Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Elvis Pontes, Adilson Eduardo Guelfi |
IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Said Jafari, Fredrick Mtenzi, Ronan Fitzpatrick, Brendan O'Shea |
An approach for developing comparative security metrics for healthcare organizations. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Carsten Stiller, Fred Roß, Christoph Ament |
Towards spatial awareness in recommender systems. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Karami, Mohammad Fathian |
A robust trust establishment framework using Dempster-Shafer theory for MANETs. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wiem Rekik, Maher Khemakhem, Abdelfettah Belghith, Jacques Fayolle |
PKI and UDDI based trust centre: An attempt to improve web service security. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Giambruno, Muhammad Awais Shibli, Sead Muftic, Antonio Lioy |
MagicNET: XACML authorization policies for mobile agents. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xianghan Zheng, Vladimir A. Oleshchuk |
Trust-based framework for security enhancement of P2PSIP communication systems. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Tahajod, Azadeh Iranmehr, Mohammad Reza Darajeh |
A roadmap to develop enterprise security architecture. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shayesteh Tabatabaei |
Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David S. Allison, Hany F. El Yamany, Miriam A. M. Capretz |
Privacy and trust policies within SOA. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sergey Boldyrev, Ian Oliver, Ronald Brown, Juha-Matti Tuupola, Arto Palin, Antti Lappeteläinen |
Network and content aware information management. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aziz El Fazziki, Sana Nouzri, Mohammed Sadgal |
A multi-agent development approach based on the MDA for modelling information systems. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ugo Barchetti, Anna Lisa Guido, Luca Mainetti |
A conceptual framework for business driven integration. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Kamel Alomari, Kuldeep Sandhu, Peter Woods |
E-government adoption in the Hashemite Kingdom of Jordan: Factors from social perspectives. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sophia Alim, Ruqayya Abdulrahman, Daniel Neagu, Mick J. Ridley |
Data retrieval from online social network profiles for social engineering applications. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hoon Ko, Carlos Ramos |
A study on Security Status Matrix (SSM) in Urban Computing. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Bresciani, Andrew Butterfield |
A formal security proof for the ZRTP Protocol. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kiyana Zolfaghar, Arash Barfar, Shahriar Mohammadi |
A framework for online counter terrorism. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ghulam Mujtaba 0002, David J. Parish |
Detection of applications within encrypted tunnels using packet size distributions. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009 |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nan Lu, Chunguang Zhou, Laizhong Cui |
The application of association rules algorithm on web search engine. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rose Tinabo, Fredrick Mtenzi, Brendan O'Shea |
Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | J. Adrian Pickering, Christopher Gutteridge |
A networked registration scheme for enhancing trust. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Boon Hoi Lim, Chong Eng Tan |
Simplified link reliability enhancement schemes for wireless networks. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy |
Software distribution as a malware infection vector. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Abhimanyu Jain, Ashish Jain, Aditya Raj, Tushar Pahwa |
Sequenced picture captcha: generation and its strength analysis. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ari Juels |
Power games in RFID security. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peipei Shi, Bo Zhu, Amr M. Youssef |
A rotary PIN entry scheme resilient to shoulder-surfing. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hironori Egi, Hiroshi Shigeno, Ken-ichi Okada |
Grasping contextual awareness inside aworkspace at the entrance to support group interaction. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Taiwo Ayodele, Shikun Zhou, Rinat Khusainov |
Intelligent email prediction system (IEPS). |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Azah Anir Norman, Norizan Mohd Yasin |
An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Wöhrer, Thomas Lustig, Peter Brezany |
Scalable relational query results handling in service oriented architectures. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Indika Perera, Colin Allison, Ross Nicoll, Thomas Sturgeon |
Towards successful 3D virtual learning - a case study on teaching human computer interaction. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Asif Habib, Christian Praher |
Object based dynamic separation of duty in RBAC. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Moses Niwe, Janis Stirna |
Pattern approach to business-to-business transactions. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tzong-I Wang, Ting Yuan Yeh |
A fault-tolerant mechanism for reducing pollution attacks in peer-to-peer networks. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirotte, Gaëtan Rey, Michel Riveill |
Context-sensitive authorization for asynchronous communications. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Daphne Rixon, Mary Furey |
Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Khaisar Muneebulla Khan, Umesha Naik |
Open source software for personal information managers and personal knowledge management. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Demetrios Sarantis, Dimitris Askounis |
A project management ontology as a reference for e-Government projects. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Elisabeth Lex, Christin Seifert, Michael Granitzer, Andreas Juffinger |
Cross-domain classification: Trade-off between complexity and accuracy. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Annette Tolnai, Sebastiaan H. von Solms |
Solving security issues using Information Security Awareness Portal. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Karen O'Shea, Zuhair Bandar, Keeley A. Crockett |
A semantic-based conversational agent framework. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | A. R. Rizwana Shaikh, Satish Devane |
Verification of security properties of payment protocol using AVISPA. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Frederico Guilherme Álvares de Oliveira Júnior, José Maria Parente de Oliveira |
A heuristic-based runtime ranking for service composition. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sandro Fiore, Alessandro Negro, Giovanni Aloisio |
Data virtualization in grid environments through the GRelC Data Access and Integration Service. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rami Ayadi, Mohsen Maraoui, Mounir Zrigui |
Intertextual distance for Arabic texts classification. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Juanita I. Fernando |
The elephant in the room: Health information system security and the user-level environment. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pornpit Wongthongtham, Natsuda Kasisopha, Surasak Komchaliaw |
Community-oriented software engineering ontology evolution. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kasra Amirtahmasebi, Seyed Reza Jalalinia, Saghar Khadem |
A survey of SQL injection defense mechanisms. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Siamak Barzegar, Mohammad Shojafar, Mohammad Reza Keyvanpour |
User interface in virtual learning environment. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Laszlo Gyongyosi, Sándor Imre |
Unduplicable quantum data medium based secret decryption and verification. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nacereddine Hammami, Mokhtar Sellam |
Tree distribution classifier for automatic spoken Arabic digit recognition. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Samir Kumar Jalal, Subal Chandra Biswas, Parthasarathi Mukhopadhyay |
Webometric analysis of Central Universities in India: A study. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sanath Sukumaran, M. V. Shetty |
Knowledge Management (KM) in automobile: Application of a value chain (VC) approach using KM tools. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Biggs, Stilianos Vidalis |
Cloud Computing: The impact on digital forensic investigations. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Taiwo Ayodele, Shikun Zhou, Rinat Khusainov |
Email classification: Solution with back propagation technique. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Petr Gajdos, Michal Radecký |
Web visualization support for disaster management. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Rattikorn Hewett, Phongphun Kijsanayothin |
On securing privacy in composite web service transactions. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zheng Lu, Taoxin Peng |
The VoIP intrusion detection through a LVQ-based neural network. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shriram K. Vasudevan, K. Venkateshwaran, V. Vaithiyanathan, Subashri Vasudevan |
Design of analog to digital converter for SDR (Software Defined Radio). |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joel Mana Gonçalves, Fabio Neves Fernandes |
The impact of information security on Latin America. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Constantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban |
Detecting errors in digital communications with CRC codes implemented with FPGA. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Julia Sidorova, Toni Badia |
Syntactic learning for ESEDA.1, a tool for enhanced speech emotion detection and analysis. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sirilak Areerachakul, Siripun Sanguansintukul |
Water quality classification using neural networks: Case study of canals in Bangkok, Thailand. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Arian Rahimi, Sharhriar Mohammadi, Rozita Rahimi |
An efficient Iris authentication using chaos theory-based cryptography for e-commerce transactions. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Siddhartha Baruah, Anjana Kakoty Mahanta, Kanak Chandra Sarma |
A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parameters. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ghulam Ali, Noor Ahmed Shaikh, Zubair Ahmed Shaikh |
Towards development of a trust grid to balance between organization's interests and employee's privacy. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kikelomo Maria Apampa, Gary B. Wills, David Argles |
Towards security goals in summative e-assessment security. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zanifa Omary, Fredrick Mtenzi |
Dataset threshold for the performance estimators in supervised machine learning experiments. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joshua Ojo Nehinbe |
Critical analyses of alerts swamping and intrusion redundancy. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Kirkham, Ingo Dahn, David W. Chadwick, Marc Santos, Sandra Winfield |
Aggregating policies in user centric, real-time and distributed applications. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sascha Kaufmann, Christoph Schommer |
e-Conviviality in web systems by the wisdom of crowds. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva, Ali Al-Dahoud |
Applying semantic web and user behavior analysis to enforce the intrusion detection system. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Awanis M. Romli, Arnidcha P. Cha |
An expert system for stress management. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zanifa Omary, Fredrick Mtenzi, Bing Wu 0004 |
How does politics affect electronic healthcare adoption. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ankit Anand, Xiao-Hong Peng, Richard Haywood |
Efficient information retrieval via proxy caching mechanisms within a lossy environment. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Georgios V. Lioudakis, Fotios Gogoulos, Anna Antonakopoulou, Aziz S. Mousas, Iakovos S. Venieris, Dimitra I. Kaklamani |
An access control approach for privacy-preserving passive network monitoring. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Arpita Mondal, Kaushik Roy 0002, Prabir Bhattacharya |
Secure biometric system for accessing home appliances via Internet. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nallusamy Anandaraja, Nagappan Sriram, C. Kathiresan, Shibi Sebastian, E. Vadivel |
Web cum mobile based dynamic market information support for Agri-Horti produces: Linking the farmers with market. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Dulyawit Prangchumpol, Siripun Sanguansintukul, Panjai Tantasanawong |
Server virtualization by user behaviour model using a data mining technique - A preliminary study. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tom Kirkham, Kleopatra Konstanteli, Julian R. Gallop, Constantinos Lalos, Ian J. Johnson |
Identity management in a mobile service orientated grid. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly |
RFID lightweight mutual authentication using shrinking generator. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Chenglian Liu |
Improvement of authentication of anycast communication. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Alzaabi, Jawad Berri, Mohamed Jamal Zemerly |
On the fly generation of mobile learning structured multimedia content from the web. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hajer Ben Mahmoud Dammak, Raouf Ketata, Taieb Ben Romdhane, Samir Ben Ahmed |
Modeling Quality Management System: A multi-agent approach. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hoda W. Maalouf |
Managing trade-offs between information loss and latency in real-time distributed systems. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Ehsan ul Haq, Muhammad Raza Perwaz, Kabeer Ahmed Bhatti |
Compact and user-friendly representation of IPv6 addressing approach and masking. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kanokwan Kanyamee, Chanboon Sathitwiriyawong |
A simple high-availability multiple-agent key recovery system. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zakaria Karim, Karim Mohammed Rezaul, Aliar Hossain |
Towards secure information systems in online banking. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Abdul Qadeer, Waqar Mahmood, Abdul Waheed |
The website census. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wafa S. Al-Sharafat, Reyadh Naoum |
Significant of features selection for detecting network intrusions. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Macedo Firmino, Glaucio B. Brandao, Ana M. G. Guerreiro, Ricardo Alexsandro de Medeiros Valentim |
Neural cryptography applied to key management protocol with mutual authentication in RFID systems. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Visconti, Hooman Tahayori |
Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Petr Pinkas, Jana Klecková |
The composite algebraic structure over capabilities and actions of a system. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Richard A. Guinee, Marta Blaszczyk |
A novel true random binary sequence generator based On a chaotic double scroll oscillator combination with a pseudo random generator for cryptographic applications. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Petros Efstathopoulos |
Practical study of a defense against low-rate TCP-targeted DoS attack. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Justo Carracedo Gallardo, Emilia Pérez Belleboni |
Use of the new Smart Identity Card to reinforce electronic voting guarantees. |
ICITST |
2009 |
DBLP DOI BibTeX RDF |
|