The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Abrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker Usability of profile based student authentication and traffic light system in online examinations. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1V. Anil Kumar, Debabrata Das Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission Protocol. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Pardis Pourghomi, Gheorghita Ghinea Managing NFC payment applications through cloud computing. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Mourad Ykhlef, Abeer AlDayel Query paraphrasing using genetic approach for intelligent information retrieval. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Abdul Qayum, Prakash Kumar QR decomposition-based cryptography: Via image generation (QR-CRYPT). Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Yan Hu, Fangjie Lu, Israr Khan, Guohua Bai A cloud computing solution for sharing healthcare information. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Yongki Kim, Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon The design of adaptive intrusion tolerant system(ITS) based on historical data. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Lena Yuryna Connolly, Michael Lang 0001 Investigation of cultural aspects within information systems security research. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Settachai Chaisanit, Napatwadee Sangboonnum Hongthong, Surachai Suksakulchai, Chuchart Pinpat Traditional musical Virtual Reality on M-learning. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban Error correction and detection system based on Hopfield networks. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Rehaballah Elbadrawy, Rasha Abdel Aziz Mobile banking contexts and prospects in Egypt: A framework. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Suaad S. Alarifi, Stephen D. Wolthusen Detecting anomalies in IaaS environments through virtual machine host system call analysis. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Tom Kirkham, Karim Djemame, Mariam Kiran, Ming Jiang, Django Armstrong, George Kousiouris, George Vafiadis, Athanasia Evangelinou Risk based SLA management in clouds: A legal perspective. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ewa Idzikowska A round level approach to fault detection in PP-2 symmetric block cipher. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Jabu Mtsweni Exploiting UML and acceleo for developing Semantic Web Services. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Abdullah Abuhussein, Harkeerat Singh Bedi, Sajjan G. Shiva Evaluating security and privacy in cloud computing services: A Stakeholder's perspective. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly A new lightweight hybrid cryptographic algorithm for the internet of things. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Surachai Suksakulchai, Wacheerapan Kaewprapan, Settachai Chaisanit Making of DAISY Talking book on mobile phone: A concept and architecture. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Bernd Zwattendorfer, Arne Tauber Secure cross-cloud single sign-on (SSO) using eIDs. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Somsak Choto, Nol Premasathian A dynamic fuzzy commitment scheme using ARRSES forecasting. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Geovanny Poveda, Adam Westerski, Carlos Angel Iglesias Application of semantic search in Idea Management Systems. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Jason Flood, Mark Denihan, Anthony Keane, Fredrick Mtenzi Black hat training of white hat resources: The future of security is gaming. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Saurabh Kulkarni, Madhumitra Mutalik, Prathamesh Kulkarni, Tarun Gupta 0003 Honeydoop - a system for on-demand virtual high interaction honeypots. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1N. Abdul Hamid, M. F. Al A'zhim, M. L. Yap e-Ticketing system for football events in Malaysia. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Mike Just, David Aspinall 0001 On the security and usability of dual credential authentication in UK online banking. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Marcus Vinicius Carvalho Guelpeli, Ana Cristina Bicharra Garcia, António Horta Branco The process of summarization in the pre-processing stage in order to improve measurement of texts when clustering. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Imad M. Abbadi, Cornelius Namiluko Dynamics of trust in Clouds - Challenges and research agenda. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Benjamin Hirsch, Jason W. P. Ng Education beyond the cloud: Anytime-anywhere learning in a smart campus environment. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Eric Southern, Abdelkader H. Ouda, Abdallah Shami Solutions to security issues with legacy integration of GSM into UMTS. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Flávio Dumortout de Mendonça Júnior, Daniela Gorski Trevisan, Thiago Cortat Tavares, José Luiz Thomaselli Nogueira A-CitizenMobile: A case study for blind users. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Kheng Kok Mar Secured Virtual Diffused File System for the cloud. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mohamed Elmoghany, Mohamed Diab, Moustafa Kassem, Mustafa Khairallah, Omar El Shahat, Wael Sharkasy FPGA implementation of high speed XTS-AES for data storage devices. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Anam Tariq, Muhammad Usman Akram, Shoab Ahmad Khan An automated system for fingerprint classification using singular points for biometric security. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hicham Sadok E-Banking in Morocco: Study of some specifying factors. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Maitha Salem Al Mazrouei, Sundaravalli Narayanaswami Mobile adhoc networks: A simulation based security evaluation and intrusion prevention. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini Multiple SEIMCHA: Multiple semantic image CAPTCHA. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Noora Al Mutawa, Ibtesam Al Awadhi, Ibrahim M. Baggili, Andrew Marrington Forensic artifacts of Facebook's instant messaging service. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Salwa Adriana Saab, Ayman I. Kayssi, Ali Chehab A decentralized energy-aware key management scheme for Wireless Sensor Networks. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1 6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011 Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Christian Willems, Thomas Klingbeil, Lukas Radvilavicius, Antanas Cenys, Christoph Meinel A distributed virtual laboratory architecture for cybersecurity training. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Farhan Bashir Shaikh, Sajjad Haider 0003 Security threats in cloud computing. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Noora Albalooshi, Nader Mohamed, Jameela Al-Jaroodi The challenges of Arabic language use on the Internet. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Abdur Rahim Choudhary Policy rule-sets for policy based systems. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Asjad Amin, Haseeb Ahmed, Abubakar Rafique, Muhammad Junaid Nawaz, Muhammad Salahudin, Zulfiqar Ahmed Designing a hierarchical DHCP server's model to automatically provide dedicated IP address anywhere in the world with mobility. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hamad Marzouqi, Khaled Salah 0001, Mahmoud Al-Qutayri, Chan Yeob Yeun A unified countermeasure against side channel attacks on cryptographic RFID. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Nazish Irfan, Mustapha C. E. Yagoub, Khelifa Hettak Redundant reader elimination for directional antenna in RFID systems. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hadiseh Seyyed Alipour, Mehdi Sabbari, Eslam Nazemi A policy based access control model for web services. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Kin Fai Poon, Anis Ouali A MILP based design tool for FTTH access networks with consideration of demand growth. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Amjad Gawanmeh, Sofiène Tahar Modeling and verification of firewall configurations using domain restriction method. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Masoumeh Safkhani, Nasour Bagheri, Majid Naderi Vulnerabilities in a new RFID access control protocol. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour Toward an abstract language on top of XACML for web services security. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ameera Salem Abdouli, Joonsang Baek, Chan Yeob Yeun Survey on computationally hard problems and their applications to cryptography. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Nezar Nassr, Eric Steegmans A parameterized RBAC access control model for WS-BPEL orchestrated composite web services. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Amr Sayed Abdel Fattah, Salwa H. El-Ramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez Denoising algorithm for noisy chaotic signal by using wavelet transform: Comprehensive study. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Faisal Al Ameiri, Khaled Salah 0001 Evaluation of popular application sandboxing. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ayman A. Hanafy, Sherif Hazem Noureldin, Marianne A. Azer Immunizing the SAODV protocol against routing information disclosure. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Jens Hasselbach, Patrick Aichroth Access control and content authentication for hybrid DVB-T2/P2P broadcasting. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Tina Francis Proximity aware overlays in peer-to-peer networks. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Maleika Heenaye-Mamode Khan, Naushad Mamode Khan Dorsal hand vein biometric using Independent Component Analysis (ICA). Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Maryline Chetto, Hussein El Ghor, Rafic Hage Chehade Real-time scheduling for energy harvesting sensors. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1SeongHan Shin, Kazukuni Kobara, Hideki Imai A secure public cloud storage system. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig Trapping and analyzing malicious VoIP traffic using a honeynet approach. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hajer Al Housani, Joonsang Baek, Chan Yeob Yeun Survey on certificateless public key cryptography. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mohammad Moein Taheri, Kamran Zamanifar 2-phase optimization method for energy aware scheduling of virtual machines in cloud data centers. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Imad M. Abbadi, Cornelius Namiluko, Andrew P. Martin Insiders analysis in Cloud computing focusing on home healthcare system. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hadi H. Abdlrudha, Qassim Nasir Low complexity high security image encryption based on Nested PWLCM Chaotic Map. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Pradhumna Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif A general attack method for steganography removal using Pseudo-CFA re-interpolation. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mahmoud Khonji, Youssef Iraqi, Andrew Jones 0002 Lexical URL analysis for discriminating phishing and legitimate e-mail messages. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Devendra Mani Tripathi A note on modified SET protocol for mobile payment. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Tomasz Bilski Security-functionality tradeoffs in IP transition phase. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mohamed Zayed, Asma Ouari, Meriem Derraschouk, Youcef Chibani An effective hybrid thresholding technique for degraded documents images binarization. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Bernd Markscheffel, Daniela Büttner, Daniel Fischer 0003 Desktop search engines - A state of the art comparison. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Basheer Al-Duwairi, I. Khater, Omar M. Al-Jarrah Texture Analysis-Based Image Spam Filtering. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Khalfan AlMarashda, Yousuf Alsalami, Khaled Salah 0001, Thomas Martin 0002 On the security of inclusion or omission of MixColumns in AES cipher. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh Formal modeling and verification of DLK protocol. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Turki F. Al-Somani, Hilal Houssain Implementation of GF(2m) Elliptic Curve cryptoprocessor on a Nano FPGA. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mahmoud A. Alahmad, Muhammad F. Zulfiqar, Hosen Hasna, Timothy Wisnieski, Nasser A. Aljuhaishi, Hamid Sharif Technologies enabling sustainability in the built environment. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Sheheryar Malik, Fabrice Huet Virtual Cloud: Rent Out the Rented Resources. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1George S. Oreku Key complication procedure in data driven ciphers based on controlled substitution-permutation networks. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Asjad Amin, Haseeb Ahmad Qureshi, Muhammad Junaid Nawaz, Muhammad Yasir Habib, Waqas Anjum Modified run length encoding scheme with introduction of bit stuffing for efficient data compression. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ahmed A. Sabeeh, Arash Habibi Lashkari Users' perceptions on mobile devices security awareness in Malaysia. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Fatma Ahmad Bazargan, Chan Yeob Yeun, Mohamed Jamal Zemerly Understanding the security challenges of virtualized environments. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mehran Garmehi, Morteza Analoui An economical mechanism for multicasting of content among servers of Hybrid CDN-P2P networks. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Dimitris Zisiadis, Spyros Kopsidas, Argyris Varalis, Leandros Tassiulas Mailbook: A social network against spamming. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Faisal Al Ameiri, Mohamed Jamal Zemerly, Mohamed Al Marzouqi Mobile Arabic sign language. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Huwida Said, Mário A. M. Guimarães, Noora Al Mutawa, Ibtesam Al Awadhi Forensics and war-driving on unsecured wireless network. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Georgi T. Tsenov, Valeri M. Mladenov, Ina Taralova Synchronization of Sigma Delta Modulators. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban Reed-Muller decoder with associative memories. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Ehsan Toreini, Maryam Mehrnejad A novel method in fuzzy data clustering based on chaotic PSO. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hanan Al Obaidli, Asif Iqbal 0003 Digital forensics education in UAE. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Chigusa Yamamura, Kazuhiro Otsuki, Arisa Fujii, Kiyohiko Ishikawa Identity management architecture for integrated personalized service on TV. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Amna AlDahak AlShamsi, M. AlMarzouqi, Lakmal D. Seneviratne Evaluating USARSim for use in fire search and rescue. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Muhammad Usman Akram, Anam Tariq, Shoab Ahmad Khan Retinal recognition: Personal identification using blood vessels. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Mhamed Zineddine Automated healthcare information privacy and security: UAE case. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hanno Hildmann Behavioural game AI - A theoretical approach. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Galoh Rashidah Haron, Kang Siong Ng Extrapolating security requirements to an established software process: Version 1.0. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Petre Anghelescu, Silviu Ionita, Vasile-Gabriel Iana FPGA implementation of cellular automata based encryption algorithm for internet communications. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Gang Wang, Kunming Nie A framework of VI-based ranking and recommendation of web services. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Hanno Hildmann, Sebastien Nicolas, Fabrice Saffre Critical infrastructure protection through distributed reactive demand-side management. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
1Norah Farooqi, Siobhán North Trust-based access control for XML databases. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
Displaying result #601 - #700 of 998 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license