Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee |
Real-Time supports on Tablet PC Platforms. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ali Raya, K. Mariyappn |
Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Al-Fawa'reh, Amal Saif, Mousa Tayseer Jafar, Ammar Elhassan |
Malware Detection by Eating a Whole APK. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Luca Deri, Daniele Sartiano |
Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Raadhesh Kannan, Ji-Jian Chin, Xiaoning Guo |
Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Dhruva Hunusekattte |
Smart Parking With Automated Billing System. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zongchao Qiao, Ina Taralova, Safwan El Assad |
A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Felix Larbi Aryeh, Boniface Kayode Alese |
A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Fethi Dridi, Safwan El Assad, Carinelle Atamech, Wajih El Hadj Youssef, Mohsen Machhout |
Design and Implementation on FPGA Board of a Chaos-based Stream Cipher. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Fabian Schillinger, Christian Schindelhauer |
Partitioned Private User Storages in End-to-End Encrypted Online Social Networks. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Sook-Yan Hue, Nor Haniza Sarmin, Eddie Shahril Ismail, Ji-Jian Chin |
Easy Simple Factoring-based Digital Signature Scheme. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh |
Evolution of Bitcoin Addresses from Security Perspectives. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | |
15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020 |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim |
Performance Evaluation of RPL and DODAG Formations for IoTs Applications. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Ezekiel Uzor Okike, Gofaone Mogapi |
A Pedagogic Analysis of Information Systems Security Measures in Online Services. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Zein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malik Qasaimeh |
Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Chunxiao Yang, Ina Taralova, Jean-Jacques Loiseau, Safwan El Assad |
A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Saad Al-Ahmari, Karen Renaud, Inah Omoronyia |
Implement a Model for Describing and Maximising Security Knowledge Sharing. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Tabisa Ncubukezi, Laban Mwansa, François Rocaries |
A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Harris Anthonio, Yvonne Hwei-Syn Kam |
A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Huangxiaolie Liu, Dong Zhang, Huijun Chen |
Towards robust classification detection for adversarial examples. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Song-Kyoo Amang Kim |
Toward Compact Data from Big Data. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Esau Bermudez, Djamel Fawzi Hadj Sadok |
Energy Consumption of a LoRaWAN Network using Jarvis Algorithm. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | May Medhat, Menna Essa, Hend Faisal, Samir G. Sayed |
YARAMON: A Memory-based Detection Framework for Ransomware Families. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Kosakatani, Tetsutaro Uehara, Songpon Teerakanok |
Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Kitty Kioskli, Nineta Polemi |
Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Masum, Hossain Shahriar |
TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Loreen Mahmoud, Raja Praveen |
Network Security Evaluation Using Deep Neural Network. |
ICITST |
2020 |
DBLP DOI BibTeX RDF |
|
1 | Walter Blair, Aspen Olmsted, Paul Anderson |
Docker vs. KVM: Apache spark application performance and ease of use. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Philip McShane, Darryl Stewart |
Challenge based visual speech recognition using deep learning. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Elizabeth Healy, Husna Siddiqui, Aspen Olmsted |
Classifying influenza outbreaks by analyzing and filtering Twitter data. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shuaiyi Bu, Shuxin Yang, Haoming Ji |
Distributed computing framework in security: Case study of encryption method. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad Bennakhi, Mohamed A. Jeragh |
Applying dynamic verification tagging to the k-anonymity model. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Alhumaidi Alotaibi, Marios C. Angelides |
A hybrid approach for femtocell co-tier interference mitigation. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Basil Alothman, Prapa Rattadilok |
Towards using transfer learning for Botnet Detection. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahana Roy, Louis Mejia, Paul Helling, Aspen Olmsted |
Automation of cyber-reconnaissance: A Java-based open source tool for information gathering. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Zefferer, Dominik Ziegler 0001, Andreas Reiter |
Best of two worlds: Secure cloud federations meet eIDAS. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Goeddel, Pasha Sadeghian, Aspen Olmsted |
Weighing the shopping benefits of a smarter refrigerator. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Roland Pellegrini, Patrick Rottmann, Georg Strieder |
Preventing vendor lock-ins via an interoperable multi-cloud deployment approach. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anna V. Sandifer, Casey Wilson, Aspen Olmsted |
Detection of fake online hotel reviews. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Clara Bertolissi, Omar Boucelma, Worachet Uttha |
Enhancing security in the cloud: When traceability meets access control. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Haya Alshehri, Farid Meziane |
The influence of advanced and secure e-commerce environments on customers behaviour: The case of Saudis in the UK. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahyoung Kim, Junwoo Lee |
Mobile business performance metrics: Framework and case study. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lamya Alqaydi, Chan Yeob Yeun, Ernesto Damiani |
Security enhancements to TLS for improved national control. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Aspen Olmsted |
Entity identity, performance, and storage. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Callum Brill, Thomas Nash |
A comparative analysis of MANET routing protocols through simulation. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Tasnime Omrani, Rabei Becheikh, Olfa Mannai, Rhouma Rhouma, Safya Belghith |
RARE: A robust algorithm for rapid encryption. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Desislav Andreev, Simona Petrakieva, Ina Taralova |
Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Juhua Liu, Wei Li, Guoqiang Bai 0001 |
Efficient hardware implementation of ITUbee for lightweight application. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alaa Altorbaq, Fredrik Blix, Stina Sorman |
Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted |
Evaluate action primitives for human activity recognition using unsupervised learning approach. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ashik Mostafa Alvi, Md. Faqrul Islam Shaon, Prithvi Ranjan Das, Manazir Mustafa, Mohammad Rezaul Bari |
Automated course management system. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Saja Alqurashi, Omar Batarfi |
A comparison between API call sequences and opcode sequences as reflectors of malware behavior. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Cameron Hamilton, Aspen Olmsted |
Database multi-factor authentication via pluggable authentication modules. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Luis F. Mejia-Ricart, Aspen Olmsted |
Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rio Guntur Utomo, Robert John Walters, Gary B. Wills |
Factors affecting the implementation of information assurance for eGovernment in Indonesia. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Bissada, Aspen Olmsted |
Mobile multi-factor authentication. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Rachael Shaw, Enda Howley, Enda Barrett |
An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centers. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Victor Clincy, Hossain Shahriar |
Web service injection attack detection. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wayne Chen, Aspen Olmsted |
Considerations for OSV over Linux-based virtual machines. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Norah S. Farooqi |
Intelligent safety management system for crowds using sensors. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kouya Tochikubo |
Multiple assignment secret sharing scheme using hierarchical threshold scheme. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marwa Saidi, Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith |
LSB-hamming based chaotic steganography (LH-Steg). |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong |
Data protection by design in systems development: From legal requirements to technical solutions. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Malfa |
Keynote speaker 6: Steel made in Europe: The backbone of sustainability. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Husna Siddiqui, Aspen Olmsted, Brendan Keane |
Venmo: Exposing a user's lifestyle. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ahana Roy, Aspen Olmsted |
Distributed query processing and data sharing. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017 |
ICITST |
2017 |
DBLP BibTeX RDF |
|
1 | Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer |
Towards comparing programming paradigms. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Nash, Aspen Olmsted |
shinySDM: Point and click species distribution modeling. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chatipot Srimuang, Nagul Cooharojananone, Uthai Tanlamai, Achara Chandrachai, Kanokwan Atchariyachanvanich |
The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ferda Ernawan, Muhammad Nomani Kabir, Zuriani Mustaffa |
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | W. P. Yuen, K. B. Chuah |
Data visibility and trust enhancement of enterprise customers in cloud computing services. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Seamus Dowling, Michael Schukat, Hugh Melvin |
Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki |
Enhancing cyber security awareness with mobile games. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Preston T. Owens, Aspen Olmsted |
Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Keshnee Padayachee, Elias Worku |
Shared situational awareness in information security incident management. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Blake Badders, Aspen Olmsted |
Improve CRUD performance on hierarchical data: Nested interval model vs. nested set model. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Faris A. Almalki, Marios C. Angelides |
Propagation modelling and performance assessment of aerial platforms deployed during emergencies. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq |
Role of transformational leadership on e-govemment switching: Multi-channel and digital divide. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Feltus, Erik H. A. Proper |
Towards a security and privacy co-creation method. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Omotayo Kayode Abatan, Manoj S. Maharaj |
Change management and the integration of information technology: Research notes from selected African universities. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Nash, Aspen Olmsted |
Performance vs. security: Implementing an immutable database in MySQL. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ryan Lile, Aspen Olmsted |
Meaningful sandbox data. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michelle G. Cacais, Gilvandenys Leite Sales |
A collaborative system for corporate performance evaluation using gamification and the learning vectors model. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos |
An architecture for privacy-preserving sharing of CTI with 3rd party analysis services. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wren Chan, Aspen Olmsted |
Ethereum transaction graph analysis. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Pasha Sadeghian, Aspen Olmsted |
Assessment of fuzzy min-max neural networks for classification tasks. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Basil Alothman, Prapa Rattadilok |
Android botnet detection: An integrated source code mining approach. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Briggs, Aspen Olmsted |
Client side calculation of 'bacon number'. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Yichen Ma, Fuyao Wang, Zhuozheng Wang |
Intelligent laboratory management system based on Internet of Things. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Daehee Kim 0001, Jaekeun Yun, Sungjun Kim |
Hybrid public key authentication for wireless sensor networks. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shinsaku Kiyomoto, Anirban Basu 0001, Mohammad Shahriar Rahman, Sushmita Ruj |
On blockchain-based authorization architecture for beyond-5G mobile services. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | William Kennedy, Aspen Olmsted |
Three factor authentication. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Messaouda Boumaraf, Fatiha Merazka |
Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Martin Duggan, Karl Mason, Jim Duggan, Enda Howley, Enda Barrett |
Predicting host CPU utilization in cloud computing using recurrent neural networks. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Saqib Niaz, Gunter Saake |
Forward secure searchable symmetric encryption. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shahlaa Mashhadani, Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li 0001 |
A novel multimedia-forensic analysis tool (M-FAT). |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Abeer F. Alkhwaldi, Mumtaz M. Kamala, Rami Qahwaji |
From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public services. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Huicong Loi, Aspen Olmsted |
Low-cost detection of backdoor malware. |
ICITST |
2017 |
DBLP DOI BibTeX RDF |
|