTube videos using sentiment analysis. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marius S. Vassiliou, David S. Alberts, Syed Shah Mission success: Assured communications and agile organizations. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andy Meecham, Tim Acker Underwater threat detection and tracking using multiple sensors and advanced processing. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chaofan Wang, Michael Olson, Nyambuu Dorjkhand, Shailesh Singh A novel DdTS technology based on fiber optics for early leak detection in pipelines. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrea Callia D'Iddio, Christian H. Schunck, Franco Arcieri, Maurizio Talamo Online and offline conformance checking of inter-organizational business processes with incomplete process logs. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Staley Limit state earned value analysis impact on network security project management decisions. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ryan Hancock, Stephen J. Elliott Evidence of correlation between fingerprint quality and skin attributes. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tomas Smetka, Ivan Homoliak, Petr Hanácek On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lester A. Cano A modern approach to security: Using systems engineering and data-driven decision-making. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Bourg, Pramod Govindan RSA based biometric encryption system using FPGA for increased security. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nazariy K. Shaydyuk, Timothy Cleland Biometric identification via retina scanning with liveness detection using speckle contrast imaging. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Edward L. Witzke Computer network security: Then and now. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ester Gonzalez-Sosa, Rubén Vera-Rodríguez, Julian Fiérrez, Javier Ortega-Garcia Dealing with occlusions in face recognition by region-based fusion. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vladimir Smejkal, Ladislav Sieger, Jindrich Kodl The influence of stress on biometric signature stability. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christer J. Wilkinson, Art Kosatka Airport security system standards development: Challenges and outcomes. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Derlin Morocho, Javier Hernandez-Ortega, Aythami Morales, Julian Fiérrez, Javier Ortega-Garcia On the evaluation of human ratings for signature recognition. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1S. Jeba Berlin, Mala John Human interaction recognition through deep learning network. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jefferson E. Odhner Covert ground and port surveillance using Hyperbox®: Rayleigh backscattering from fiber optics. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Somayeh Sobati Moghadam, Gérald Gavin, Jérôme Darmont A secure order-preserving indexing scheme for outsourced data. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jason McNeely, Michael Hatfield, Abir Hasan, Nusrat Jahan Detection of UAV hijacking and malfunctions via variations in flight data statistics. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fabio Garzia, Luca Papi An Internet of Everything based integrated security system for smart archaeological areas. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1 IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016 Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Miguel Maldonado, Darwin Alulema, Derlin Morocho, Marida Proano System for monitoring natural disasters using natural language processing in the social network Twitter. Search on Bibsonomy ICCST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ching-Wei Huang Security system and actual operation benefit of data transmission on heterogeneous network. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tzi-cker Chiueh, E. J. Chang, Robert Huang, Hogan Lee, Vernon Sung, M. H. Chiang Security considerations in ITRI cloud OS. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vincent E. Urias, William M. S. Stout, Caleb Loverro Computer network deception as a Moving Target Defense. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marcos Faúndez-Zanuy, Enric Sesa-Nogueras, Stefano Marinozzi Speaker identification experiments under gender De-identification. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Raul Sánchez-Reillo, Helga C. Quiros-Sandoval, Judith Liu-Jimenez, Ines Goicoechea-Telleria Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeries. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1James Rees Distributed multistage alert correlation architecture based on Hadoop. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chia-Ling Wu A goal-driven approach to modeling security concerns in network management system. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wei-Jen Wang, Hung-Lin Huang, Shan-Hao Chuang, Shao-Jui Chen, Chia Hung Kao, Deron Liang Virtual machines of high availability using hardware-assisted failure detection. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huang Liang Research of liquid CT image de-noising based on improved NL-means algorithm. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chih-Hung Hsieh, Wei-Chieh Chao, Pei-Wen Liu, Chao-Wen Li Cyber security risk assessment using an interpretable evolutionary fuzzy scoring system. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nicole Hättenschwiler, Stefan Michel, Milena Kuhn, Sandrina Ritzmann, Adrian Schwaninger A first exploratory study on the relevance of everyday object knowledge and training for increasing efficiency in airport security X-ray screening. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Natthakan Iam-on, Tossapon Boongoen Improving face classification with multiple-clustering induced feature reduction. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hayato Teduka A motion detection technique utilizing the size of encoded frame. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cristina Carmona-Duarte, Jaime Calvo-Gallego, Blas-Pablo Dorta-Naranjo, Miguel Angel Ferrer-Ballester Efficient detection algorithm for non-coherent high-resolution radar in sea clutter. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Juan Camilo Vásquez-Correa, Nicanor García, Juan Rafael Orozco-Arroyave, Julián David Arias-Londoño, Jesús Francisco Vargas-Bonilla, Elmar Nöth Emotion recognition from speech under environmental noise conditions using wavelet decomposition. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jen-Chieh Wang, Wei-Fun Cheng, Han-Chiang Chen, Hung-Li Chien Benefit of construct information security environment based on lightweight virtualization technology. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aythami Morales, Elena Luna-Garcia, Julian Fiérrez, Javier Ortega-Garcia Score normalization for keystroke dynamics biometrics. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hsiang-Te Liu, Yun-Ming Tang The causal model analysis of resident's evaluation of Closed Circuit TV and security perception. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ruben Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia, Julian Fiérrez Increasing the robustness of biometric templates for dynamic signature biometric systems. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tzung-Fu Tsai, Po-Chyi Su An information sharing scheme in halftone images based on multi-scale error diffusion. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ho-Hsing Hsieh, Chi-Yao Hsu, Po-Yu Ke, Guang-Sheen Liu, Chih-Ping Lin Appling Lidar-based obstacle detection and wireless image transmission system for improving safety at level crossings. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tossapon Boongoen, Natthakan Iam-on Discovering identity in intelligence data using weighted link based similarities: A case study of Thailand. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Adrian R. Chavez, William M. S. Stout, Sean Peisert Techniques for the dynamic randomization of network attributes. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sih-Huei Chen, Andri Santoso, Yuan-Shan Lee, Jia-Ching Wang Latent dirichlet allocation based blog analysis for criminal intention detection system. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chun-Yi Wang, Ya-Lyue Jhao, Chuan-Sheng Wang, Shih-Jen Chen, Fu-Hau Hsu, Yao-Hsin Chen The bilateral communication-based dynamic extensible honeypot. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Didi Rosiyadi, Shi-Jinn Horng, Nova Hadi Lestriandoko A resistant digital image watermarking scheme based on masking model. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chih-Hung Hsieh, Chia-Min Lai, Ching-Hao Mao, Tien-Cheu Kao, Kuo-Chen Lee AD2: Anomaly detection on active directory log data for insider threat monitoring. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fang-Chin Wu, Meng-Yi Chen, Chi-Hsiang Chao, Chang-En Pu Study on STR markers of DNA for improving the power of identification on cases in Taiwan. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fabio Garzia, Lorenzo Nesbitt, Roberto Cusani Adaptive genetic controller for the dynamic optmization of network traffic of integrated security systems. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lee Heon Soo Comparative analysis of Governmental Countermeasures to cyber attacks. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Judith Liu-Jimenez, Raul Sánchez-Reillo, Ramon Blanco-Gonzalo, Belen Fernandez-Saavedra Making stronger identity for EU citizens. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yongjun Ren, Jin Han, Jin Wang 0001, Liming Fang 0001 Privacy-preserving proof of storage in large group. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Antoniu L. Fantana, Selvakumar Ramachandran, Christian H. Schunck, Maurizio Talamo Movement based biometric authentication with smartphones. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kai-Fung Hong, Chien-Chih Chen, Yu-Ting Chiu, Kuo-Sen Chou Scalable command and control detection in log data through UF-ICF analysis. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Moisés Díaz Cabrera, Miguel A. Ferrer, Giuseppe Pirlo, Giuliano Giannico, Patricia Henríquez, Donato Impedovo Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Moisés Díaz Cabrera, Patricia Henríquez, Miguel A. Ferrer, Jesús B. Alonso, Giuseppe Pirlo, Donato Impedovo Novel method for early bearing fault detection based on dynamic stability measure. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Po-Ching Lin, Jyun-Chen Liu, Pin-Ren Chiou An event-based SDN architecture for network security analysis. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aythami Morales, Moisés Díaz Cabrera, Gloria Llinas-Sanchez, Miguel A. Ferrer Earprint recognition based on an ensemble of global and local features. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yanik Sterchi, Adrian Schwaninger A first simulation on optimizing EDS for cabin baggage screening regarding throughput. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Rodrigo Ros-Gomez, Belen Fernandez-Saavedra User acceptance of planar semiconductor fingerprint sensors. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vladimir Smejkal, Ladislav Sieger, Jindrich Kodl, Daniel Novák, Jakub Schneider The dynamic biometric signature - Is the biometric data in the created signature constant? Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yongjun Ren, Jian Shen 0001, Jin Wang 0001, Liming Fang 0001 Outsourced data tagging via authority and delegable auditing for cloud storage. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jing-Zhong Wang, Tian-Xi Wu, Tsung-Ying Sun An audio secret sharing system based on fractal encoding. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cheng-Lung Lee, Chun-Chih Lin, Ming-Fong Tai, Chi-Chang Liu Nuclear forensics and nuclear crime scene management problem in Taiwan. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Belen Fernandez-Saavedra, Raul Sánchez-Reillo, Carlos Sanchez-Redondo, Ramon Blanco-Gonzalo Testing of biometric systems integrated in mobile devices. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015 Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  BibTeX  RDF
1Charles Wharton, Kang-I Lin Comparative legislation, corporate policy, and citizen concerns: Legal solutions for privacy protection in cloud computing. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Der-ren Taur, Chung-Hsin Cheng A composite guidance for dual range AAM with side jet control. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tse-Shih Chen, Ming-Fen Lin, Tzi-cker Chiueh, Cheng-Hsin Chang, Wei-Heng Tai An intelligent surveillance video analysis service in cloud environment. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cheng-Ta Hsieh, Kuo-Chin Fan, Chin-Chuan Han Personal re-identification using rank-based manifold ranking. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Da-Yu Kao, Guan-Jie Wu A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO/IEC 27037: 2012. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chih-Hung Lin, Chin-Wei Tien, Chih-Wei Chen, Chia-Wei Tien, Hsing-Kuo Pao Efficient spear-phishing threat detection using hypervisor monitor. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yongjun Ren, Yaping Cheng, Jin Wang 0001, Liming Fang 0001 Data protection based on multifunction digital watermark in wireless sensor network. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hau-Ming Chang, Shu-Chiung Lin, Patrick S. Chen, Yu-Hsuan Hung A verification protocol of mobile payment based on signature recognition. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wan-Chen Hsieh, Chuan-Chi Wu, Yung-Wei Kao A study of android malware detection technology evolution. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yongjun Ren, Zhenqi Yang, Jin Wang 0001, Liming Fang 0001 Reliable access control for multi-authority in cloud storage. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pin-Jui Chen, Yen-Wen Chen Implementation of SDN based network intrusion detection and prevention system. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maurizio Talamo, Armanas Povilionis, Franco Arcieri, Christian H. Schunck Providing online operational support for distributed, security sensitive electronic business processes. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yi-Zeng Hsieh, Mu-Chun Su, Addison Y. S. Su, Wu-Rong Shih, Jen-Chih Yu, Chien-Yeh Huang The computational rules extractor in the detection of tax evasion. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chih Julie Wang, Arvin Huang-Te Li, Ming-Chih Wang, Cheng-Lung Lee Atomizing apparatus for development of latent fingerprints. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shaw-Shiun Deng, Hui-Zhen Gu, Chen-Wei Ku The design of battle field correlation tracks. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yi Ming Dai, Keh Shiou Liu TACSA: A web-service based system for coastal surveillance and situational awareness. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yao-Tang Chang, Yih-Chuan Lin The scrambling cryptography implemented with chaotic sequence trigger optical switch algorithm in WDM passive optical network. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chi-Ping Lin, Chuen-Fa Ni, I-Hsian Li, Chih-Heng Lu Stochastic delineation of well capture zones in aquifers of Choushui River alluvial fan in central Taiwan. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kun-Chi Lu, Angus F. M. Huang, Addison Y. S. Su, Ting-Jou Ding, Chiu-Nan Su Information password recovery with GPU. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shwu-Jing Chang, Kuan-Hung Yeh, Guan-Dun Peng, Shih-Ming Chang, Chung-Hao Huang From Safety to security - Pattern and anomaly detections in maritime trajectories. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ying-Dar Lin, Feng-Ze Liao, Shih-Kun Huang, Yuan-Cheng Lai Browser fuzzing by scheduled mutation and generation of document object models. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chung-Yi Lin, Ming-Che Chang, Hua-Chou Chiu, Keh-Hwa Shyu Secure logging framework integrating with cloud database. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aufaclav Zatu Kusuma Frisky, Chien-Yao Wang, Andri Santoso, Jia-Ching Wang Lip-based visual speech recognition system. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Huang Liang Risk-based optimization design for checkpoints in airports. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jain-Shing Wu, Wan-Ching Lin, Chih-Ta Lin, Te-En Wei Smartphone continuous authentication based on keystroke and gesture profiling. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jyh-Ren Shieh An end-to-end encrypted domain proximity recommendation system using secret sharing homomorphic cryptography. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chao-Ting Su, Hsi-Chun Wang Self-authentication watermark by digital halftoning. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi Cyber-security analysis and evaluation for smart home management solutions. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Meng-Yi Chen, Chang-En Pu, Fang-Chin Wu, Huei-Yu Lai, Chin-Wen Ho Rapidly mutating Y-STRs population data in Taiwan and haplotype probability estimation for forensic purposes. Search on Bibsonomy ICCST The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 604 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license