The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Mohamed Sameh Hassanein, Gheorghita Ghinea Text fingerprint key generation. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Galoh Rashidah Haron, Dharmadharshni Maniam, Vijayakumari Sadasivam, Wong Hon Loon Re-engineering of web reverse proxy with shibboleth authentication. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Said Rabah Azzam, Shikun Zhou Assessment of ontology alignment methodology. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Dawn Carmichael, David Cleave How effective is social media advertising? A study of Facebook Social Advertisements. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Damian Gordon Hackers and Hollywood 2: Considering televisual Cyberthreats in Security Risk Analysis. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Lorenzo Antonio Delgado-Guillen, Jose Juan Garcia-Hernandez, César Torres-Huitzil Validating the existence of watermarks on digital images using a mobile phone. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan Detecting counterfeit-money using RFID-enabled mobile devices. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ratchadawan Nimnual, Settachai Chaisanit M-learning for Eco-Packaging using KM. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Neda Abdelhamid, Aladdin Ayesh, Fadi A. Thabtah An experimental study of three different rule ranking formulas in associative classification. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Léa D. Cot, René Lozi Assessing the security of subsampling process using modified EKF and nonlinear least squares methods. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Greg Miiller Issues in inter-organisational encryption systems: The problem with FedLink. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Laddawan Meeanan, Apichai Trangansri, Pornpipat Hongthai, Settachai Chaisanit, Ratchadawan Nimnual The edutainment of virtual music instrument for Thai xylophone (Ranad-ek). Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Zhe Wang 0029, Xiaodong Liu 0001, Kevin Chalmers, Guojian Cheng Evolution pattern for Service Evolution in Clouds. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Xin Huang 0005, Rong Fu, Bangdao Chen, Tingting Zhang, A. W. Roscoe 0001 User interactive Internet of things privacy preserved access control. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Yang Guo, Guohua Bai, Yan Hu Using Bayes Network for Prediction of Type-2 diabetes. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Jeffrey Medsger, Avinash Srinivasan ERASE- entropy-based sanitization of sensitive data for privacy preservation. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Reza Khaleghparast, Ali Taherian A trust based model for federated identity architecture to mitigate identity theft. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Sajjad Ahmed Ghauri, Hasan Humayun, Muhammad Ehsan ul Haq, Farhan Sohail Implementation of Convolutional codes on FPGA. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Markus Jung, Thomas Hofer, Susen Döbelt, Georg Kienesberger, Florian Judex, Wolfgang Kastner Access control for a Smart Grid SOA. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Mohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera Forensics filesystem with cluster-level identifiers for efficient data recovery. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Benjamin Heckmann, Marcus Zinn, Ronald C. Moore, Christoph Wentzel, Andrew D. Phippen Economic efficiency control on data centre resources in heterogeneous cost scenarios. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Jerry Walsh, Donogh Roche, Franclin S. Foping NitroScript: A PHP template engine for customizing of e-commerce applications. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1José Luis González 0002, Victor Sosa-Sosa, Borja Bergua, Luis Miguel Sánchez, Jesús Carretero 0001 Fault-tolerant middleware based on multistream pipeline for private storage services. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Rozita Mohd Yusof, Norrozila Sulaiman Multi-probes fusion framework for matching simultaneous latent impressions. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Brad Miller, Kaitlyn Buck, J. D. Tygar Systematic analysis and evaluation of web privacy policies and implementations. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ahmad Mousa Odat E-Government in developing countries: Framework of challenges and opportunities. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Muhammad Qasim Saeed, Colin D. Walter Off-line NFC Tag Authentication. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto Implementation of tools for brute forcing touch inputted passwords. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Pardis Pourghomi, Gheorghita Ghinea Challenges of managing secure elements within the NFC ecosystem. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Leonard James Mselle, Tabu S. Kondo Deploying Computer-Based Learning under suboptimal conditions. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Sheheryar Malik, Fabrice Huet, Denis Caromel Reliability aware scheduling in cloud computing. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Joonsang Baek, Quang Hieu Vu, Andrew Jones 0002, Sameera Al-Mulla, Chan Yeob Yeun Smart-frame: A flexible, scalable, and secure information management framework for smart grids. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Veena Khongpit, Uthairatt Phangphol, M. L. Kulthon Kasemsan, Chonawat Srisa-an 2D Gun's type classification using edge detection algorithm and SUSAN low level image processing. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Xin Huang 0005, Shangyuan Guo, Bangdao Chen, A. W. Roscoe 0001 Bootstrapping body sensor networks using human controlled LED-camera channels. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura Innovative extracting and integrating the potential and subjectively formed context-information. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili Two novel server-side attacks against log file in Shared Web Hosting servers. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Umar Manzoor, Naveed Ejaz, Nadeem Akhtar, Muhammad Umar, M. Shoaib Khan, Hafsa Umar Ontology based image retrieval. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ruchi Jain, Nasser S. Abouzakhar Hidden Markov Model based anomaly intrusion detection. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Aline Izida, Thiago da Rocha Tedrus, Maria das Graças Bruno Marietto, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Robson dos Santos França Emergency care in situations of natural disaster: A Multi-Agent approach. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ji Ma Analysis of access control protocols using labelled tableaux. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Takuya Matsumoto, Tatuya Yamazaki, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura Visualization of Web exploration streams and user's genuine intentions. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Sara Jeza Alotaibi, Mike Wald Towards a UTAUT-based model for studying the integrating physical and virtual Identity Access Management Systems in e-government domain. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Y. Y. Chen, Shakirah Mohd Taib, Che Sarah Che Nordin Determinants of student performance in advanced programming course. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Gaozheng Zhang, Mengdong Chen, Mou Shen Authorization model of SSO for a distributed environment based on the attributes. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ina Taralova, René Lozi, Safwan El Assad Chaotic generator synthesis: Dynamical and statistical analysis. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Jameson Mbale, Kauna Mufeti, Victor Hamutenya Examining ubiquitous security-capital issues in implementing a Campus-System-as-a-Service(CSaaS) model in the cloud computing age: Case study sub-Saharan region. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Uthairatt Phangphol, Settachai Chaisanit, Tau-tong Puangsuwan, Veena Khongpit, Parichat Kunpluem Community OTOP Web Portal for Eastern Region of Thailand. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Antonis Michalas, Menelaos Bakopoulos SecGOD Google Docs: Now i feel safer! Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Kotaro Yoshida, Yodai Watanabe Security of audio secret sharing scheme encrypting audio secrets. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1A. H. Azni, Rabiah Ahmad, Zul Azri Muhamad Noh Correlated node behavior in wireless ad hoc networks: An epidemic model. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Sidney de Castro, Maria das Graças Bruno Marietto, Robson dos Santos França, Wagner Tanaka Botelho A Multi-Agent System for information management and augmented reality in asymmetric wars. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Abdelrahman AlMahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi Smart authentication for real-time business process monitoring. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ana Cristina Dascalescu, Radu Eugen Boriga A new method to improve cryptographic properties of chaotic discrete dynamical systems. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Maria das Graças Bruno Marietto, Robson dos Santos França, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Emerson Aguiar Noronha, Vera Lúcia da Silva Comparing distinct approaches for panic behavior computer simulations: A theoretical analysis. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Limin Fan Security management mechanism for composite applications based on hash chains. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Hiroyuki Anzai, Hiroaki Kaminaga, Yasuhiko Morimoto, Setsuo Yokoyama, Youzou Miyadera, Shoichi Nakamura A system for management of research resources focusing on grasping the polish processes. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Said Rabah Azzam, Shikun Zhou Implementation methodology of Rely/Guarantee plug-in for Protégé. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Aleksandar Milenkoski, Samuel Kounev Towards benchmarking intrusion detection systems for virtualized cloud environments. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Andres Ojamaa, Karl Düüna Assessing the security of Node.js platform. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Elke Franz 0001, Thomas Springer 0001, Norbert Harder Enhancing privacy in social applications with the notion of group context. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Tom Yuan Gao, David Kearney A shared secret security broker implementation in a commercial context. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Relu Laurentiu Tataru, Safwan El Assad, Olivier Déforges Improved blind DCT watermarking by using chaotic sequences. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Martin A. Negron A Bayesian Belief Network analysis of the Internet governance conflict. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Saneeha Khalid, Haider Abbas, Maruf Pasha, Asad Raza Securing Internet Information Services (IIS) configuration files. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Peter Teufl, Thomas Zefferer, Sandra Kreuzhuber, Christian M. Lesjak Trusted Location Based Services. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Junfeng Xu, Bo Sun, Chengxiang Si The survey of cache management in the shared storage environment. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ashwini Rath, Sanjay Kumar, Sanjay Mohapatra, Rahul Thakurta Decision points for adoption cloud computing in small, medium enterprises (SMEs). Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Hatem Fawzi Halaoui Uncertainty with STOS: Intelligent solution for uncertain navigation problems. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey An assessment of features related to phishing websites using an automated technique. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Alba Amato, Beniamino Di Martino, Salvatore Venticinque Evaluation and brokering of service level agreements for negotiation of cloud infrastructures. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ghada Moussa Bahig, Amr El-Kadi Ensuring software safety in safety critical domains. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Shunsuke Aoki 0001, Masayuki Iwai, Kaoru Sezaki Perturbation for privacy-preserving participatory sensing on mobile. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Kiran Karnad, Saravanan Nagenthram Cloud security: Can the cloud be secured? Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Alok Upadhyay, Jajati Keshari Sahoo, Vibhor Bajpai A novel architecture for secure communications in mobile systems. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Dalia Sobhy, Yasser El-Sonbaty, Mohamad Abou El-Nasr MedCloud: Healthcare cloud computing system. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Tafta Zani, Ari Moesriami Barmawi, Maman Abdurohman Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key Exchange. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Zawlikhah Al Somali, Gheorghita Ghinea Investigation of factors affecting growth of e-banking services in Saudi Arabia. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Omer Nawaz, Christian Gehrmann, Markus Fiedler Secure mobile social networks using USIM in a closed environment. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1S. N. Arun, W. C. Lam, Kok Kiong Tan Innovative solution for a telemedicine application. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Daniel Slamanig, Christian Hanser On cloud storage and the cloud of clouds approach. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ariel Stulman, Jonathan Lahav, Avraham Shmueli MANET secure key exchange using spraying diffie-hellman algorithm. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Safwan El Assad Chaos Based Information Hiding and Security. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Chiranjib Sur, Sanjeev Sharma, Anupam Shukla Analysis & modeling multi-breeded Mean-Minded ant colony optimization of agent based Road Vehicle Routing Management. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Matthias Trojahn, Philipp Marcus Towards coupling user and device locations using biometrical authentication on smartphones. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Omniyah Gul, Mahmoud Al-Qutayri, Quang Hieu Vu, Chan Yeob Yeun Data integration of electronic health records using artificial neural networks. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Khawla Abdulla Alghafli, Andrew Jones 0002, Thomas Anthony Martin Forensics data acquisition methods for mobile phones. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Maria das Graças Bruno Marietto, Margarethe Born Steinberger-Elias, Marllon Felipe Muniz De Farias Alves, Rita Vucinic Teles The process of building knowledge and communication of social systems emulated by multiagent systems capable of cause and emerging learning. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Daniel Fischer 0003, Bernd Markscheffel, Sebastian Frosch, Daniela Büttner A survey of threats and security measures for data transmission over GSM/UMTS networks. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Daphne Rixon, Mary Furey Learning from oversight by telecommunications regulatory agencies. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1JeongMok Ha, Hong Jeong Modelsim simulation for real-time stereo matching using DP algorithm. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Peter Backs, Steffen Wendzel, Jörg Keller 0001 Dynamic routing in covert channel overlays based on control protocols. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Aspen Olmsted, Csilla Farkas High volume web service resource consumption. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Carlos R. Jaimez González, Wulfrano Arturo Luna-Ramírez, Simon M. Lucas A web tool for monitoring HTTP asynchronous method invocations. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Karim Benzidane, Saad Khoudali, Abderrahim Sekkaki Autonomous agent-based inspection for inter-VM traffic in a Cloud environment. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Yury Chemerkin Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook). Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Aliaksandr Lazouski, Gaetano Mancini, Fabio Martinelli, Paolo Mori Usage control in cloud systems. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Pasquale Stirparo, Ioannis Kounelis The mobileak project: Forensics methodology for mobile application privacy assessment. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Norah Farooqi, Siobhán North Evaluation of practical trust based access control for XML databases. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Sheheryar Malik, Fabrice Huet, Denis Caromel RACS: A framework for Resource Aware Cloud computing. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Nick Savage 0001, Safwan El Assad, Charles A. Shoniregun (eds.) 7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012 Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
Displaying result #501 - #600 of 998 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license