Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Oliver Pfaff, Sebastian Ries |
Avoiding security integration pitfalls in the cloud. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omer Nawaz, Tahir Nawaz Minhas, Markus Fiedler |
Optimal MTU for realtime video broadcast with packet loss - A QoE perspective. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ricardo Villalón-Fonseca, Braulio J. Solano-Rojas, Gabriela Marín Raventós |
An applied methodology for information security and assurance: A study case for cloud computing. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Potchara Pruksasri, Jan van den Berg, Wout Hofman, Yao-Hua Tan |
Data concealing of supply chain transactions using the Distributed Trust Backbone. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Chan, Tony Hao Wu, Grantham Pang |
Decision support and data mining for direct consumer-to-consumer trading. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sabah Al-Fedaghi, Heba Al Meshari |
Characterizing social networks based on interior processes of nodes. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Norah S. Farooqi, Siobhán North |
Time cost evaluation of trust based access control for XML databases. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Boniface Kayode Alese, O. Oyebade, A. Osuolale Festus, Otasowie Iyare, Aderonke Favour-Bethy Thompson |
Evaluation of information security risks using hybrid assessment model. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas |
Performance analysis of Hadoop MapReduce on an OpenNebula cloud with KVM and OpenVZ virtualizations. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Dressler, Daniel Fischer 0003, Bernd Markscheffel |
Software solutions for high-security voice and data communication for smartphones. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Kamel Alomari |
Towards E-democracy in the middle east: E-voting adoption. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pino Caballero-Gil, Francisco Martín-Fernández, Cándido Caballero-Gil |
Using query frequencies in tree-based revocation for certificateless authentication in VANETs. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mario Diego Munoz-Hernandez, Jose Juan Garcia-Hernandez, Miguel Morales-Sandoval |
Study on the robustness to retyping attacks of fingerprinted digital documents in the frequential domain. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Elarbi Badidi |
A context broker federation for QoC-driven selection of cloud-based context services. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Morrell, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront |
Scaling IPv6 address bindings in support of a moving target defense. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shruti Kohli, Ankit Gupta 0004 |
Modeling anonymous human behavior using social media. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Otasowie Iyare, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese |
A replication model for students' result processing. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fahad Polash, Abdullah Abuhussein, Sajjan G. Shiva |
A survey of cloud computing taxonomies: Rationale and overview. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christian M. Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner |
ESTADO - Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nawaf Sulaiman Alharbi, Maria Papadaki, Paul Dowland 0001 |
Security challenges of E-government adoption based on end users' perspective. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Boniface Kayode Alese, R. A. Akingbola, Folasade Mojisola Dahunsi, Olumide S. Adewale, T. J. Ogundele |
Improving deception in honeynet: Through data manipulation. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish |
Empirical study of automatic dataset labelling. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Brika Ammar, Fahima Nader |
Creation of educative content on the web. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gilmini Dantanarayana, Prasad M. Jayaweera |
Value oriented service designing for successful e-Health. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | L. A. Nwosu, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese, Olumide Olayinka Obe |
An Attribute-Based Signature using rivest shamir adleman scheme. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Suresh Kumar Aditya, Kavya Premkumar, R. Anitha 0001, Saswati Mukherjee |
Combined security framework for multi-cloud environment. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar, Victor Clincy |
Detection of repackaged Android Malware. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Keisuke Kato, Vitaly Klyuev |
Large-scale network packet analysis for intelligent DDoS attack detection development. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Karol Desnos, Safwan El Assad, Aurore Arlicot, Maxime Pelcat, Daniel Ménard |
Efficient multicore implementation of an advanced generator of discrete chaotic sequences. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Caragata, Safwan El Assad, Kassem Ahmad |
Survey of network access security in UMTS/LTE networks. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Johann Betz, Dirk Westhoff |
C3-Sched - A cache covert channel robust cloud computing scheduler. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Matej Kacic, Daniel Ovsonka, Petr Hanácek, Maros Barabas |
Traffic generator based on behavioral pattern. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Olusegun Ademolu Ajigini, John A. van der Poll, Jan H. Kroeze |
Towards a model on security challenges during closed source software to OSS migrations. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | M. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff |
CBAC4C: Conflict Based Allocation Control for Cloud. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Igor Mishsky, Nurit Gal-Oz, Ehud Gudes |
Computing domains reputation using flow. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dirk Burkhardt, Kawa Nazemi, Wilhelm Retz, Jörn Kohlhammer |
Visual explanation of government-data for policy making through open-data inclusion. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Eric Amankwa, Marianne Loock, Elmarie Kritzinger |
A conceptual analysis of information security education, information security training and information security awareness definitions. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abikoye Oluwakemi Christianah, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson, D. Alowolodu Olufunso, A. Osuolale Festus |
A robust multicast authentication scheme based on asymmetric key signature. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pushpinder-Kaur Chouhan, Sakir Sezer, Yangseo Choi, Ikkyun Kim, Chunghwan Jung |
Secure virtualised environment. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rafal Leszczyna, Michal R. Wróbel |
Security information sharing for smart grids: Developing the right data model. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mee Hong Ling, Kok-Lim Alvin Yau |
Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
9th International Conference for Internet Technology and Secured Transactions, ICITST 2014, London, United Kingdom, December 8-10, 2014 |
ICITST |
2014 |
DBLP BibTeX RDF |
|
1 | Loubna El Faquih, Hanae Sbaï, Mounia Fredj |
Semantic variability modeling in business processes: A comparative study. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Udsanee Pakdeetrakulwong, Pornpit Wongthongtham, Waralak V. Siricharoen |
Recommendation systems for software engineering: A survey from software development life cycle phase perspective. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Wided Boubakri, Walid Abdallah, Noureddine Boudriga |
A chaos-based authentication and key management scheme for M2M communication. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Simona Petrakieva, Oleg Garasym, Ina Taralova |
G-interval method for secure chaotic synchronization and information transmission. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abdulrazaq Almutairi, David J. Parish |
Using classification techniques for creation of predictive intrusion detection model. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Surabhi Mour, Priyansh Srivastava, Payal Patel, Hari Ram, Bhavesh N. Gohil, Dhiren R. Patel |
Load management model for cloud computing. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abrar Ullah, Hannan Xiao, Trevor Barker, Mariana Lilley |
Graphical and text based challenge questions for secure and usable authentication in online examinations. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Ali Yousuf, Fatimah Y. Akeel, Nawfal F. Fadhel, Gary B. Wills |
Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rahul Kumar, Indraveni K, Aakash Kumar Goel |
Automation of detection of security vulnerabilities in web services using dynamic analysis. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tiwalade Adelola, Ray Dawson, Firat Batmaz |
Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem |
Advanced encryption standard development based quantum key distribution. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Homoliak, Daniel Ovsonka, Matej Grégr, Petr Hanácek |
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | André A. Osti, Bruno Alves Pereira Botelho, Nelson Uto |
Implementation aspects of software guards: A case study. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Rudolph, Reinhard Schwarz, Christian Jung 0001 |
Security policy specification templates for critical infrastructure services in the cloud. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dimitrios Kasiaras, Thomas Zafeiropoulos, Nathan L. Clarke, Georgios Kambourakis |
Android forensics: Correlation analysis. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Antonia Rana, Andrea Ciardulli |
Enabling consumers to self-verify authenticity of products. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Saurabh Kulkarni, Shayan Saha, Ryler Hockenbury |
Preserving privacy in sensor-fog networks. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fahad M. Alotaibi |
Architectural framework proposed of behavioural classroom simulation based second life environment. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Edina Hatunic-Webster, Fredrick Mtenzi, Brendan O'Shea |
Model for analysing Anti-Phishing Authentication Ceremonies. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Souad Sadki, Hanan El Bakkali |
PPAMH: A novel privacy-preserving approach for mobile healthcare. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nikolai Joukov, Vladislav Shorokhov, Dmytro Tantsuyev |
Security audit of data flows across enterprise systems and networks. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Seokhwan Yang, Jaechun Kim, Mokdong Chung |
A prediction model based on Big Data analysis using hybrid FCM clustering. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Saleh Albahli, Austin Melton |
ohStore: Ontology hierarchy solution to improve RDF data management. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Regio A. Michelin, Avelino F. Zorzo, César A. F. De Rose |
Mitigating DoS to authenticated cloud REST APIs. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fatimah Y. Akeel, Gary B. Wills, Andrew M. Gravell |
Exposing data leakage in Data Integration Systems. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | F. Y. Osisanwo, Adebayo O. Adetunmbi, Boniface Kayode Alese |
Barefoot morphology: A person unique feature for forensic identification. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fatiha Djebbar, Beghdad Ayad |
Image hiding in speech spectrum. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aspen Olmsted, RoxAnn H. Stalvey |
Highly available, consistent, business rule filters. |
ICITST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | L. J. Ontanon-Garcia, M. Garcia-Martinez, Eric Campos-Cantón, Sergej Celikovský |
Grayscale image encryption using a hyperchaotic unstable dissipative system. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nadianatra Musa, Bob Clift |
A model of component interaction between Formal, Technical and Informal components within IS/IT security governance. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem |
A comparative study between modern encryption algorithms based on cloud computing environment. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey J. Wiley |
ICITST-2013: Keynote speaker 1: Principles of information security risk management. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Timo Schless, Harald P. E. Vranken |
Counter botnet activities in the Netherlands a study on organisation and effectiveness. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mario Sicuranza, Angelo Esposito |
An access control model for easy management of patient privacy in EHR systems. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shiu Hong Choi, Bo Yang 0027, H. H. Cheung, Y. X. Yang |
Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kiswendsida K. Kabore, Oumarou Sie, Florence Sèdes, André Péninou |
Information Access Assistant Service (IAAS). |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Akintoba Emmanuel Akinwonmi, Boniface Kayode Alese |
A prosodic Text-to-Speech system for Yorùbá language. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Love Adedayo, Sergey Butakov, Ron Ruhl, Dale Lindskog |
E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nicholas Dzugan, Lance Fannin, S. Kami Makki |
A recommendation scheme utilizing Collaborative Filtering. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Markus Florian, Sarita Paudel, Markus Tauber |
Trustworthy evidence gathering mechanism for multilayer cloud compliance. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Saadia Kedjar, Abdelkamel Tari |
The hybrid model for web services security access control and information flow control. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nwankwo Nonso Prince |
Design and implementation of microcontroller based short message service control system. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Clara Bertolissi, Silvio Ranise |
A methodology to build run-time monitors for security-aware workflows. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Maher Salem, Ulrich Buehler |
Reinforcing network security by converting massive data flow to continuous connections for IDS. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Liangxiu Han, Zheng Xie, Richard A. Baldock |
Automatic data reuse for accelerating data intensive applications in the Cloud. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dalia Battikh, Safwan El Assad, Bassem Bakhache, Olivier Déforges, Mohamad Khalil |
Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysis. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Brika Ammar, Fahima Nader |
Pedagogical hypermédias systems. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Supakorn Prungsinchai, Fouad Khelifi, Ahmed Bouridane |
DCT sign-based robust image hashing. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuri Nakagawa, Yuuki Matsuda, Tetsuro Ogi |
Framework for handling personal data proposed system of the self-control on buying information. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sara Jeza Alotaibi, Mike Wald |
Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel |
DGM approach to network attacker and defender strategies. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adel Boukhadra, Karima Benatchba, Amar Balla |
DA5DCSWS: A Distributed Architecture for semantic Web services Discovery and Composition. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Algarni, Yue Xu 0001, Taizan Chan, Yu-Chu Tian |
Social engineering in social networking sites: Affect-based model. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yoon Seok Chang |
RISC'13 Workshop: Keynote speaker 5. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | S. Ananda Kanagaraj, G. Arjun, T. Sree Sharmila |
Pseudo Eye: The next-generation shopping application using Augmented Reality. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wafa Slaibi Al-Shorafat |
Security in software engineering requirement. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Áine MacDermott, Qi Shi 0001, Madjid Merabti, Kashif Kifayat |
Considering an elastic scaling model for cloud Security. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alex Akinbi, Ella Pereira, Chris Beaumont |
Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|