Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Mohamed Sameh Hassanein, Gheorghita Ghinea |
Text fingerprint key generation. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Galoh Rashidah Haron, Dharmadharshni Maniam, Vijayakumari Sadasivam, Wong Hon Loon |
Re-engineering of web reverse proxy with shibboleth authentication. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Said Rabah Azzam, Shikun Zhou |
Assessment of ontology alignment methodology. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Dawn Carmichael, David Cleave |
How effective is social media advertising? A study of Facebook Social Advertisements. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Damian Gordon |
Hackers and Hollywood 2: Considering televisual Cyberthreats in Security Risk Analysis. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Lorenzo Antonio Delgado-Guillen, Jose Juan Garcia-Hernandez, César Torres-Huitzil |
Validating the existence of watermarks on digital images using a mobile phone. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan |
Detecting counterfeit-money using RFID-enabled mobile devices. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ratchadawan Nimnual, Settachai Chaisanit |
M-learning for Eco-Packaging using KM. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Neda Abdelhamid, Aladdin Ayesh, Fadi A. Thabtah |
An experimental study of three different rule ranking formulas in associative classification. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Léa D. Cot, René Lozi |
Assessing the security of subsampling process using modified EKF and nonlinear least squares methods. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Greg Miiller |
Issues in inter-organisational encryption systems: The problem with FedLink. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Laddawan Meeanan, Apichai Trangansri, Pornpipat Hongthai, Settachai Chaisanit, Ratchadawan Nimnual |
The edutainment of virtual music instrument for Thai xylophone (Ranad-ek). |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Zhe Wang 0029, Xiaodong Liu 0001, Kevin Chalmers, Guojian Cheng |
Evolution pattern for Service Evolution in Clouds. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Xin Huang 0005, Rong Fu, Bangdao Chen, Tingting Zhang, A. W. Roscoe 0001 |
User interactive Internet of things privacy preserved access control. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Yang Guo, Guohua Bai, Yan Hu |
Using Bayes Network for Prediction of Type-2 diabetes. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Jeffrey Medsger, Avinash Srinivasan |
ERASE- entropy-based sanitization of sensitive data for privacy preservation. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Eghbal Ghazizadeh, Mazdak Zamani, Jamalul-lail Ab Manan, Reza Khaleghparast, Ali Taherian |
A trust based model for federated identity architecture to mitigate identity theft. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Sajjad Ahmed Ghauri, Hasan Humayun, Muhammad Ehsan ul Haq, Farhan Sohail |
Implementation of Convolutional codes on FPGA. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Markus Jung, Thomas Hofer, Susen Döbelt, Georg Kienesberger, Florian Judex, Wolfgang Kastner |
Access control for a Smart Grid SOA. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Mohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera |
Forensics filesystem with cluster-level identifiers for efficient data recovery. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Benjamin Heckmann, Marcus Zinn, Ronald C. Moore, Christoph Wentzel, Andrew D. Phippen |
Economic efficiency control on data centre resources in heterogeneous cost scenarios. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Jerry Walsh, Donogh Roche, Franclin S. Foping |
NitroScript: A PHP template engine for customizing of e-commerce applications. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | José Luis González 0002, Victor Sosa-Sosa, Borja Bergua, Luis Miguel Sánchez, Jesús Carretero 0001 |
Fault-tolerant middleware based on multistream pipeline for private storage services. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Rozita Mohd Yusof, Norrozila Sulaiman |
Multi-probes fusion framework for matching simultaneous latent impressions. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Brad Miller, Kaitlyn Buck, J. D. Tygar |
Systematic analysis and evaluation of web privacy policies and implementations. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ahmad Mousa Odat |
E-Government in developing countries: Framework of challenges and opportunities. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Muhammad Qasim Saeed, Colin D. Walter |
Off-line NFC Tag Authentication. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto |
Implementation of tools for brute forcing touch inputted passwords. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Pardis Pourghomi, Gheorghita Ghinea |
Challenges of managing secure elements within the NFC ecosystem. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Leonard James Mselle, Tabu S. Kondo |
Deploying Computer-Based Learning under suboptimal conditions. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Sheheryar Malik, Fabrice Huet, Denis Caromel |
Reliability aware scheduling in cloud computing. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Joonsang Baek, Quang Hieu Vu, Andrew Jones 0002, Sameera Al-Mulla, Chan Yeob Yeun |
Smart-frame: A flexible, scalable, and secure information management framework for smart grids. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Veena Khongpit, Uthairatt Phangphol, M. L. Kulthon Kasemsan, Chonawat Srisa-an |
2D Gun's type classification using edge detection algorithm and SUSAN low level image processing. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Xin Huang 0005, Shangyuan Guo, Bangdao Chen, A. W. Roscoe 0001 |
Bootstrapping body sensor networks using human controlled LED-camera channels. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura |
Innovative extracting and integrating the potential and subjectively formed context-information. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Seyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan, Rasool Jalili |
Two novel server-side attacks against log file in Shared Web Hosting servers. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Umar Manzoor, Naveed Ejaz, Nadeem Akhtar, Muhammad Umar, M. Shoaib Khan, Hafsa Umar |
Ontology based image retrieval. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ruchi Jain, Nasser S. Abouzakhar |
Hidden Markov Model based anomaly intrusion detection. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Aline Izida, Thiago da Rocha Tedrus, Maria das Graças Bruno Marietto, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Robson dos Santos França |
Emergency care in situations of natural disaster: A Multi-Agent approach. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ji Ma |
Analysis of access control protocols using labelled tableaux. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Takuya Matsumoto, Tatuya Yamazaki, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura |
Visualization of Web exploration streams and user's genuine intentions. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Sara Jeza Alotaibi, Mike Wald |
Towards a UTAUT-based model for studying the integrating physical and virtual Identity Access Management Systems in e-government domain. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Y. Y. Chen, Shakirah Mohd Taib, Che Sarah Che Nordin |
Determinants of student performance in advanced programming course. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Gaozheng Zhang, Mengdong Chen, Mou Shen |
Authorization model of SSO for a distributed environment based on the attributes. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ina Taralova, René Lozi, Safwan El Assad |
Chaotic generator synthesis: Dynamical and statistical analysis. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Jameson Mbale, Kauna Mufeti, Victor Hamutenya |
Examining ubiquitous security-capital issues in implementing a Campus-System-as-a-Service(CSaaS) model in the cloud computing age: Case study sub-Saharan region. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Uthairatt Phangphol, Settachai Chaisanit, Tau-tong Puangsuwan, Veena Khongpit, Parichat Kunpluem |
Community OTOP Web Portal for Eastern Region of Thailand. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Antonis Michalas, Menelaos Bakopoulos |
SecGOD Google Docs: Now i feel safer! |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Kotaro Yoshida, Yodai Watanabe |
Security of audio secret sharing scheme encrypting audio secrets. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | A. H. Azni, Rabiah Ahmad, Zul Azri Muhamad Noh |
Correlated node behavior in wireless ad hoc networks: An epidemic model. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Sidney de Castro, Maria das Graças Bruno Marietto, Robson dos Santos França, Wagner Tanaka Botelho |
A Multi-Agent System for information management and augmented reality in asymmetric wars. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Abdelrahman AlMahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi |
Smart authentication for real-time business process monitoring. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ana Cristina Dascalescu, Radu Eugen Boriga |
A new method to improve cryptographic properties of chaotic discrete dynamical systems. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Maria das Graças Bruno Marietto, Robson dos Santos França, Margarethe Steinberger-Elias, Wagner Tanaka Botelho, Emerson Aguiar Noronha, Vera Lúcia da Silva |
Comparing distinct approaches for panic behavior computer simulations: A theoretical analysis. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Limin Fan |
Security management mechanism for composite applications based on hash chains. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Hiroyuki Anzai, Hiroaki Kaminaga, Yasuhiko Morimoto, Setsuo Yokoyama, Youzou Miyadera, Shoichi Nakamura |
A system for management of research resources focusing on grasping the polish processes. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Said Rabah Azzam, Shikun Zhou |
Implementation methodology of Rely/Guarantee plug-in for Protégé. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Aleksandar Milenkoski, Samuel Kounev |
Towards benchmarking intrusion detection systems for virtualized cloud environments. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Andres Ojamaa, Karl Düüna |
Assessing the security of Node.js platform. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Elke Franz 0001, Thomas Springer 0001, Norbert Harder |
Enhancing privacy in social applications with the notion of group context. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Tom Yuan Gao, David Kearney |
A shared secret security broker implementation in a commercial context. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Relu Laurentiu Tataru, Safwan El Assad, Olivier Déforges |
Improved blind DCT watermarking by using chaotic sequences. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Martin A. Negron |
A Bayesian Belief Network analysis of the Internet governance conflict. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Saneeha Khalid, Haider Abbas, Maruf Pasha, Asad Raza |
Securing Internet Information Services (IIS) configuration files. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Peter Teufl, Thomas Zefferer, Sandra Kreuzhuber, Christian M. Lesjak |
Trusted Location Based Services. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Junfeng Xu, Bo Sun, Chengxiang Si |
The survey of cache management in the shared storage environment. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ashwini Rath, Sanjay Kumar, Sanjay Mohapatra, Rahul Thakurta |
Decision points for adoption cloud computing in small, medium enterprises (SMEs). |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Hatem Fawzi Halaoui |
Uncertainty with STOS: Intelligent solution for uncertain navigation problems. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Rami Mustafa A. Mohammad, Fadi A. Thabtah, Lee McCluskey |
An assessment of features related to phishing websites using an automated technique. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Alba Amato, Beniamino Di Martino, Salvatore Venticinque |
Evaluation and brokering of service level agreements for negotiation of cloud infrastructures. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ghada Moussa Bahig, Amr El-Kadi |
Ensuring software safety in safety critical domains. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Shunsuke Aoki 0001, Masayuki Iwai, Kaoru Sezaki |
Perturbation for privacy-preserving participatory sensing on mobile. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Kiran Karnad, Saravanan Nagenthram |
Cloud security: Can the cloud be secured? |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Alok Upadhyay, Jajati Keshari Sahoo, Vibhor Bajpai |
A novel architecture for secure communications in mobile systems. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Dalia Sobhy, Yasser El-Sonbaty, Mohamad Abou El-Nasr |
MedCloud: Healthcare cloud computing system. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Tafta Zani, Ari Moesriami Barmawi, Maman Abdurohman |
Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key Exchange. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Zawlikhah Al Somali, Gheorghita Ghinea |
Investigation of factors affecting growth of e-banking services in Saudi Arabia. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Omer Nawaz, Christian Gehrmann, Markus Fiedler |
Secure mobile social networks using USIM in a closed environment. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | S. N. Arun, W. C. Lam, Kok Kiong Tan |
Innovative solution for a telemedicine application. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Daniel Slamanig, Christian Hanser |
On cloud storage and the cloud of clouds approach. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ariel Stulman, Jonathan Lahav, Avraham Shmueli |
MANET secure key exchange using spraying diffie-hellman algorithm. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Safwan El Assad |
Chaos Based Information Hiding and Security. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Chiranjib Sur, Sanjeev Sharma, Anupam Shukla |
Analysis & modeling multi-breeded Mean-Minded ant colony optimization of agent based Road Vehicle Routing Management. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Matthias Trojahn, Philipp Marcus |
Towards coupling user and device locations using biometrical authentication on smartphones. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Omniyah Gul, Mahmoud Al-Qutayri, Quang Hieu Vu, Chan Yeob Yeun |
Data integration of electronic health records using artificial neural networks. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Khawla Abdulla Alghafli, Andrew Jones 0002, Thomas Anthony Martin |
Forensics data acquisition methods for mobile phones. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Maria das Graças Bruno Marietto, Margarethe Born Steinberger-Elias, Marllon Felipe Muniz De Farias Alves, Rita Vucinic Teles |
The process of building knowledge and communication of social systems emulated by multiagent systems capable of cause and emerging learning. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Daniel Fischer 0003, Bernd Markscheffel, Sebastian Frosch, Daniela Büttner |
A survey of threats and security measures for data transmission over GSM/UMTS networks. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Daphne Rixon, Mary Furey |
Learning from oversight by telecommunications regulatory agencies. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | JeongMok Ha, Hong Jeong |
Modelsim simulation for real-time stereo matching using DP algorithm. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Peter Backs, Steffen Wendzel, Jörg Keller 0001 |
Dynamic routing in covert channel overlays based on control protocols. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Aspen Olmsted, Csilla Farkas |
High volume web service resource consumption. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Carlos R. Jaimez González, Wulfrano Arturo Luna-Ramírez, Simon M. Lucas |
A web tool for monitoring HTTP asynchronous method invocations. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Karim Benzidane, Saad Khoudali, Abderrahim Sekkaki |
Autonomous agent-based inspection for inter-VM traffic in a Cloud environment. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Yury Chemerkin |
Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook). |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Aliaksandr Lazouski, Gaetano Mancini, Fabio Martinelli, Paolo Mori |
Usage control in cloud systems. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Pasquale Stirparo, Ioannis Kounelis |
The mobileak project: Forensics methodology for mobile application privacy assessment. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Norah Farooqi, Siobhán North |
Evaluation of practical trust based access control for XML databases. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Sheheryar Malik, Fabrice Huet, Denis Caromel |
RACS: A framework for Resource Aware Cloud computing. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Nick Savage 0001, Safwan El Assad, Charles A. Shoniregun (eds.) |
7th International Conference for Internet Technology and Secured Transactions, ICITST 2012, London, United Kingdom, December 10-12, 2012 |
ICITST |
2012 |
DBLP BibTeX RDF |
|