Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Abrar Ullah, Hannan Xiao, Mariana Lilley, Trevor Barker |
Usability of profile based student authentication and traffic light system in online examinations. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | V. Anil Kumar, Debabrata Das |
Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission Protocol. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Pardis Pourghomi, Gheorghita Ghinea |
Managing NFC payment applications through cloud computing. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Mourad Ykhlef, Abeer AlDayel |
Query paraphrasing using genetic approach for intelligent information retrieval. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Abdul Qayum, Prakash Kumar |
QR decomposition-based cryptography: Via image generation (QR-CRYPT). |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Yan Hu, Fangjie Lu, Israr Khan, Guohua Bai |
A cloud computing solution for sharing healthcare information. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Yongki Kim, Jungmin Lim, Seokjoo Doo, Hyunsoo Yoon |
The design of adaptive intrusion tolerant system(ITS) based on historical data. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Lena Yuryna Connolly, Michael Lang 0001 |
Investigation of cultural aspects within information systems security research. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Settachai Chaisanit, Napatwadee Sangboonnum Hongthong, Surachai Suksakulchai, Chuchart Pinpat |
Traditional musical Virtual Reality on M-learning. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban |
Error correction and detection system based on Hopfield networks. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Rehaballah Elbadrawy, Rasha Abdel Aziz |
Mobile banking contexts and prospects in Egypt: A framework. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Suaad S. Alarifi, Stephen D. Wolthusen |
Detecting anomalies in IaaS environments through virtual machine host system call analysis. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Tom Kirkham, Karim Djemame, Mariam Kiran, Ming Jiang, Django Armstrong, George Kousiouris, George Vafiadis, Athanasia Evangelinou |
Risk based SLA management in clouds: A legal perspective. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Ewa Idzikowska |
A round level approach to fault detection in PP-2 symmetric block cipher. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Jabu Mtsweni |
Exploiting UML and acceleo for developing Semantic Web Services. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Abdullah Abuhussein, Harkeerat Singh Bedi, Sajjan G. Shiva |
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly |
A new lightweight hybrid cryptographic algorithm for the internet of things. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Surachai Suksakulchai, Wacheerapan Kaewprapan, Settachai Chaisanit |
Making of DAISY Talking book on mobile phone: A concept and architecture. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Bernd Zwattendorfer, Arne Tauber |
Secure cross-cloud single sign-on (SSO) using eIDs. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Somsak Choto, Nol Premasathian |
A dynamic fuzzy commitment scheme using ARRSES forecasting. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Geovanny Poveda, Adam Westerski, Carlos Angel Iglesias |
Application of semantic search in Idea Management Systems. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Jason Flood, Mark Denihan, Anthony Keane, Fredrick Mtenzi |
Black hat training of white hat resources: The future of security is gaming. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Saurabh Kulkarni, Madhumitra Mutalik, Prathamesh Kulkarni, Tarun Gupta 0003 |
Honeydoop - a system for on-demand virtual high interaction honeypots. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | N. Abdul Hamid, M. F. Al A'zhim, M. L. Yap |
e-Ticketing system for football events in Malaysia. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Mike Just, David Aspinall 0001 |
On the security and usability of dual credential authentication in UK online banking. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
1 | Marcus Vinicius Carvalho Guelpeli, Ana Cristina Bicharra Garcia, António Horta Branco |
The process of summarization in the pre-processing stage in order to improve measurement of texts when clustering. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Imad M. Abbadi, Cornelius Namiluko |
Dynamics of trust in Clouds - Challenges and research agenda. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Benjamin Hirsch, Jason W. P. Ng |
Education beyond the cloud: Anytime-anywhere learning in a smart campus environment. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Eric Southern, Abdelkader H. Ouda, Abdallah Shami |
Solutions to security issues with legacy integration of GSM into UMTS. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Flávio Dumortout de Mendonça Júnior, Daniela Gorski Trevisan, Thiago Cortat Tavares, José Luiz Thomaselli Nogueira |
A-CitizenMobile: A case study for blind users. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Kheng Kok Mar |
Secured Virtual Diffused File System for the cloud. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mohamed Elmoghany, Mohamed Diab, Moustafa Kassem, Mustafa Khairallah, Omar El Shahat, Wael Sharkasy |
FPGA implementation of high speed XTS-AES for data storage devices. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Anam Tariq, Muhammad Usman Akram, Shoab Ahmad Khan |
An automated system for fingerprint classification using singular points for biometric security. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hicham Sadok |
E-Banking in Morocco: Study of some specifying factors. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Maitha Salem Al Mazrouei, Sundaravalli Narayanaswami |
Mobile adhoc networks: A simulation based security evaluation and intrusion prevention. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Maryam Mehrnejad, Abbas Ghaemi Bafghi, Ahad Harati, Ehsan Toreini |
Multiple SEIMCHA: Multiple semantic image CAPTCHA. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Noora Al Mutawa, Ibtesam Al Awadhi, Ibrahim M. Baggili, Andrew Marrington |
Forensic artifacts of Facebook's instant messaging service. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Salwa Adriana Saab, Ayman I. Kayssi, Ali Chehab |
A decentralized energy-aware key management scheme for Wireless Sensor Networks. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | |
6th International Conference for Internet Technology and Secured Transactions, ICITST 2011, Abu Dhabi, UAE, December 11-14, 2011 |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Christian Willems, Thomas Klingbeil, Lukas Radvilavicius, Antanas Cenys, Christoph Meinel |
A distributed virtual laboratory architecture for cybersecurity training. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Farhan Bashir Shaikh, Sajjad Haider 0003 |
Security threats in cloud computing. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Noora Albalooshi, Nader Mohamed, Jameela Al-Jaroodi |
The challenges of Arabic language use on the Internet. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Abdur Rahim Choudhary |
Policy rule-sets for policy based systems. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Asjad Amin, Haseeb Ahmed, Abubakar Rafique, Muhammad Junaid Nawaz, Muhammad Salahudin, Zulfiqar Ahmed |
Designing a hierarchical DHCP server's model to automatically provide dedicated IP address anywhere in the world with mobility. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hamad Marzouqi, Khaled Salah 0001, Mahmoud Al-Qutayri, Chan Yeob Yeun |
A unified countermeasure against side channel attacks on cryptographic RFID. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Nazish Irfan, Mustapha C. E. Yagoub, Khelifa Hettak |
Redundant reader elimination for directional antenna in RFID systems. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hadiseh Seyyed Alipour, Mehdi Sabbari, Eslam Nazemi |
A policy based access control model for web services. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Kin Fai Poon, Anis Ouali |
A MILP based design tool for FTTH access networks with consideration of demand growth. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Amjad Gawanmeh, Sofiène Tahar |
Modeling and verification of firewall configurations using domain restriction method. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Masoumeh Safkhani, Nasour Bagheri, Majid Naderi |
Vulnerabilities in a new RFID access control protocol. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Azzam Mourad, Hadi Otrok, Hamdi Yahyaoui, Lama Baajour |
Toward an abstract language on top of XACML for web services security. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ameera Salem Abdouli, Joonsang Baek, Chan Yeob Yeun |
Survey on computationally hard problems and their applications to cryptography. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Nezar Nassr, Eric Steegmans |
A parameterized RBAC access control model for WS-BPEL orchestrated composite web services. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Amr Sayed Abdel Fattah, Salwa H. El-Ramly, Magdy M. Ibrahim, Ahmed Abdel-Hafez |
Denoising algorithm for noisy chaotic signal by using wavelet transform: Comprehensive study. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Faisal Al Ameiri, Khaled Salah 0001 |
Evaluation of popular application sandboxing. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ayman A. Hanafy, Sherif Hazem Noureldin, Marianne A. Azer |
Immunizing the SAODV protocol against routing information disclosure. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Jens Hasselbach, Patrick Aichroth |
Access control and content authentication for hybrid DVB-T2/P2P broadcasting. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Tina Francis |
Proximity aware overlays in peer-to-peer networks. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Maleika Heenaye-Mamode Khan, Naushad Mamode Khan |
Dorsal hand vein biometric using Independent Component Analysis (ICA). |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Maryline Chetto, Hussein El Ghor, Rafic Hage Chehade |
Real-time scheduling for energy harvesting sensors. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A secure public cloud storage system. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Markus Gruber, Florian Fankhauser, Stefan Taber, Christian Schanes, Thomas Grechenig |
Trapping and analyzing malicious VoIP traffic using a honeynet approach. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hajer Al Housani, Joonsang Baek, Chan Yeob Yeun |
Survey on certificateless public key cryptography. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mohammad Moein Taheri, Kamran Zamanifar |
2-phase optimization method for energy aware scheduling of virtual machines in cloud data centers. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Imad M. Abbadi, Cornelius Namiluko, Andrew P. Martin |
Insiders analysis in Cloud computing focusing on home healthcare system. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hadi H. Abdlrudha, Qassim Nasir |
Low complexity high security image encryption based on Nested PWLCM Chaotic Map. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Pradhumna Shrestha, Michael Hempel, Tao Ma, Dongming Peng, Hamid Sharif |
A general attack method for steganography removal using Pseudo-CFA re-interpolation. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mahmoud Khonji, Youssef Iraqi, Andrew Jones 0002 |
Lexical URL analysis for discriminating phishing and legitimate e-mail messages. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Devendra Mani Tripathi |
A note on modified SET protocol for mobile payment. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Tomasz Bilski |
Security-functionality tradeoffs in IP transition phase. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mohamed Zayed, Asma Ouari, Meriem Derraschouk, Youcef Chibani |
An effective hybrid thresholding technique for degraded documents images binarization. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Bernd Markscheffel, Daniela Büttner, Daniel Fischer 0003 |
Desktop search engines - A state of the art comparison. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Basheer Al-Duwairi, I. Khater, Omar M. Al-Jarrah |
Texture Analysis-Based Image Spam Filtering. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Khalfan AlMarashda, Yousuf Alsalami, Khaled Salah 0001, Thomas Martin 0002 |
On the security of inclusion or omission of MixColumns in AES cipher. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly, Mahmoud Al-Qutayri, Amjad Gawanmeh |
Formal modeling and verification of DLK protocol. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Turki F. Al-Somani, Hilal Houssain |
Implementation of GF(2m) Elliptic Curve cryptoprocessor on a Nano FPGA. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mahmoud A. Alahmad, Muhammad F. Zulfiqar, Hosen Hasna, Timothy Wisnieski, Nasser A. Aljuhaishi, Hamid Sharif |
Technologies enabling sustainability in the built environment. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Sheheryar Malik, Fabrice Huet |
Virtual Cloud: Rent Out the Rented Resources. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | George S. Oreku |
Key complication procedure in data driven ciphers based on controlled substitution-permutation networks. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Asjad Amin, Haseeb Ahmad Qureshi, Muhammad Junaid Nawaz, Muhammad Yasir Habib, Waqas Anjum |
Modified run length encoding scheme with introduction of bit stuffing for efficient data compression. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ahmed A. Sabeeh, Arash Habibi Lashkari |
Users' perceptions on mobile devices security awareness in Malaysia. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Fatma Ahmad Bazargan, Chan Yeob Yeun, Mohamed Jamal Zemerly |
Understanding the security challenges of virtualized environments. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mehran Garmehi, Morteza Analoui |
An economical mechanism for multicasting of content among servers of Hybrid CDN-P2P networks. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Dimitris Zisiadis, Spyros Kopsidas, Argyris Varalis, Leandros Tassiulas |
Mailbook: A social network against spamming. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Faisal Al Ameiri, Mohamed Jamal Zemerly, Mohamed Al Marzouqi |
Mobile Arabic sign language. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Huwida Said, Mário A. M. Guimarães, Noora Al Mutawa, Ibtesam Al Awadhi |
Forensics and war-driving on unsecured wireless network. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Georgi T. Tsenov, Valeri M. Mladenov, Ina Taralova |
Synchronization of Sigma Delta Modulators. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Laurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban |
Reed-Muller decoder with associative memories. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Ehsan Toreini, Maryam Mehrnejad |
A novel method in fuzzy data clustering based on chaotic PSO. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hanan Al Obaidli, Asif Iqbal 0003 |
Digital forensics education in UAE. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Chigusa Yamamura, Kazuhiro Otsuki, Arisa Fujii, Kiyohiko Ishikawa |
Identity management architecture for integrated personalized service on TV. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Amna AlDahak AlShamsi, M. AlMarzouqi, Lakmal D. Seneviratne |
Evaluating USARSim for use in fire search and rescue. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Muhammad Usman Akram, Anam Tariq, Shoab Ahmad Khan |
Retinal recognition: Personal identification using blood vessels. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Mhamed Zineddine |
Automated healthcare information privacy and security: UAE case. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hanno Hildmann |
Behavioural game AI - A theoretical approach. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Galoh Rashidah Haron, Kang Siong Ng |
Extrapolating security requirements to an established software process: Version 1.0. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Petre Anghelescu, Silviu Ionita, Vasile-Gabriel Iana |
FPGA implementation of cellular automata based encryption algorithm for internet communications. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Gang Wang, Kunming Nie |
A framework of VI-based ranking and recommendation of web services. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Hanno Hildmann, Sebastien Nicolas, Fabrice Saffre |
Critical infrastructure protection through distributed reactive demand-side management. |
ICITST |
2011 |
DBLP BibTeX RDF |
|
1 | Norah Farooqi, Siobhán North |
Trust-based access control for XML databases. |
ICITST |
2011 |
DBLP BibTeX RDF |
|