Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ranjith Jayapal, Pramod |
Biometric encryption system for increased security. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Stephen C. Stubberud, Kathleen A. Kramer |
Evidence accrual technique for information assurance. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shanta Rangaswamy, Shubham Ghosh, Srishti Jha, Soodamani Ramalingam |
Metadata extraction and classification of YouTube videos using sentiment analysis. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marius S. Vassiliou, David S. Alberts, Syed Shah |
Mission success: Assured communications and agile organizations. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andy Meecham, Tim Acker |
Underwater threat detection and tracking using multiple sensors and advanced processing. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Chaofan Wang, Michael Olson, Nyambuu Dorjkhand, Shailesh Singh |
A novel DdTS technology based on fiber optics for early leak detection in pipelines. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Callia D'Iddio, Christian H. Schunck, Franco Arcieri, Maurizio Talamo |
Online and offline conformance checking of inter-organizational business processes with incomplete process logs. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Staley |
Limit state earned value analysis impact on network security project management decisions. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Hancock, Stephen J. Elliott |
Evidence of correlation between fingerprint quality and skin attributes. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tomas Smetka, Ivan Homoliak, Petr Hanácek |
On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithm. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Lester A. Cano |
A modern approach to security: Using systems engineering and data-driven decision-making. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Michael Bourg, Pramod Govindan |
RSA based biometric encryption system using FPGA for increased security. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Nazariy K. Shaydyuk, Timothy Cleland |
Biometric identification via retina scanning with liveness detection using speckle contrast imaging. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Edward L. Witzke |
Computer network security: Then and now. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ester Gonzalez-Sosa, Rubén Vera-Rodríguez, Julian Fiérrez, Javier Ortega-Garcia |
Dealing with occlusions in face recognition by region-based fusion. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Smejkal, Ladislav Sieger, Jindrich Kodl |
The influence of stress on biometric signature stability. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christer J. Wilkinson, Art Kosatka |
Airport security system standards development: Challenges and outcomes. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Derlin Morocho, Javier Hernandez-Ortega, Aythami Morales, Julian Fiérrez, Javier Ortega-Garcia |
On the evaluation of human ratings for signature recognition. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | S. Jeba Berlin, Mala John |
Human interaction recognition through deep learning network. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jefferson E. Odhner |
Covert ground and port surveillance using Hyperbox®: Rayleigh backscattering from fiber optics. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Somayeh Sobati Moghadam, Gérald Gavin, Jérôme Darmont |
A secure order-preserving indexing scheme for outsourced data. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jason McNeely, Michael Hatfield, Abir Hasan, Nusrat Jahan |
Detection of UAV hijacking and malfunctions via variations in flight data statistics. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Garzia, Luca Papi |
An Internet of Everything based integrated security system for smart archaeological areas. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | |
IEEE International Carnahan Conference on Security Technology, ICCST 2016, Orlando, FL, USA, October 24-27, 2016 |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Miguel Maldonado, Darwin Alulema, Derlin Morocho, Marida Proano |
System for monitoring natural disasters using natural language processing in the social network Twitter. |
ICCST |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ching-Wei Huang |
Security system and actual operation benefit of data transmission on heterogeneous network. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tzi-cker Chiueh, E. J. Chang, Robert Huang, Hogan Lee, Vernon Sung, M. H. Chiang |
Security considerations in ITRI cloud OS. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vincent E. Urias, William M. S. Stout, Caleb Loverro |
Computer network deception as a Moving Target Defense. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marcos Faúndez-Zanuy, Enric Sesa-Nogueras, Stefano Marinozzi |
Speaker identification experiments under gender De-identification. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Raul Sánchez-Reillo, Helga C. Quiros-Sandoval, Judith Liu-Jimenez, Ines Goicoechea-Telleria |
Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeries. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | James Rees |
Distributed multistage alert correlation architecture based on Hadoop. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chia-Ling Wu |
A goal-driven approach to modeling security concerns in network management system. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Jen Wang, Hung-Lin Huang, Shan-Hao Chuang, Shao-Jui Chen, Chia Hung Kao, Deron Liang |
Virtual machines of high availability using hardware-assisted failure detection. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huang Liang |
Research of liquid CT image de-noising based on improved NL-means algorithm. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Hung Hsieh, Wei-Chieh Chao, Pei-Wen Liu, Chao-Wen Li |
Cyber security risk assessment using an interpretable evolutionary fuzzy scoring system. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nicole Hättenschwiler, Stefan Michel, Milena Kuhn, Sandrina Ritzmann, Adrian Schwaninger |
A first exploratory study on the relevance of everyday object knowledge and training for increasing efficiency in airport security X-ray screening. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Natthakan Iam-on, Tossapon Boongoen |
Improving face classification with multiple-clustering induced feature reduction. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hayato Teduka |
A motion detection technique utilizing the size of encoded frame. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Carmona-Duarte, Jaime Calvo-Gallego, Blas-Pablo Dorta-Naranjo, Miguel Angel Ferrer-Ballester |
Efficient detection algorithm for non-coherent high-resolution radar in sea clutter. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Juan Camilo Vásquez-Correa, Nicanor García, Juan Rafael Orozco-Arroyave, Julián David Arias-Londoño, Jesús Francisco Vargas-Bonilla, Elmar Nöth |
Emotion recognition from speech under environmental noise conditions using wavelet decomposition. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jen-Chieh Wang, Wei-Fun Cheng, Han-Chiang Chen, Hung-Li Chien |
Benefit of construct information security environment based on lightweight virtualization technology. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aythami Morales, Elena Luna-Garcia, Julian Fiérrez, Javier Ortega-Garcia |
Score normalization for keystroke dynamics biometrics. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hsiang-Te Liu, Yun-Ming Tang |
The causal model analysis of resident's evaluation of Closed Circuit TV and security perception. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ruben Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia, Julian Fiérrez |
Increasing the robustness of biometric templates for dynamic signature biometric systems. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tzung-Fu Tsai, Po-Chyi Su |
An information sharing scheme in halftone images based on multi-scale error diffusion. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ho-Hsing Hsieh, Chi-Yao Hsu, Po-Yu Ke, Guang-Sheen Liu, Chih-Ping Lin |
Appling Lidar-based obstacle detection and wireless image transmission system for improving safety at level crossings. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tossapon Boongoen, Natthakan Iam-on |
Discovering identity in intelligence data using weighted link based similarities: A case study of Thailand. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Adrian R. Chavez, William M. S. Stout, Sean Peisert |
Techniques for the dynamic randomization of network attributes. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sih-Huei Chen, Andri Santoso, Yuan-Shan Lee, Jia-Ching Wang |
Latent dirichlet allocation based blog analysis for criminal intention detection system. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chun-Yi Wang, Ya-Lyue Jhao, Chuan-Sheng Wang, Shih-Jen Chen, Fu-Hau Hsu, Yao-Hsin Chen |
The bilateral communication-based dynamic extensible honeypot. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Didi Rosiyadi, Shi-Jinn Horng, Nova Hadi Lestriandoko |
A resistant digital image watermarking scheme based on masking model. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Hung Hsieh, Chia-Min Lai, Ching-Hao Mao, Tien-Cheu Kao, Kuo-Chen Lee |
AD2: Anomaly detection on active directory log data for insider threat monitoring. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fang-Chin Wu, Meng-Yi Chen, Chi-Hsiang Chao, Chang-En Pu |
Study on STR markers of DNA for improving the power of identification on cases in Taiwan. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Garzia, Lorenzo Nesbitt, Roberto Cusani |
Adaptive genetic controller for the dynamic optmization of network traffic of integrated security systems. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lee Heon Soo |
Comparative analysis of Governmental Countermeasures to cyber attacks. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Judith Liu-Jimenez, Raul Sánchez-Reillo, Ramon Blanco-Gonzalo, Belen Fernandez-Saavedra |
Making stronger identity for EU citizens. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongjun Ren, Jin Han, Jin Wang 0001, Liming Fang 0001 |
Privacy-preserving proof of storage in large group. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Antoniu L. Fantana, Selvakumar Ramachandran, Christian H. Schunck, Maurizio Talamo |
Movement based biometric authentication with smartphones. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kai-Fung Hong, Chien-Chih Chen, Yu-Ting Chiu, Kuo-Sen Chou |
Scalable command and control detection in log data through UF-ICF analysis. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Moisés Díaz Cabrera, Miguel A. Ferrer, Giuseppe Pirlo, Giuliano Giannico, Patricia Henríquez, Donato Impedovo |
Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Moisés Díaz Cabrera, Patricia Henríquez, Miguel A. Ferrer, Jesús B. Alonso, Giuseppe Pirlo, Donato Impedovo |
Novel method for early bearing fault detection based on dynamic stability measure. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Po-Ching Lin, Jyun-Chen Liu, Pin-Ren Chiou |
An event-based SDN architecture for network security analysis. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aythami Morales, Moisés Díaz Cabrera, Gloria Llinas-Sanchez, Miguel A. Ferrer |
Earprint recognition based on an ensemble of global and local features. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yanik Sterchi, Adrian Schwaninger |
A first simulation on optimizing EDS for cabin baggage screening regarding throughput. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Rodrigo Ros-Gomez, Belen Fernandez-Saavedra |
User acceptance of planar semiconductor fingerprint sensors. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Smejkal, Ladislav Sieger, Jindrich Kodl, Daniel Novák, Jakub Schneider |
The dynamic biometric signature - Is the biometric data in the created signature constant? |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongjun Ren, Jian Shen 0001, Jin Wang 0001, Liming Fang 0001 |
Outsourced data tagging via authority and delegable auditing for cloud storage. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing-Zhong Wang, Tian-Xi Wu, Tsung-Ying Sun |
An audio secret sharing system based on fractal encoding. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-Lung Lee, Chun-Chih Lin, Ming-Fong Tai, Chi-Chang Liu |
Nuclear forensics and nuclear crime scene management problem in Taiwan. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Belen Fernandez-Saavedra, Raul Sánchez-Reillo, Carlos Sanchez-Redondo, Ramon Blanco-Gonzalo |
Testing of biometric systems integrated in mobile devices. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015 |
ICCST |
2015 |
DBLP BibTeX RDF |
|
1 | Charles Wharton, Kang-I Lin |
Comparative legislation, corporate policy, and citizen concerns: Legal solutions for privacy protection in cloud computing. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Der-ren Taur, Chung-Hsin Cheng |
A composite guidance for dual range AAM with side jet control. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tse-Shih Chen, Ming-Fen Lin, Tzi-cker Chiueh, Cheng-Hsin Chang, Wei-Heng Tai |
An intelligent surveillance video analysis service in cloud environment. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-Ta Hsieh, Kuo-Chin Fan, Chin-Chuan Han |
Personal re-identification using rank-based manifold ranking. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Da-Yu Kao, Guan-Jie Wu |
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO/IEC 27037: 2012. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chih-Hung Lin, Chin-Wei Tien, Chih-Wei Chen, Chia-Wei Tien, Hsing-Kuo Pao |
Efficient spear-phishing threat detection using hypervisor monitor. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongjun Ren, Yaping Cheng, Jin Wang 0001, Liming Fang 0001 |
Data protection based on multifunction digital watermark in wireless sensor network. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hau-Ming Chang, Shu-Chiung Lin, Patrick S. Chen, Yu-Hsuan Hung |
A verification protocol of mobile payment based on signature recognition. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wan-Chen Hsieh, Chuan-Chi Wu, Yung-Wei Kao |
A study of android malware detection technology evolution. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yongjun Ren, Zhenqi Yang, Jin Wang 0001, Liming Fang 0001 |
Reliable access control for multi-authority in cloud storage. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Pin-Jui Chen, Yen-Wen Chen |
Implementation of SDN based network intrusion detection and prevention system. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maurizio Talamo, Armanas Povilionis, Franco Arcieri, Christian H. Schunck |
Providing online operational support for distributed, security sensitive electronic business processes. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Zeng Hsieh, Mu-Chun Su, Addison Y. S. Su, Wu-Rong Shih, Jen-Chih Yu, Chien-Yeh Huang |
The computational rules extractor in the detection of tax evasion. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chih Julie Wang, Arvin Huang-Te Li, Ming-Chih Wang, Cheng-Lung Lee |
Atomizing apparatus for development of latent fingerprints. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shaw-Shiun Deng, Hui-Zhen Gu, Chen-Wei Ku |
The design of battle field correlation tracks. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yi Ming Dai, Keh Shiou Liu |
TACSA: A web-service based system for coastal surveillance and situational awareness. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yao-Tang Chang, Yih-Chuan Lin |
The scrambling cryptography implemented with chaotic sequence trigger optical switch algorithm in WDM passive optical network. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chi-Ping Lin, Chuen-Fa Ni, I-Hsian Li, Chih-Heng Lu |
Stochastic delineation of well capture zones in aquifers of Choushui River alluvial fan in central Taiwan. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kun-Chi Lu, Angus F. M. Huang, Addison Y. S. Su, Ting-Jou Ding, Chiu-Nan Su |
Information password recovery with GPU. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shwu-Jing Chang, Kuan-Hung Yeh, Guan-Dun Peng, Shih-Ming Chang, Chung-Hao Huang |
From Safety to security - Pattern and anomaly detections in maritime trajectories. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ying-Dar Lin, Feng-Ze Liao, Shih-Kun Huang, Yuan-Cheng Lai |
Browser fuzzing by scheduled mutation and generation of document object models. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chung-Yi Lin, Ming-Che Chang, Hua-Chou Chiu, Keh-Hwa Shyu |
Secure logging framework integrating with cloud database. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aufaclav Zatu Kusuma Frisky, Chien-Yao Wang, Andri Santoso, Jia-Ching Wang |
Lip-based visual speech recognition system. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Huang Liang |
Risk-based optimization design for checkpoints in airports. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jain-Shing Wu, Wan-Ching Lin, Chih-Ta Lin, Te-En Wei |
Smartphone continuous authentication based on keystroke and gesture profiling. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jyh-Ren Shieh |
An end-to-end encrypted domain proximity recommendation system using secret sharing homomorphic cryptography. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chao-Ting Su, Hsi-Chun Wang |
Self-authentication watermark by digital halftoning. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi |
Cyber-security analysis and evaluation for smart home management solutions. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Meng-Yi Chen, Chang-En Pu, Fang-Chin Wu, Huei-Yu Lai, Chin-Wen Ho |
Rapidly mutating Y-STRs population data in Taiwan and haplotype probability estimation for forensic purposes. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|