The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Elvis Pontes, Adilson Eduardo Guelfi IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Said Jafari, Fredrick Mtenzi, Ronan Fitzpatrick, Brendan O'Shea An approach for developing comparative security metrics for healthcare organizations. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Carsten Stiller, Fred Roß, Christoph Ament Towards spatial awareness in recommender systems. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammad Karami, Mohammad Fathian A robust trust establishment framework using Dempster-Shafer theory for MANETs. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wiem Rekik, Maher Khemakhem, Abdelfettah Belghith, Jacques Fayolle PKI and UDDI based trust centre: An attempt to improve web service security. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alessandro Giambruno, Muhammad Awais Shibli, Sead Muftic, Antonio Lioy MagicNET: XACML authorization policies for mobile agents. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xianghan Zheng, Vladimir A. Oleshchuk Trust-based framework for security enhancement of P2PSIP communication systems. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Maryam Tahajod, Azadeh Iranmehr, Mohammad Reza Darajeh A roadmap to develop enterprise security architecture. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shayesteh Tabatabaei Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1David S. Allison, Hany F. El Yamany, Miriam A. M. Capretz Privacy and trust policies within SOA. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sergey Boldyrev, Ian Oliver, Ronald Brown, Juha-Matti Tuupola, Arto Palin, Antti Lappeteläinen Network and content aware information management. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Aziz El Fazziki, Sana Nouzri, Mohammed Sadgal A multi-agent development approach based on the MDA for modelling information systems. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ugo Barchetti, Anna Lisa Guido, Luca Mainetti A conceptual framework for business driven integration. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammad Kamel Alomari, Kuldeep Sandhu, Peter Woods E-government adoption in the Hashemite Kingdom of Jordan: Factors from social perspectives. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sophia Alim, Ruqayya Abdulrahman, Daniel Neagu, Mick J. Ridley Data retrieval from online social network profiles for social engineering applications. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hoon Ko, Carlos Ramos A study on Security Status Matrix (SSM) in Urban Computing. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Riccardo Bresciani, Andrew Butterfield A formal security proof for the ZRTP Protocol. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kiyana Zolfaghar, Arash Barfar, Shahriar Mohammadi A framework for online counter terrorism. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ghulam Mujtaba 0002, David J. Parish Detection of applications within encrypted tunnels using packet size distributions. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009 Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nan Lu, Chunguang Zhou, Laizhong Cui The application of association rules algorithm on web search engine. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rose Tinabo, Fredrick Mtenzi, Brendan O'Shea Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1J. Adrian Pickering, Christopher Gutteridge A networked registration scheme for enhancing trust. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Boon Hoi Lim, Chong Eng Tan Simplified link reliability enhancement schemes for wireless networks. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy Software distribution as a malware infection vector. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Abhimanyu Jain, Ashish Jain, Aditya Raj, Tushar Pahwa Sequenced picture captcha: generation and its strength analysis. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ari Juels Power games in RFID security. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peipei Shi, Bo Zhu, Amr M. Youssef A rotary PIN entry scheme resilient to shoulder-surfing. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hironori Egi, Hiroshi Shigeno, Ken-ichi Okada Grasping contextual awareness inside aworkspace at the entrance to support group interaction. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Taiwo Ayodele, Shikun Zhou, Rinat Khusainov Intelligent email prediction system (IEPS). Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Azah Anir Norman, Norizan Mohd Yasin An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alexander Wöhrer, Thomas Lustig, Peter Brezany Scalable relational query results handling in service oriented architectures. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Indika Perera, Colin Allison, Ross Nicoll, Thomas Sturgeon Towards successful 3D virtual learning - a case study on teaching human computer interaction. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Muhammad Asif Habib, Christian Praher Object based dynamic separation of duty in RBAC. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Moses Niwe, Janis Stirna Pattern approach to business-to-business transactions. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tzong-I Wang, Ting Yuan Yeh A fault-tolerant mechanism for reducing pollution attacks in peer-to-peer networks. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirotte, Gaëtan Rey, Michel Riveill Context-sensitive authorization for asynchronous communications. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Daphne Rixon, Mary Furey Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Khaisar Muneebulla Khan, Umesha Naik Open source software for personal information managers and personal knowledge management. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Demetrios Sarantis, Dimitris Askounis A project management ontology as a reference for e-Government projects. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Elisabeth Lex, Christin Seifert, Michael Granitzer, Andreas Juffinger Cross-domain classification: Trade-off between complexity and accuracy. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Annette Tolnai, Sebastiaan H. von Solms Solving security issues using Information Security Awareness Portal. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Karen O'Shea, Zuhair Bandar, Keeley A. Crockett A semantic-based conversational agent framework. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1A. R. Rizwana Shaikh, Satish Devane Verification of security properties of payment protocol using AVISPA. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Frederico Guilherme Álvares de Oliveira Júnior, José Maria Parente de Oliveira A heuristic-based runtime ranking for service composition. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sandro Fiore, Alessandro Negro, Giovanni Aloisio Data virtualization in grid environments through the GRelC Data Access and Integration Service. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rami Ayadi, Mohsen Maraoui, Mounir Zrigui Intertextual distance for Arabic texts classification. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Juanita I. Fernando The elephant in the room: Health information system security and the user-level environment. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pornpit Wongthongtham, Natsuda Kasisopha, Surasak Komchaliaw Community-oriented software engineering ontology evolution. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kasra Amirtahmasebi, Seyed Reza Jalalinia, Saghar Khadem A survey of SQL injection defense mechanisms. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Siamak Barzegar, Mohammad Shojafar, Mohammad Reza Keyvanpour User interface in virtual learning environment. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Laszlo Gyongyosi, Sándor Imre Unduplicable quantum data medium based secret decryption and verification. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nacereddine Hammami, Mokhtar Sellam Tree distribution classifier for automatic spoken Arabic digit recognition. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Samir Kumar Jalal, Subal Chandra Biswas, Parthasarathi Mukhopadhyay Webometric analysis of Central Universities in India: A study. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sanath Sukumaran, M. V. Shetty Knowledge Management (KM) in automobile: Application of a value chain (VC) approach using KM tools. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Stephen Biggs, Stilianos Vidalis Cloud Computing: The impact on digital forensic investigations. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Taiwo Ayodele, Shikun Zhou, Rinat Khusainov Email classification: Solution with back propagation technique. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Petr Gajdos, Michal Radecký Web visualization support for disaster management. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rattikorn Hewett, Phongphun Kijsanayothin On securing privacy in composite web service transactions. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zheng Lu, Taoxin Peng The VoIP intrusion detection through a LVQ-based neural network. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shriram K. Vasudevan, K. Venkateshwaran, V. Vaithiyanathan, Subashri Vasudevan Design of analog to digital converter for SDR (Software Defined Radio). Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joel Mana Gonçalves, Fabio Neves Fernandes The impact of information security on Latin America. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Constantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban Detecting errors in digital communications with CRC codes implemented with FPGA. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Julia Sidorova, Toni Badia Syntactic learning for ESEDA.1, a tool for enhanced speech emotion detection and analysis. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sirilak Areerachakul, Siripun Sanguansintukul Water quality classification using neural networks: Case study of canals in Bangkok, Thailand. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Arian Rahimi, Sharhriar Mohammadi, Rozita Rahimi An efficient Iris authentication using chaos theory-based cryptography for e-commerce transactions. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Siddhartha Baruah, Anjana Kakoty Mahanta, Kanak Chandra Sarma A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parameters. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ghulam Ali, Noor Ahmed Shaikh, Zubair Ahmed Shaikh Towards development of a trust grid to balance between organization's interests and employee's privacy. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kikelomo Maria Apampa, Gary B. Wills, David Argles Towards security goals in summative e-assessment security. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zanifa Omary, Fredrick Mtenzi Dataset threshold for the performance estimators in supervised machine learning experiments. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joshua Ojo Nehinbe Critical analyses of alerts swamping and intrusion redundancy. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thomas Kirkham, Ingo Dahn, David W. Chadwick, Marc Santos, Sandra Winfield Aggregating policies in user centric, real-time and distributed applications. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sascha Kaufmann, Christoph Schommer e-Conviviality in web systems by the wisdom of crowds. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva, Ali Al-Dahoud Applying semantic web and user behavior analysis to enforce the intrusion detection system. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Awanis M. Romli, Arnidcha P. Cha An expert system for stress management. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zanifa Omary, Fredrick Mtenzi, Bing Wu 0004 How does politics affect electronic healthcare adoption. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ankit Anand, Xiao-Hong Peng, Richard Haywood Efficient information retrieval via proxy caching mechanisms within a lossy environment. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Georgios V. Lioudakis, Fotios Gogoulos, Anna Antonakopoulou, Aziz S. Mousas, Iakovos S. Venieris, Dimitra I. Kaklamani An access control approach for privacy-preserving passive network monitoring. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Arpita Mondal, Kaushik Roy 0002, Prabir Bhattacharya Secure biometric system for accessing home appliances via Internet. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nallusamy Anandaraja, Nagappan Sriram, C. Kathiresan, Shibi Sebastian, E. Vadivel Web cum mobile based dynamic market information support for Agri-Horti produces: Linking the farmers with market. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dulyawit Prangchumpol, Siripun Sanguansintukul, Panjai Tantasanawong Server virtualization by user behaviour model using a data mining technique - A preliminary study. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tom Kirkham, Kleopatra Konstanteli, Julian R. Gallop, Constantinos Lalos, Ian J. Johnson Identity management in a mobile service orientated grid. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly RFID lightweight mutual authentication using shrinking generator. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chenglian Liu Improvement of authentication of anycast communication. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohammed Alzaabi, Jawad Berri, Mohamed Jamal Zemerly On the fly generation of mobile learning structured multimedia content from the web. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hajer Ben Mahmoud Dammak, Raouf Ketata, Taieb Ben Romdhane, Samir Ben Ahmed Modeling Quality Management System: A multi-agent approach. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hoda W. Maalouf Managing trade-offs between information loss and latency in real-time distributed systems. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Muhammad Ehsan ul Haq, Muhammad Raza Perwaz, Kabeer Ahmed Bhatti Compact and user-friendly representation of IPv6 addressing approach and masking. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kanokwan Kanyamee, Chanboon Sathitwiriyawong A simple high-availability multiple-agent key recovery system. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zakaria Karim, Karim Mohammed Rezaul, Aliar Hossain Towards secure information systems in online banking. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Abdul Qadeer, Waqar Mahmood, Abdul Waheed The website census. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wafa S. Al-Sharafat, Reyadh Naoum Significant of features selection for detecting network intrusions. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Macedo Firmino, Glaucio B. Brandao, Ana M. G. Guerreiro, Ricardo Alexsandro de Medeiros Valentim Neural cryptography applied to key management protocol with mutual authentication in RFID systems. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Andrea Visconti, Hooman Tahayori Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Petr Pinkas, Jana Klecková The composite algebraic structure over capabilities and actions of a system. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Richard A. Guinee, Marta Blaszczyk A novel true random binary sequence generator based On a chaotic double scroll oscillator combination with a pseudo random generator for cryptographic applications. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Petros Efstathopoulos Practical study of a defense against low-rate TCP-targeted DoS attack. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Justo Carracedo Gallardo, Emilia Pérez Belleboni Use of the new Smart Identity Card to reinforce electronic voting guarantees. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #998 of 998 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license