Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ranjith Jayapal, Pramod |
Biometric encryption system for increased security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-3, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Stephen C. Stubberud, Kathleen A. Kramer |
Evidence accrual technique for information assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shanta Rangaswamy, Shubham Ghosh, Srishti Jha, Soodamani Ramalingam |
Metadata extraction and classification of YouTube videos using sentiment analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-2, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marius S. Vassiliou, David S. Alberts, Syed Shah |
Mission success: Assured communications and agile organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-7, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andy Meecham, Tim Acker |
Underwater threat detection and tracking using multiple sensors and advanced processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-7, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chaofan Wang, Michael Olson, Nyambuu Dorjkhand, Shailesh Singh |
A novel DdTS technology based on fiber optics for early leak detection in pipelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Callia D'Iddio, Christian H. Schunck, Franco Arcieri, Maurizio Talamo |
Online and offline conformance checking of inter-organizational business processes with incomplete process logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Staley |
Limit state earned value analysis impact on network security project management decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-7, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Hancock, Stephen J. Elliott |
Evidence of correlation between fingerprint quality and skin attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-4, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tomas Smetka, Ivan Homoliak, Petr Hanácek |
On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lester A. Cano |
A modern approach to security: Using systems engineering and data-driven decision-making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Bourg, Pramod Govindan |
RSA based biometric encryption system using FPGA for increased security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-4, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nazariy K. Shaydyuk, Timothy Cleland |
Biometric identification via retina scanning with liveness detection using speckle contrast imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Edward L. Witzke |
Computer network security: Then and now. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-7, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ester Gonzalez-Sosa, Rubén Vera-Rodríguez, Julian Fiérrez, Javier Ortega-Garcia |
Dealing with occlusions in face recognition by region-based fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Smejkal, Ladislav Sieger, Jindrich Kodl |
The influence of stress on biometric signature stability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christer J. Wilkinson, Art Kosatka |
Airport security system standards development: Challenges and outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Derlin Morocho, Javier Hernandez-Ortega, Aythami Morales, Julian Fiérrez, Javier Ortega-Garcia |
On the evaluation of human ratings for signature recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | S. Jeba Berlin, Mala John |
Human interaction recognition through deep learning network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-4, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jefferson E. Odhner |
Covert ground and port surveillance using Hyperbox®: Rayleigh backscattering from fiber optics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Somayeh Sobati Moghadam, Gérald Gavin, Jérôme Darmont |
A secure order-preserving indexing scheme for outsourced data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-7, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jason McNeely, Michael Hatfield, Abir Hasan, Nusrat Jahan |
Detection of UAV hijacking and malfunctions via variations in flight data statistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Garzia, Luca Papi |
An Internet of Everything based integrated security system for smart archaeological areas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-8, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![IEEE, 978-1-5090-1072-1 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Maldonado, Darwin Alulema, Derlin Morocho, Marida Proano |
System for monitoring natural disasters using natural language processing in the social network Twitter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016, pp. 1-6, 2016, IEEE, 978-1-5090-1072-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ching-Wei Huang |
Security system and actual operation benefit of data transmission on heterogeneous network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 165-168, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tzi-cker Chiueh, E. J. Chang, Robert Huang, Hogan Lee, Vernon Sung, M. H. Chiang |
Security considerations in ITRI cloud OS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 107-112, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vincent E. Urias, William M. S. Stout, Caleb Loverro |
Computer network deception as a Moving Target Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marcos Faúndez-Zanuy, Enric Sesa-Nogueras, Stefano Marinozzi |
Speaker identification experiments under gender De-identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Raul Sánchez-Reillo, Helga C. Quiros-Sandoval, Judith Liu-Jimenez, Ines Goicoechea-Telleria |
Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 373-378, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | James Rees |
Distributed multistage alert correlation architecture based on Hadoop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 147-152, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chia-Ling Wu |
A goal-driven approach to modeling security concerns in network management system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 123-129, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Jen Wang, Hung-Lin Huang, Shan-Hao Chuang, Shao-Jui Chen, Chia Hung Kao, Deron Liang |
Virtual machines of high availability using hardware-assisted failure detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huang Liang |
Research of liquid CT image de-noising based on improved NL-means algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 359-362, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Hung Hsieh, Wei-Chieh Chao, Pei-Wen Liu, Chao-Wen Li |
Cyber security risk assessment using an interpretable evolutionary fuzzy scoring system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 153-158, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nicole Hättenschwiler, Stefan Michel, Milena Kuhn, Sandrina Ritzmann, Adrian Schwaninger |
A first exploratory study on the relevance of everyday object knowledge and training for increasing efficiency in airport security X-ray screening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 25-30, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Natthakan Iam-on, Tossapon Boongoen |
Improving face classification with multiple-clustering induced feature reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 241-246, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hayato Teduka |
A motion detection technique utilizing the size of encoded frame. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Carmona-Duarte, Jaime Calvo-Gallego, Blas-Pablo Dorta-Naranjo, Miguel Angel Ferrer-Ballester |
Efficient detection algorithm for non-coherent high-resolution radar in sea clutter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 421-426, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Juan Camilo Vásquez-Correa, Nicanor García, Juan Rafael Orozco-Arroyave, Julián David Arias-Londoño, Jesús Francisco Vargas-Bonilla, Elmar Nöth |
Emotion recognition from speech under environmental noise conditions using wavelet decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 247-252, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jen-Chieh Wang, Wei-Fun Cheng, Han-Chiang Chen, Hung-Li Chien |
Benefit of construct information security environment based on lightweight virtualization technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-4, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aythami Morales, Elena Luna-Garcia, Julian Fiérrez, Javier Ortega-Garcia |
Score normalization for keystroke dynamics biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 223-228, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hsiang-Te Liu, Yun-Ming Tang |
The causal model analysis of resident's evaluation of Closed Circuit TV and security perception. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 61-66, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ruben Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia, Julian Fiérrez |
Increasing the robustness of biometric templates for dynamic signature biometric systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 229-234, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tzung-Fu Tsai, Po-Chyi Su |
An information sharing scheme in halftone images based on multi-scale error diffusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 369-372, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ho-Hsing Hsieh, Chi-Yao Hsu, Po-Yu Ke, Guang-Sheen Liu, Chih-Ping Lin |
Appling Lidar-based obstacle detection and wireless image transmission system for improving safety at level crossings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 363-367, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tossapon Boongoen, Natthakan Iam-on |
Discovering identity in intelligence data using weighted link based similarities: A case study of Thailand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 327-332, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Adrian R. Chavez, William M. S. Stout, Sean Peisert |
Techniques for the dynamic randomization of network attributes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sih-Huei Chen, Andri Santoso, Yuan-Shan Lee, Jia-Ching Wang |
Latent dirichlet allocation based blog analysis for criminal intention detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 73-76, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chun-Yi Wang, Ya-Lyue Jhao, Chuan-Sheng Wang, Shih-Jen Chen, Fu-Hau Hsu, Yao-Hsin Chen |
The bilateral communication-based dynamic extensible honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 263-268, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Didi Rosiyadi, Shi-Jinn Horng, Nova Hadi Lestriandoko |
A resistant digital image watermarking scheme based on masking model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-4, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Hung Hsieh, Chia-Min Lai, Ching-Hao Mao, Tien-Cheu Kao, Kuo-Chen Lee |
AD2: Anomaly detection on active directory log data for insider threat monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 287-292, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fang-Chin Wu, Meng-Yi Chen, Chi-Hsiang Chao, Chang-En Pu |
Study on STR markers of DNA for improving the power of identification on cases in Taiwan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 403-408, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Garzia, Lorenzo Nesbitt, Roberto Cusani |
Adaptive genetic controller for the dynamic optmization of network traffic of integrated security systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lee Heon Soo |
Comparative analysis of Governmental Countermeasures to cyber attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Judith Liu-Jimenez, Raul Sánchez-Reillo, Ramon Blanco-Gonzalo, Belen Fernandez-Saavedra |
Making stronger identity for EU citizens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 333-339, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongjun Ren, Jin Han, Jin Wang 0001, Liming Fang 0001 |
Privacy-preserving proof of storage in large group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 269-272, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Antoniu L. Fantana, Selvakumar Ramachandran, Christian H. Schunck, Maurizio Talamo |
Movement based biometric authentication with smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 235-239, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Fung Hong, Chien-Chih Chen, Yu-Ting Chiu, Kuo-Sen Chou |
Scalable command and control detection in log data through UF-ICF analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 293-298, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Moisés Díaz Cabrera, Miguel A. Ferrer, Giuseppe Pirlo, Giuliano Giannico, Patricia Henríquez, Donato Impedovo |
Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 341-345, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Moisés Díaz Cabrera, Patricia Henríquez, Miguel A. Ferrer, Jesús B. Alonso, Giuseppe Pirlo, Donato Impedovo |
Novel method for early bearing fault detection based on dynamic stability measure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 43-47, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Po-Ching Lin, Jyun-Chen Liu, Pin-Ren Chiou |
An event-based SDN architecture for network security analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 159-164, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aythami Morales, Moisés Díaz Cabrera, Gloria Llinas-Sanchez, Miguel A. Ferrer |
Earprint recognition based on an ensemble of global and local features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 253-258, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yanik Sterchi, Adrian Schwaninger |
A first simulation on optimizing EDS for cabin baggage screening regarding throughput. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 55-60, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Rodrigo Ros-Gomez, Belen Fernandez-Saavedra |
User acceptance of planar semiconductor fingerprint sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 31-36, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Smejkal, Ladislav Sieger, Jindrich Kodl, Daniel Novák, Jakub Schneider |
The dynamic biometric signature - Is the biometric data in the created signature constant? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 385-390, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongjun Ren, Jian Shen 0001, Jin Wang 0001, Liming Fang 0001 |
Outsourced data tagging via authority and delegable auditing for cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 131-134, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing-Zhong Wang, Tian-Xi Wu, Tsung-Ying Sun |
An audio secret sharing system based on fractal encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 211-216, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-Lung Lee, Chun-Chih Lin, Ming-Fong Tai, Chi-Chang Liu |
Nuclear forensics and nuclear crime scene management problem in Taiwan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 277-280, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Belen Fernandez-Saavedra, Raul Sánchez-Reillo, Carlos Sanchez-Redondo, Ramon Blanco-Gonzalo |
Testing of biometric systems integrated in mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 321-326, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![IEEE, 978-1-4799-8690-3 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
1 | Charles Wharton, Kang-I Lin |
Comparative legislation, corporate policy, and citizen concerns: Legal solutions for privacy protection in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 19-24, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Der-ren Taur, Chung-Hsin Cheng |
A composite guidance for dual range AAM with side jet control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 185-189, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tse-Shih Chen, Ming-Fen Lin, Tzi-cker Chiueh, Cheng-Hsin Chang, Wei-Heng Tai |
An intelligent surveillance video analysis service in cloud environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-Ta Hsieh, Kuo-Chin Fan, Chin-Chuan Han |
Personal re-identification using rank-based manifold ranking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 391-394, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Da-Yu Kao, Guan-Jie Wu |
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO/IEC 27037: 2012. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 217-222, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Hung Lin, Chin-Wei Tien, Chih-Wei Chen, Chia-Wei Tien, Hsing-Kuo Pao |
Efficient spear-phishing threat detection using hypervisor monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 299-303, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongjun Ren, Yaping Cheng, Jin Wang 0001, Liming Fang 0001 |
Data protection based on multifunction digital watermark in wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 37-41, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hau-Ming Chang, Shu-Chiung Lin, Patrick S. Chen, Yu-Hsuan Hung |
A verification protocol of mobile payment based on signature recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 379-384, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wan-Chen Hsieh, Chuan-Chi Wu, Yung-Wei Kao |
A study of android malware detection technology evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 135-140, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongjun Ren, Zhenqi Yang, Jin Wang 0001, Liming Fang 0001 |
Reliable access control for multi-authority in cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 113-116, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pin-Jui Chen, Yen-Wen Chen |
Implementation of SDN based network intrusion detection and prevention system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 141-146, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maurizio Talamo, Armanas Povilionis, Franco Arcieri, Christian H. Schunck |
Providing online operational support for distributed, security sensitive electronic business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 49-54, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Zeng Hsieh, Mu-Chun Su, Addison Y. S. Su, Wu-Rong Shih, Jen-Chih Yu, Chien-Yeh Huang |
The computational rules extractor in the detection of tax evasion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 181-184, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chih Julie Wang, Arvin Huang-Te Li, Ming-Chih Wang, Cheng-Lung Lee |
Atomizing apparatus for development of latent fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 281-285, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shaw-Shiun Deng, Hui-Zhen Gu, Chen-Wei Ku |
The design of battle field correlation tracks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 175-180, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yi Ming Dai, Keh Shiou Liu |
TACSA: A web-service based system for coastal surveillance and situational awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 409-413, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yao-Tang Chang, Yih-Chuan Lin |
The scrambling cryptography implemented with chaotic sequence trigger optical switch algorithm in WDM passive optical network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 259-262, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Ping Lin, Chuen-Fa Ni, I-Hsian Li, Chih-Heng Lu |
Stochastic delineation of well capture zones in aquifers of Choushui River alluvial fan in central Taiwan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 427-432, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kun-Chi Lu, Angus F. M. Huang, Addison Y. S. Su, Ting-Jou Ding, Chiu-Nan Su |
Information password recovery with GPU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-5, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shwu-Jing Chang, Kuan-Hung Yeh, Guan-Dun Peng, Shih-Ming Chang, Chung-Hao Huang |
From Safety to security - Pattern and anomaly detections in maritime trajectories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 415-419, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ying-Dar Lin, Feng-Ze Liao, Shih-Kun Huang, Yuan-Cheng Lai |
Browser fuzzing by scheduled mutation and generation of document object models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chung-Yi Lin, Ming-Che Chang, Hua-Chou Chiu, Keh-Hwa Shyu |
Secure logging framework integrating with cloud database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 13-17, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aufaclav Zatu Kusuma Frisky, Chien-Yao Wang, Andri Santoso, Jia-Ching Wang |
Lip-based visual speech recognition system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 315-319, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huang Liang |
Risk-based optimization design for checkpoints in airports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 347-351, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jain-Shing Wu, Wan-Ching Lin, Chih-Ta Lin, Te-En Wei |
Smartphone continuous authentication based on keystroke and gesture profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 191-197, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jyh-Ren Shieh |
An end-to-end encrypted domain proximity recommendation system using secret sharing homomorphic cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chao-Ting Su, Hsi-Chun Wang |
Self-authentication watermark by digital halftoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi |
Cyber-security analysis and evaluation for smart home management solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 1-6, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Meng-Yi Chen, Chang-En Pu, Fang-Chin Wu, Huei-Yu Lai, Chin-Wen Ho |
Rapidly mutating Y-STRs population data in Taiwan and haplotype probability estimation for forensic purposes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015, pp. 395-402, 2015, IEEE, 978-1-4799-8690-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|