Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Muhammad Shaheen, Saeed Iqbal, Fazl-e-Basit |
Labeled clustering a unique method to label unsupervised classes. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Kablan Barbar, Guy Pujolle |
Broker-based Cross-Cloud Federation Manager. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Naji Al-Kabi, Nawaf A. Abdulla, Mahmoud Al-Ayyoub |
An analytical study of Arabic sentiments: Maktoob case study. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Adam Oest, Manjeet Rege |
Feedback-driven clustering for automated linking of web pages. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Arome Junior Gabriel, Boniface Kayode Alese, Adebayo O. Adetunmbi, Olumide S. Adewale |
Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mustafa Aydin, Jeremy Jacob |
A comparison of major issues for the development of forensics in cloud computing. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sahar Maalej Dammak, Anis Jedidi, Rafik Bouaziz |
Automation and evaluation of the semantic annotation of Web resources. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Asma Hamed, Hella Kaffel-Ben Ayed, Mohamed Ali Kâafar, Ahmed Kharraz |
Evaluation of third party tracking on the web. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ove Sörensen |
Zombie-cookies: Case studies and mitigation. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bernd Borchert, Max Günther |
Indirect NFC-login. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Muteveri Kandira, Jabu Mtsweni, Keshnee Padayachee |
Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nasser Zalmout, Moustafa Ghanem |
Multidimensional community detection in Twitter. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Awad, Ernst L. Leiss |
End-to-End cryptographic voting: Potentials and limitations. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Miklós Kálmán |
ProtoML: A rule-based validation language for Google Protocol Buffers. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed A. Abdelshafy, Peter J. B. King |
Analysis of security attacks on AODV routing. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matrazali Noorafiza, Hiroshi Maeda, Toshiyuki Kinoshita, Ryuya Uda |
Virtual machine remote detection method using network timestamp in cloud computing. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Caragata, Karim Tabia, Mauricio Luduena |
Cryptanalysis of a chaos-based encryption algorithm for distributed systems. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Antti Evesti, Jani Suomalainen, Reijo Savola |
Security risks in the short-range communication of ubiquitous application. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fatimah Y. Akeel, Gary B. Wills, Andrew M. Gravell |
SecureDIS: A framework for secure Data Integration Systems. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Silva 0001, Paulo Romero Martins Maciel, Armin Zimmermann |
Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systems. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Oleg Garasym, Ina Taralova |
High-speed encryption method based on switched chaotic model with changeable parameters. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | David Stupples |
ICITST-2013: Keynote speaker 2: Security challenge of TOR and the deep web. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abdussalam Elzawi, Stephen J. Wade, Thuraya Kenan, Crinela Pislaru |
Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the Internet. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Young-Ji Byon, Young-Seon Jeong, Said M. Easa, Joonsang Baek |
Feasibility analysis of transportation applications based on APIs of social network services. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shafiq-Ur Rehman, Naveed Ejaz |
Towards an efficient shopping mechanism for M-commerce. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim Kabiru Musa, Stuart D. Walker |
Adaptive market place for converged cloud computing model. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | |
8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, London, United Kingdom, December 9-12, 2013 |
ICITST |
2013 |
DBLP BibTeX RDF |
|
1 | Umar Manzoor, Maria Zubair, Kanwal Batool |
Using multi-agent systems to solve food distribution problem in disaster area. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charles A. Clarke, Eckhard Pfluegel, Dimitris Tsaptsinos |
Enhanced Virtual Private Social Networks: Implementing user content confidentiality. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bas Geerdink |
A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technology. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aditya Yulianto, Maria Irmina Prasetiyowati |
BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aneel Rahim, Paul Malone |
Intrusion detection system for Wireless Nano sensor Networks. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim |
Mining salient images from a large-scale blogosphere. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jong-Hoon Lee, Jung-Tae Kim, Ik-Kyun Kim, Ki Jun Han |
Design and implementation of the contents visualization system for social networks. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Margarita Velasco, David While, Pathmeswaran Raju |
Adaptation of Web services using policies. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charl van der Westhuizen, Marijke Coetzee |
Context-aware RESTful services on mobile devices. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nan Zhao, Loïc Baud, Patrick Bellot |
Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1Fichier. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah A. Alabdulatif, Xiaoqi Ma, Lars Nolle |
Analysing and attacking the 4-way handshake of IEEE 802.11i standard. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmed Osama Fathy Atya, Jilong Kuang |
RUFC: A flexible framework for reliable UDP with flow control. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Melanie Willett, Rossouw von Solms |
A framework for assuring the conformance of cloud-based email. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hemlal Sahu, Birendra Kumar Sharma |
A new encryption scheme based on hybrid Problems. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi |
Design and development of Anti-XSS proxy. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Saeed Iqbal, Muhammad Shaheen, Fazl-e-Basit |
A machine learning based method for optimal journal classification. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vivek Shandilya, Sajjan G. Shiva |
Security in the cloud based systems: Structure and breaches. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Fischer 0003, Bernd Markscheffel, T. Seyffarth |
Smartphone security: Overview of security software solutions. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tyson T. Brooks |
ICITST-2013: Keynote speaker 3: Blurred nets: Disruption and the risk to future 'Internet of Things' (IoT) architectures. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chongxiao Cao, Fengguang Song, Daniel G. Waddington |
Implementing a high-performance recommendation system using Phoenix++. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sofia Najwa Ramli, Rabiah Ahmad, Mohd Faizal Abdollah |
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fahad M. Alotaibi, Jordan Dimitrov |
Implementation and evaluation of classroom simulation for trainee teacher using second life environments. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Iman Ranaee, Mahdi Majidi Nia, Reza Jahantigh, Amirhossein Gharib |
Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automata. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Yoon Seok Chang |
Securing E-Seal real time tracking system for Internet of Things. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes |
A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Daehee Kim 0001, Sangwook Kang, Sunshin An |
Energy efficient time synchronization for target tracking in heterogeneous sensor networks. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hisham Al-Assam, Rasber Dh. Rashid, Sabah Jassim |
Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Denis Obrul, Borut Zalik |
Real-time adaptive arrival prediction system for public transport. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Balkis Hamdane, Ahmed Serhrouchni, Sihem Guemara El Fatmi |
Access control enforcement in Named Data Networking. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mounira Msahli, Rached Abdeljaoued, Ahmed Serhrouchni |
Access control in probative value Cloud. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Luigi Catuogno, Clemente Galdi |
Towards the design of a film-based graphical password scheme. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kamyab Karimi, Carl Hauser |
Internet Unite-and-Conquer architecture. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Robert Costello, Nigel Shaw |
Assisted Learning Virtual Support (ALVS) for postgraduate students, through the Graduate Virtual Research Environment (GVRE). |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Yasuhiko Morimoto, Youzou Miyadera, Shoichi Nakamura |
Methods for strategic accumulation of context information in research activities. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | O. A. Akinsowon, Boniface Kayode Alese |
Edge detection methods in palm-print identification. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thuraya Kenan, Crinela Pislaru, Abdussalam Elzawi, Maysoun Restoum |
Improving the effectiveness of collaborative learning processes in Libyan Higher Education. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Muhannad Quwaider, Yaser Jararweh |
Cloudlet-based for big data collection in body area networks. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Huda Elmogazy, Omaima Bamasak |
Towards healthcare data security in cloud computing. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nalin Asanka Gamagedara Arachchilage, Cornelius Namiluko, Andrew P. Martin |
A taxonomy for securely sharing information among others in a trust domain. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Ali Alshehri 0001, Steve A. Schneider |
Formally defining NFC M-coupon requirements, with a case study. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chiara Peretti, Paolo Gastaldo, Marco Stramezzi, Rodolfo Zunino |
Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystems. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Miyoung Jang, Ara Jo, Jae-Woo Chang |
A privacy-aware query authentication index for encrypted database in cloud. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Rawan T. Khasawneh, Heider Wahsheh 0001, Mohammed Al-Kabi, Izzat Mahmoud Alsmadi |
Sentiment analysis of arabic social media content: a comparative study. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Luciene Cristina Alves Rinaldi, Briseida Dogo de Resende, Rodrigo Bossini Tavares Moreira, Márcio Lobo Netto |
A system for social network analysis. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Charles A. Shoniregun |
ICITST-2013: Keynote speaker 4: Writing a sustainable research paper. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hyun-Hwa Choi, Byoung-Seob Kim, Shin-Young Ahn, Seung-Jo Bae |
A workflow for parallel and distributed computing of large-scale genomic data. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Leonard James Mselle, Tabu S. Kondo |
Results on implementing personal learning environments in Tanzanian secondary schools. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Haruhiko Fujii, Yukio Tsuruoka |
SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Aspen Olmsted, Csilla Farkas |
Web Service constraint optimization. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Elhadj Benkhelifa, Thomas Welsh |
A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Setsuo Yokoyama, Shoichi Nakamura |
Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationships. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zeinab Fawaz, Safwan El Assad, M. Frajallah, Ayman Khalil, René Lozi, Olivier Déforges |
Lightweight chaos-based cryptosystem for secure images. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed A. Alhomidi, Martin J. Reed |
Security risk analysis as a service. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sarita Paudel, Markus Tauber, Ivona Brandic |
Security standards taxonomy for Cloud applications in Critical Infrastructure IT. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dinkar Sitaram, H. L. Phalachandra, Anush Vishwanath, Pramod Ramesh, Meghana Prashanth, Akshay G. Joshi, Anoop R. Desai, Harikrishna Prabhu C. R, Prafulla, Shwetha R, Yashaswini A |
Keystone federated security. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tyson Brooks, Michelle L. Kaarst-Brown, Carlos Caicedo 0001, Joon Park, Lee McKnight |
A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Afnan Ullah Khan, Manuel Oriol, Mariam Kiran |
Threat methodology for securing scalable video in the Cloud. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Abdolazim Rezaei, Zarinah Mohd Kasirun, Vala Ali Rohani, Touraj Khodadadi |
Anomaly detection in Online Social Networks using structure-based technique. |
ICITST |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Afif Mghawish, Akram A. AbdelQader, Mahmoud A. Al-Jezawi, Mohammad AbuMahfouz |
Multi function control system using GSM modem based SM5100B Module. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Jeffrey J. Wiley, Frank P. Coyle |
Semantic hedgehog for log analysis. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Yusuke Morita, Hiroyuki Anzai, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura |
Visual support system for semi-automatic generation of spadework of academic paper from presentation slides. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Sanchika Gupta, Anjali Sardana, Padam Kumar |
A light weight centralized file monitoring approach for securing files in Cloud environment. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Funminiyi Olajide, Nick Savage 0001, Galyna A. Akmayeva, Richard Trafford |
Forensic memory evidence of windows application. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Mikhail Y. R. Gadelha, Cicero Ferreira Fernandes Costa Filho, Marly Guimarães Fernandes Costa |
Proposal of a cryptography method using gray scale digital images. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Eyad Taqieddin, Jagannathan Sarangapani |
Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Maja Vidovic, Josip Kolic |
Are contemporary trade unions utilizing the opportunities for revival presented by internet technology? A comparison of Croatian, UK and USA practice. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Maryline Chetto, Hassan Noura 0001, Safwan El Assad, Mousa Farajallah |
How to guarantee secured transactions with QoS and real-time constraints. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ruhma Tahir, Huosheng Hu, Dongbing Gu, Klaus D. McDonald-Maier, Gareth Howells 0001 |
A scheme for the generation of strong cryptographic key pairs based on ICMetrics. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Hsi-Chung Lin |
Content Extraction Signatures Revisited. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Tran Thao Phuong, Kazumasa Omote, Nguyen Gia Luyen, Nguyen Dinh Thuc |
Improvement of multi-user searchable encrypted data scheme. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Mafawez T. Alharbi, Amelia Platt, Ali H. Al-Bayatti |
Context-aware Personal Learning Environment. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ana A. Andrade, Vitor V. Lopes, Augusto Q. Novais |
Quantifying the impact on distrust of e-commerce trust factors: A non-parametric study. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Sukyoung Kim, Kihong Ahn |
User-intent custom adaptive search service based on ontology and similar-word retrieval algorithm composition. |
ICITST |
2012 |
DBLP BibTeX RDF |
|