Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Hui-Hao Chou, Sheng-De Wang |
An adaptive network intrusion detection approach for the cloud environment. |
ICCST |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Joanna Putz-Leszczynska, Miroslaw Granacki |
Gait biometrics with a Microsoft Kinect sensor. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ed Rao, Jim Remer, Doug Bauer |
A model for development, transition and technology transfer leading to commercialization of security technology. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Anika Pflug, Pascal Nicklas Paul, Christoph Busch 0001 |
A comparative study on texture and surface descriptors for ear biometrics. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Doug Rhoades |
Machine actionable indicators of compromise. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Flaviano Tessitore |
Aerial surveillance and airborne remote sensing techniques in Guardia di Finanza: An operational experience: Guardia di Finanza and CRdC BENECON, police officers and university researchers to protect and safeguard social fairness and legality. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lorena Guachi, Giuseppe Cocorullo, Pasquale Corsonello, Fabio Frustaci, Stefania Perri |
A novel background subtraction method based on color invariants and grayscale levels. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pierluigi Pelargonio, Marco Pugliese |
Enhancing security in public transportation services of Roma: The PANDORA system. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Flavia Demarinis, Antonella Accettura, Fabio Garzia, Roberto Cusani |
Automatic security system for recognizing unexpected motions through video surveillance. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Setola, Domenico Lorusso, Maria Carla De Maggio |
Dependencies analysis in emergency scenarios. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Basel Hasan, Viktor Dmitriyev, Jorge Marx Gómez, Joachim Kurzhöfer |
A framework along with guidelines for designing secure mobile enterprise applications. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohamad El-Abed, Mostafa Dafer, Ramzi El Khayat |
RHU Keystroke: A mobile-based benchmark for keystroke dynamics systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Victor Bautista Saiz, Fernan Gallego |
GPU: Application for CCTV systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniel de Santos-Sierra, Miguel F. Arriaga-Gómez, Gonzalo Bailador, Carmen Sanchez-Avila |
Low computational cost multilayer graph-based segmentation algorithms for hand recognition on mobile phones. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Claudia Meda, Federica Bisio, Paolo Gastaldo, Rodolfo Zunino |
A machine learning approach for Twitter spammers detection. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan Cristian Dinca, Jeffrey Schubert |
Rapid inspection of general aviation aircraft for security threats and contraband. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Emanuele Frontoni, Marco Baldi, Primo Zingaretti, Vincenzo Landro, Paolo Misericordia |
Security issues for data sharing and service interoperability in eHealth systems: The Nu.Sa. test bed. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jeremy Weese |
Developing an industry standard for data communications between PIDS equipment and third party systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Pinchera, Marco Donald Migliore |
Secret key sharing by means of reconfigurable antenna systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gio Kao, Han Lin, Brandon Eames, Jason J. Haas, Alexis Fisher, John Michalski, Jon Blount, Jason R. Hamlet, Erik Lee, John Gauthier, Gregory D. Wyss, Ryan Helinski, Dustin Franklin |
Supply chain lifecycle decision analytics. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michele Scarpiniti, Fabio Garzia |
Security monitoring based on joint automatic speaker recognition and blind source separation. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alessia De Rosa, Alessandro Piva, Marco Fontani, Massimo Iuliani |
Investigating multimedia contents. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi |
Securing software cryptographic primitives for embedded systems against side channel attacks. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stanislav Vítek, Milos Klima, Lukas Krasula |
Video compression technique impact on efficiency of person identification in CCTV systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Smejkal, Jindrich Kodl |
Assessment of the authenticity of Dynamic Biometric Signature: The results of experiments. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sondre Skatter, Stephan Olesinski |
Energy-resolving photon-counting detectors in CT based explosive detection systems (EDS): Can additional material signatures be extracted to help the detection task? |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Simona Capparella, Maria Carmen Falvo |
Secure faults detection for preventing fire risk in PV systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ignacio Sanchez, Riccardo Satta, Igor Nai Fovino, Gianmarco Baldini, Gary Steri, David Shaw, Andrea Ciardulli |
Privacy leakages in Smart Home wireless technologies. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Miguel F. Arriaga-Gómez, Ignacio de Mendizábal-Vázquez, Rodrigo Ros-Gomez, Carmen Sanchez-Avila |
A comparative survey on supervised classifiers for face recognition. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Belen Fernandez-Saavedra, Raul Sánchez-Reillo, Judith Liu-Jimenez, Jorge Gutierrez Ruiz |
Best practices for the security evaluation of biometric systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Richard M. Guest, Oscar Miguel-Hurtado, Sarah V. Stevenage, Greg J. Neil, Sue Black 0002 |
Biometrics within the SuperIdentity project: A new approach to spanning multiple identity domains. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sara Marina Salvador, Riccardo Maggiora, Daniele Milanesio, Giorgio Rodighiero |
An anti-intrusion protection barrier based on 2D radar technology. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Le Zhang 0001, Chip-Hong Chang, Alessandro Cabrini, Guido Torelli, Zhi-Hui Kong |
Leakage-resilient memory-based physical unclonable function using phase change material. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andy Belyavin |
Simulating the impact of remote screening on search comb capacity. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tereza Malachova, Jindrich Malach, Zdenek Vintr |
TARGI - A novel tool and method for target identification. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maurizio Aiello, Enrico Cambiaso, Maurizio Mongelli, Gianluca Papaleo |
An on-line intrusion detection approach to identify low-rate DoS attacks. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Luis Andrés Cardona, B. Lorente, Carles Ferrer 0001 |
Partial crypto-reconfiguration of nodes based on FPGA for WSN. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Juan Camilo Vásquez-Correa, Nicanor García, Jesús Francisco Vargas-Bonilla, Juan Rafael Orozco-Arroyave, Julián David Arias-Londoño, M. O. Lucia Quintero |
Evaluation of wavelet measures on automatic detection of emotion in noisy and telephony speech signals. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Norman Poh |
On the effect of time efficiency in DSV under stress. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ester Ciancamerla, B. Fresilli, Michele Minichino, Tatiana Patriarca, Serguei Iassinovski |
An electrical grid and its SCADA under cyber attacks: Modelling versus a Hybrid Test Bed. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Bubbico, Barbara Mazzarotta |
Security risk assessment of process plants: The role of layout. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Archetti, Divna Djordjevic, Ilaria Giordani, Raul Sormani, Francesco Tisato |
A reasoning approach for modelling and predicting terroristic attacks in urban environments. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | |
International Carnahan Conference on Security Technology, ICCST 2014, Rome, Italy, October 13-16, 2014 |
ICCST |
2014 |
DBLP BibTeX RDF |
|
1 | Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, Saman A. Zonouz |
Security challenges in building automation and SCADA. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aldona Zalewska, Tomasz Sikora, A. Buczkowska |
Screening technology based on DMS as an effective tool to help protect public and vital infrastructure from threats. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Martin Henzl, Petr Hanácek, Matej Kacic |
Preventing real-world relay attacks on contactless devices. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ignacio de Mendizábal-Vázquez, Daniel de Santos-Sierra, Javier Guerra Casanova, Carmen Sanchez-Avila |
Supervised classification methods applied to keystroke dynamics through mobile devices. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Angelo Furfaro, Alfredo Garro, Andrea Tundis |
Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud Computing. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mofreh A. Hogo |
Temporal analysis of intrusion detection. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ondrej Kainz, Frantisek Jakab |
Web-based interface for real-time movement monitoring. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Homoliak, Daniel Ovsonka, Karel Koranda, Petr Hanácek |
Characteristics of buffer overflow attacks tunneled in HTTP traffic. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mario Di Mauro, Cesario Di Sarno |
A framework for Internet data real-time processing: A machine-learning approach. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Josep Aguilera, Fernan Gallego, Carles Silva |
System on Chip (SoC): New generation of video surveillance systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mark D. Murton, Paul Johnston, Russell Waymire, Deborah Belasich |
A fidelity framework for small arms combat. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Addisson Salazar, Gonzalo Safont, Luis Vergara |
Surrogate techniques for testing fraud detection algorithms in credit card operations. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Justin Varghese, Omer Bin Hussain, Bijoy Babu, Jamshid M. Basheer, Subash Saudia, Mohamed Ramadan Saadi, Mohamed Samiulla Khan |
An efficient DCT-SVD based algorithm for digital image watermarking. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liliana Gonzalez, Mayra Zurbarán, Pedro M. Wightman, Daladier Jabba, Miguel Jimeno, Eduardo E. Zurek |
Sensitivity analysis and countermeasures for transformation-based location obfuscation. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Michel, Nicole Hättenschwiler, Milena Kuhn, Nadine Strebel, Adrian Schwaninger |
A multi-method approach towards identifying situational factors and their relevance for X-ray screening. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Maha Althobaiti 0002, Pam J. Mayhew |
Security and usability of authenticating process of online banking: User experience study. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Javier Galbally, Iwen Coisel, Ignacio Sanchez |
A probabilistic framework for improved password strength metrics. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sara Manzoni, Simone Sterlacchini |
Evacuation study by crowd dynamics micro-simulation to support disaster prevention and management: The case of SIMULATOR project. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Apostolis Zarras |
The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Carey M. Rappaport, Borja Gonzalez-Valdes, José Ángel Martínez Lorenzo |
Advanced portal-based multistatic millimeter-wave radar imaging for person security screening. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Soodamani Ramalingam, Mike Rhead, Robert Gurney |
Impact of character spacing on the performance of Automatic Number Plate Recognition (ANPR) systems through simulation. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mario Di Mauro, Maurizio Longo |
Skype traffic detection: A decision theory based tool. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Simona Cavallini, Francesca D'Onofrio, Sara Bouchon, Claudia Giusto |
Enhancing transport security: Characterization and identification of the main security challenges in 5 transport subsectors. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Luigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano |
Real-time Security & Dependability monitoring: Make it a bundle. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Diana Hardmeier, Catharina Muller, Adrian Schwaninger |
Certification of airport security officers using multiple-choice tests: A pilot study. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sung Choi, Michael Bierma, Yung Ryn Choe, David Zage |
EMBERS: EpheMeral biometrically enhanced real-time location System. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Raul Sánchez-Reillo, Daniel Sierra-Ramos, Roberto Estrada-Casarrubios, Jose A. Amores-Duran |
Strengths, weaknesses and recommendations in implementing biometrics in mobile devices. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zahid Akhtar, Christian Micheloni, Gian Luca Foresti |
Liveness detection for biometric authentication in mobile applications. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Nautsch, Christian Rathgeb, Christoph Busch 0001 |
Bridging Gaps: An application of feature warping to online signature verification. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masaki Fujikawa, Ryosuke Kamai, Sou Tsunetsugu, Michiko Ogawa |
Transparent cut detection sensor: Proposal of the security device that makes information leakage by photo/video shooting diffucult. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aythami Morales, Miguel A. Ferrer, Moisés Díaz Cabrera, Cristina Carmona 0003, Gordon L. Thomas |
The use of hyperspectral analysis for ink identification in handwritten documents. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rawande Karadaghi, Heinz Hertlein, Aladdin M. Ariyaeeinia |
Effectiveness in open-set speaker identification. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Noura Ben Hadjy Youssef, Wajih El Hadj Youssef, Mohsen Machhout, Rached Tourki, Kholdoun Torki |
A low-resource 32-bit datapath ECDSA design for embedded applications. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Di Maio |
Centralized security governance for air navigation services: Innovative strategies to confront emerging threats against Civil Aviation. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Mugavero, Giovanni Saggio, Valentina Sabato, Mariano Bizzarri |
The multisensory integrated modules for training. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dakshina Ranjan Kisku, Debanjan Chatterjee, S. Trivedy, Massimo Tistarelli |
Face image abstraction by Ford-Fulkerson algorithm and invariant feature descriptor for human identification. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fernando Martín Rodríguez |
Automatic optical reading of passport information. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniele Codetta Raiteri, Luigi Portinale, Roberta Terruggia |
Quantitative evaluation of attack/defense scenarios through Decision Network modelling and analysis. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Myunghee Son, Okgee Min, Jonghyun Kim, Sung Hoon Baek |
A safer way to share a car based on SNS to increase use efficiency of released vehicles. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Brockly, Stephen J. Elliott, Jarron Burdine, Michael Frost, Matthew Riedle, Richard M. Guest |
An investigation into biometric signature capture device performance and user acceptance. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | El-Arkam Mechhoud, Mounira Rouainia |
Automated dependability analysis of a HDPE reactor. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Vittorio Bianco, Melania Paturzo, A. Finizio, Lisa Miccio, Pietro Ferraro |
Revealing fire survivors hidden behind smoke and flames by IR active imaging systems. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Noura Ben Hadjy Youssef, Wajih El Hadj Youssef, Mohsen Machhout, Rached Tourki, Kholdoun Torki |
Instruction set extensions of AES algorithms for 32-bit processors. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Paul C. Haddock |
A radio frequency measurement technique utilizing audio distortion to access the instantaneous sensitivity of a security systems receiver. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gonzalo Safont, Addisson Salazar, Antonio Soriano 0001, Luis Vergara |
Combination of multiple detectors for EEG based biometric identification/authentication. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Petr Dostál, Lukas Krasula, Milos Klima |
HLFSIM: Objective image quality metric based on ROI analysis. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Keiji Takeda |
User Identification and Tracking with online device fingerprints fusion. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jia-Guu Leu, Liang-tsair Geeng, Chang En Pu, Jyh-Bin Shiau |
Tracking formants in spectrograms and its application in speaker verification. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jeffrey G. Dabling, James O. McLaughlin, Jason J. Andersen |
Design and performance testing of an integrated detection and assessment perimeter system. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Rich Messenger, Rick Dove |
Basic Genetic Algorithm pattern for use in self-organizing agile security. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maurizio Talamo, Maulahikmah Galinium, Christian H. Schunck, Franco Arcieri |
State space blow-up in the verification of secure smartcard interoperability. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bradley C. Norman |
Assessment of video analytics for exterior intrusion detection applications. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Martin Henzl, Petr Hanácek, Peter Jurnecka, Matej Kacic |
A concept of automated vulnerability search in contactless communication applications. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Antonio M. Rojas, Carlos M. Travieso, Jesús B. Alonso, Miguel A. Ferrer |
Automatic lip identification applied under soft facial emotion conditions. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marcos Faúndez-Zanuy, Enric Sesa-Nogueras, Josep Roure Alcobé |
On the relevance of age in handwritten biometric recognition. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Bougrine, Fouzia Omaiy, Salima Trichni, Bouchra Boulahiat |
New evolutionary tools for a new ciphering system SEC version. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Han Lin, Moses Schwartz, John Michalski, Mayuri Shakamuri, Philip Campbell |
Leveraging a crowd sourcing methodology to enhance supply chain integrity. |
ICCST |
2012 |
DBLP DOI BibTeX RDF |
|