The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105)
Publication types (Num. hits)
inproceedings(961) proceedings(9)
Venues (Conferences, Journals, ...)
ICITST(970)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 970 publication records. Showing 970 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Gary Wills Keynote speaker 3: Looking after our IP in supply chain. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ashik Mostafa Alvi, Md. Faqrul Islam Shaon, Prithvi Ranjan Das, Manazir Mustafa, Mohammad Rezaul Bari Automated course management system. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Casey Wilson, Anna V. Sandifer, Aspen Olmsted Designing an assembly language using MIT App inventor. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrew Bissada, Aspen Olmsted Mobile multi-factor authentication. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian Work in Progress: Nobody knows who you really are online/on the world wide web - Amazon-recognition-service based 'Virtualnet' supported authentication: How certain are you it is indeed you in front of a screen? Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer Towards comparing programming paradigms. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Steven Furnell Keynote speaker 5: Taming security technology. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Fischer 0003, Bernd Markscheffel, K. Scherr Secure e-mail communication - Comparison and selection of encryption solutions using an utility value analysis approach. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Faris A. Almalki, Marios C. Angelides Propagation modelling and performance assessment of aerial platforms deployed during emergencies. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos An architecture for privacy-preserving sharing of CTI with 3rd party analysis services. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Prathap Siddavaatam, Reza Sedaghat, Aakriti Tarun Sharma intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer Towards a security baseline for IaaS-cloud back-ends in Industry 4.0. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chatipot Srimuang, Nagul Cooharojananone, Uthai Tanlamai, Achara Chandrachai, Kanokwan Atchariyachanvanich The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1William Kennedy, Aspen Olmsted Three factor authentication. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahana Roy, Aspen Olmsted Distributed query processing and data sharing. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daehee Kim, Jaekeun Yun, Sungjun Kim Hybrid public key authentication for wireless sensor networks. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abeer Alkhwaldi, Mumtaz Kamala, Rami Qahwaji From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public services. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saja Alqurashi, Omar Batarfi A comparison between API call sequences and opcode sequences as reflectors of malware behavior. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Evangelos Pournaras Keynote speaker 2: Participatory self-management systems for resilient smart cities. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anne James Keynote speaker 4: Cloud forensics. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aspen Olmsted Entity identity, performance, and storage. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ta Thi Kim Hue, Thang Manh Hoang, An Braeken Lightweight signcryption scheme based on discrete Chebyshev maps. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kritika Kongsoontornkijkul, Rath Pichyangkura, Pakpachong Vadhanasindhu, Kanlaya Vanichbuncha A study of factors effecting Thailand talent mobility programme: Case of university and food technology industry. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Deepak Janardhanan, Enda Barrett CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahana Roy, Louis Mejia, Paul Helling, Aspen Olmsted Automation of cyber-reconnaissance: A Java-based open source tool for information gathering. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sanjay Kumar, Ari Viinikainen, Timo Hämäläinen 0002 Evaluation of ensemble machine learning methods in mobile threat detection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Blake Badders, Aspen Olmsted Improve CRUD performance on hierarchical data: Nested interval model vs. nested set model. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Walter Blair, Aspen Olmsted, Paul Anderson Docker vs. KVM: Apache spark application performance and ease of use. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nabil Abdoun, Safwan El Assad, Khodor Hammoud, Rima Assaf, Mohamad Khalil, Olivier Déforges New keyed chaotic neural network hash function based on sponge construction. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paweena Wanchai Customer churn analysis : A case study on the telecommunication industry of Thailand. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Casey Wilson, Aspen Olmsted Handling an organization's communication needs with a single web service. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Juhua Liu, Wei Li, Guoqiang Bai 0001 Efficient hardware implementation of ITUbee for lightweight application. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq Role of transformational leadership on e-govemment switching: Multi-channel and digital divide. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahyoung Kim, Junwoo Lee Mobile business performance metrics: Framework and case study. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kouya Tochikubo Multiple assignment secret sharing scheme using hierarchical threshold scheme. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Martin Duggan, Karl Mason, Jim Duggan, Enda Howley, Enda Barrett Predicting host CPU utilization in cloud computing using recurrent neural networks. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Husna Siddiqui, Elizabeth Healy, Aspen Olmsted Bot or not. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seamus Dowling, Michael Schukat, Hugh Melvin Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Nash, Aspen Olmsted shinySDM: Point and click species distribution modeling. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Walter Blair, Aspen Olmsted, Paul Anderson Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input files. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luis F. Mejia-Ricart, Aspen Olmsted Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Omotayo Kayode Abatan, Manoj Maharaj Change management and the integration of information technology: Research notes from selected African universities. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pasha Sadeghian, Casey Wilson, Stephen Goeddel, Aspen Olmsted Classification of music by composer using fuzzy min-max neural networks. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Callum Brill, Thomas Nash A comparative analysis of MANET routing protocols through simulation. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paul Helling, Ahana Roy, Aspen Olmsted Effects of lexicon size on solving bananagrams. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ryan Lile, Aspen Olmsted Meaningful sandbox data. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong Data protection by design in systems development: From legal requirements to technical solutions. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Haya Alshehri, Farid Meziane The influence of advanced and secure e-commerce environments on customers behaviour: The case of Saudis in the UK. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ali Aydin Selçuk, Fatih Orhan, Berker Batur Undecidable problems in malware analysis. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fayez Alotaibi, Nathan L. Clarke, Steven Furnell An analysis of home user security awareness & education. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki Enhancing cyber security awareness with mobile games. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rio Guntur Utomo, Robert John Walters, Gary B. Wills Factors affecting the implementation of information assurance for eGovernment in Indonesia. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Keshnee Padayachee, Elias Worku Shared situational awareness in information security incident management. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Omego Obinna, Eckhard Pfluegel, Charles A. Clarke, Martin J. Tunnicliffe A multi-channel steganographic protocol for secure SMS mobile banking. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wren Chan, Aspen Olmsted Ethereum transaction graph analysis. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Briggs, Aspen Olmsted Client side calculation of 'bacon number'. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shahlaa Mashhadani, Hiba Al-kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li A novel multimedia-forensic analysis tool (M-FAT). Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Huicong Loi, Aspen Olmsted Low-cost detection of backdoor malware. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elizabeth Healy, Husna Siddiqui, Aspen Olmsted Classifying influenza outbreaks by analyzing and filtering Twitter data. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shaikha AlShehyari, Chan Yeob Yeun, Ernesto Damiani Monitoring darknet activities by using network telescope. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Victor Clincy, Hossain Shahriar Web service injection attack detection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Timibloudi S. Enamamu, Nathan L. Clarke, Paul S. Haskell-Dowland, Fudong Li Transparent authentication: Utilising heart rate for user authentication. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Norah Farooqi Intelligent safety management system for crowds using sensors. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted Evaluate action primitives for human activity recognition using unsupervised learning approach. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yichen Ma, Fuyao Wang, Zhuozheng Wang Intelligent laboratory management system based on Internet of Things. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1W. P. Yuen, K. B. Chuah Data visibility and trust enhancement of enterprise customers in cloud computing services. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michelle G. Cacais, Gilvandenys Leite Sales A collaborative system for corporate performance evaluation using gamification and the learning vectors model. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Clara Bertolissi, Omar Boucelma, Worachet Uttha Enhancing security in the cloud: When traceability meets access control. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abdullah Alhumaidi Alotaibi, Marios C. Angelides A hybrid approach for femtocell co-tier interference mitigation. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Preston T. Owens, Aspen Olmsted Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Muhammad Saqib Niaz, Gunter Saake Forward secure searchable symmetric encryption. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cameron Hamilton, Aspen Olmstead Database multi-factor authentication via pluggable authentication modules. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roman Graf, Ross King Secured transactions technique based on smart contracts for situational awareness tools. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alaa Altorbaq, Fredrik Blix, Stina Sorman Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christophe Feltus, Erik H. A. Proper Towards a security and privacy co-creation method. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lamya Alqaydi, Chan Yeob Yeun, Ernesto Damiani Security enhancements to TLS for improved national control. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Marwa Saidi, Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith LSB-hamming based chaotic steganography (LH-Steg). Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Nash, Aspen Olmsted Performance vs. security: Implementing an immutable database in MySQL. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Charles Kim Keynote speaker 1: Cyber-resilient ICS through diversified redundancy and intrusion detection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Gerhard Tauber On the cost of cyber security in smart business. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Stephen Goeddel, Pasha Sadeghian, Aspen Olmsted Weighing the shopping benefits of a smarter refrigerator. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shuaiyi Bu, Shuxin Yang, Haoming Ji Distributed computing framework in security: Case study of encryption method. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas Zefferer, Dominik Ziegler, Andreas Reiter Best of two worlds: Secure cloud federations meet eIDAS. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yen-Mei Lee Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Philip McShane, Darryl Stewart Challenge based visual speech recognition using deep learning. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ferda Ernawan, Muhammad Nomani Kabir, Zuriani Mustaffa A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seth Stoudenmier, Aspen Olmsted Efficient retrieval of information from hierarchical REST requests. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anna V. Sandifer, Casey Wilson, Aspen Olmsted Detection of fake online hotel reviews. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Husna Siddiqui, Aspen Olmsted, Brendan Keane Venmo: Exposing a user's lifestyle. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tasnime Omrani, Rabei Becheikh, Olfa Mannai, Rhouma Rhouma, Safya Belghith RARE: A robust algorithm for rapid encryption. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017 Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  BibTeX  RDF
1Ahmad Bennakhi, Mohamed A. Jeragh Applying dynamic verification tagging to the k-anonymity model. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nagul Cooharojananone, Krittika Akasarakul, Thipsuda Wongkhamdi, Phonkornkrit Pruetthiwongwanich, Kanokwan Atchariyachanvanich The study of the local community products (OTOP) website characteristics toward buyer decision using eye tracking. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Basil Alothman, Prapa Rattadilok Towards using transfer learning for Botnet Detection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rachael Shaw, Enda Howley, Enda Barrett An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centers. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abidullah Zarghoon, Irfan Awan, Jules Pagna Disso, Richard Dennis Evaluation of AV systems against modern malware. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Desislav Andreev, Simona Petrakieva, Ina Taralova Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wayne Chen, Aspen Olmsted Considerations for OSV over Linux-based virtual machines. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Enrico Malfa Keynote speaker 6: Steel made in Europe: The backbone of sustainability. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Md. Tomig Uddin Ahmed, Nazrul Islam Bhuiya, Md. Mahbubur Rahman A secure enterprise architecture focused on security and technology-transformation (SEAST). Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 970 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license