default search action
ICCST 2015: Taipei, Taiwan
- International Carnahan Conference on Security Technology, ICCST 2015, Taipei, Taiwan, September 21-24, 2015. IEEE 2015, ISBN 978-1-4799-8690-3
- Hui-Hao Chou, Sheng-De Wang:
An adaptive network intrusion detection approach for the cloud environment. 1-6 - Hayato Teduka:
A motion detection technique utilizing the size of encoded frame. 1-6 - Kun-Chi Lu, Angus F. M. Huang, Addison Y. S. Su, Ting-Jou Ding, Chiu-Nan Su:
Information password recovery with GPU. 1-5 - Raul Sánchez-Reillo, Helga C. Quiros-Sandoval, Judith Liu-Jimenez, Ines Goicoechea-Telleria:
Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeries. 373-378 - Chih-Hung Hsieh, Wei-Chieh Chao, Pei-Wen Liu, Chao-Wen Li:
Cyber security risk assessment using an interpretable evolutionary fuzzy scoring system. 153-158 - Da-Yu Kao, Guan-Jie Wu:
A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO/IEC 27037: 2012. 217-222 - Judith Liu-Jimenez, Raul Sánchez-Reillo, Ramon Blanco-Gonzalo, Belen Fernandez-Saavedra:
Making stronger identity for EU citizens. 333-339 - Nicole Hättenschwiler, Stefan Michel, Milena Kuhn, Sandrina Ritzmann, Adrian Schwaninger:
A first exploratory study on the relevance of everyday object knowledge and training for increasing efficiency in airport security X-ray screening. 25-30 - Yongjun Ren, Jin Han, Jin Wang, Liming Fang:
Privacy-preserving proof of storage in large group. 269-272 - Shaw-Shiun Deng, Hui-Zhen Gu, Chen-Wei Ku:
The design of battle field correlation tracks. 175-180 - Aufaclav Zatu Kusuma Frisky, Chien-Yao Wang, Andri Santoso, Jia-Ching Wang:
Lip-based visual speech recognition system. 315-319 - Po-Ching Lin, Jyun-Chen Liu, Pin-Ren Chiou:
An event-based SDN architecture for network security analysis. 159-164 - Maurizio Talamo, Armanas Povilionis, Franco Arcieri, Christian H. Schunck:
Providing online operational support for distributed, security sensitive electronic business processes. 49-54 - Shwu-Jing Chang, Kuan-Hung Yeh, Guan-Dun Peng, Shih-Ming Chang, Chung-Hao Huang:
From Safety to security - Pattern and anomaly detections in maritime trajectories. 415-419 - Ying-Dar Lin, Feng-Ze Liao, Shih-Kun Huang, Yuan-Cheng Lai:
Browser fuzzing by scheduled mutation and generation of document object models. 1-6 - Chih Julie Wang, Arvin Huang-Te Li, Ming-Chih Wang, Cheng-Lung Lee:
Atomizing apparatus for development of latent fingerprints. 281-285 - Natthakan Iam-on, Tossapon Boongoen:
Improving face classification with multiple-clustering induced feature reduction. 241-246 - Vincent E. Urias, William M. S. Stout, Caleb Loverro:
Computer network deception as a Moving Target Defense. 1-6 - James Rees:
Distributed multistage alert correlation architecture based on Hadoop. 147-152 - Yi-Zeng Hsieh, Mu-Chun Su, Addison Y. S. Su, Wu-Rong Shih, Jen-Chih Yu, Chien-Yeh Huang:
The computational rules extractor in the detection of tax evasion. 181-184 - Tse-Shih Chen, Ming-Fen Lin, Tzi-cker Chiueh, Cheng-Hsin Chang, Wei-Heng Tai:
An intelligent surveillance video analysis service in cloud environment. 1-6 - Wei-Jen Wang, Hung-Lin Huang, Shan-Hao Chuang, Shao-Jui Chen, Chia Hung Kao, Deron Liang:
Virtual machines of high availability using hardware-assisted failure detection. 1-6 - Jain-Shing Wu, Wan-Ching Lin, Chih-Ta Lin, Te-En Wei:
Smartphone continuous authentication based on keystroke and gesture profiling. 191-197 - Hau-Ming Chang, Shu-Chiung Lin, Patrick S. Chen, Yu-Hsuan Hung:
A verification protocol of mobile payment based on signature recognition. 379-384 - Kai-Fung Hong, Chien-Chih Chen, Yu-Ting Chiu, Kuo-Sen Chou:
Scalable command and control detection in log data through UF-ICF analysis. 293-298 - Chi-Ping Lin, Chuen-Fa Ni, I-Hsian Li, Chih-Heng Lu:
Stochastic delineation of well capture zones in aquifers of Choushui River alluvial fan in central Taiwan. 427-432 - Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Outsourced data tagging via authority and delegable auditing for cloud storage. 131-134 - Marcos Faúndez-Zanuy, Enric Sesa-Nogueras, Stefano Marinozzi:
Speaker identification experiments under gender De-identification. 1-6 - Chih-Hung Hsieh, Chia-Min Lai, Ching-Hao Mao, Tien-Cheu Kao, Kuo-Chen Lee:
AD2: Anomaly detection on active directory log data for insider threat monitoring. 287-292 - Moisés Díaz Cabrera, Miguel A. Ferrer, Giuseppe Pirlo, Giuliano Giannico, Patricia Henríquez, Donato Impedovo:
Off-line signature stability by optical flow: Feasibility study of predicting the verifier performance. 341-345 - Sih-Huei Chen, Andri Santoso, Yuan-Shan Lee, Jia-Ching Wang:
Latent dirichlet allocation based blog analysis for criminal intention detection system. 73-76 - Vladimir Smejkal, Ladislav Sieger, Jindrich Kodl, Daniel Novák, Jakub Schneider:
The dynamic biometric signature - Is the biometric data in the created signature constant? 385-390 - Huang Liang:
Research of liquid CT image de-noising based on improved NL-means algorithm. 359-362 - Giovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi:
Cyber-security analysis and evaluation for smart home management solutions. 1-6 - Yongjun Ren, Yaping Cheng, Jin Wang, Liming Fang:
Data protection based on multifunction digital watermark in wireless sensor network. 37-41 - Fabio Garzia, Lorenzo Nesbitt, Roberto Cusani:
Adaptive genetic controller for the dynamic optmization of network traffic of integrated security systems. 1-6 - Tossapon Boongoen, Natthakan Iam-on:
Discovering identity in intelligence data using weighted link based similarities: A case study of Thailand. 327-332 - Moisés Díaz Cabrera, Patricia Henríquez, Miguel A. Ferrer, Jesús B. Alonso, Giuseppe Pirlo, Donato Impedovo:
Novel method for early bearing fault detection based on dynamic stability measure. 43-47 - Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Rodrigo Ros-Gomez, Belen Fernandez-Saavedra:
User acceptance of planar semiconductor fingerprint sensors. 31-36 - Huang Liang:
Risk-based optimization design for checkpoints in airports. 347-351 - Pin-Jui Chen, Yen-Wen Chen:
Implementation of SDN based network intrusion detection and prevention system. 141-146 - Meng-Yi Chen, Chang-En Pu, Fang-Chin Wu, Huei-Yu Lai, Chin-Wen Ho:
Rapidly mutating Y-STRs population data in Taiwan and haplotype probability estimation for forensic purposes. 395-402 - Lee Heon Soo:
Comparative analysis of Governmental Countermeasures to cyber attacks. 1-6 - Antoniu L. Fantana, Selvakumar Ramachandran, Christian H. Schunck, Maurizio Talamo:
Movement based biometric authentication with smartphones. 235-239 - Wan-Chen Hsieh, Chuan-Chi Wu, Yung-Wei Kao:
A study of android malware detection technology evolution. 135-140 - Ho-Hsing Hsieh, Chi-Yao Hsu, Po-Yu Ke, Guang-Sheen Liu, Chih-Ping Lin:
Appling Lidar-based obstacle detection and wireless image transmission system for improving safety at level crossings. 363-367 - Tzi-cker Chiueh, E. J. Chang, Robert Huang, Hogan Lee, Vernon Sung, M. H. Chiang:
Security considerations in ITRI cloud OS. 107-112 - Aythami Morales, Elena Luna-Garcia, Julian Fiérrez, Javier Ortega-Garcia:
Score normalization for keystroke dynamics biometrics. 223-228 - Charles Wharton, Kang-I Lin:
Comparative legislation, corporate policy, and citizen concerns: Legal solutions for privacy protection in cloud computing. 19-24 - Cheng-Ta Hsieh, Kuo-Chin Fan, Chin-Chuan Han:
Personal re-identification using rank-based manifold ranking. 391-394 - Chung-Yi Lin, Ming-Che Chang, Hua-Chou Chiu, Keh-Hwa Shyu:
Secure logging framework integrating with cloud database. 13-17 - Der-ren Taur, Chung-Hsin Cheng:
A composite guidance for dual range AAM with side jet control. 185-189 - Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang:
Reliable access control for multi-authority in cloud storage. 113-116 - Tzung-Fu Tsai, Po-Chyi Su:
An information sharing scheme in halftone images based on multi-scale error diffusion. 369-372 - Cristina Carmona-Duarte, Jaime Calvo-Gallego, Blas-Pablo Dorta-Naranjo, Miguel Angel Ferrer-Ballester:
Efficient detection algorithm for non-coherent high-resolution radar in sea clutter. 421-426 - Chun-Yi Wang, Ya-Lyue Jhao, Chuan-Sheng Wang, Shih-Jen Chen, Fu-Hau Hsu, Yao-Hsin Chen:
The bilateral communication-based dynamic extensible honeypot. 263-268 - Hsiang-Te Liu, Yun-Ming Tang:
The causal model analysis of resident's evaluation of Closed Circuit TV and security perception. 61-66 - Ruben Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia, Julian Fiérrez:
Increasing the robustness of biometric templates for dynamic signature biometric systems. 229-234 - Chih-Hung Lin, Chin-Wei Tien, Chih-Wei Chen, Chia-Wei Tien, Hsing-Kuo Pao:
Efficient spear-phishing threat detection using hypervisor monitor. 299-303 - Fang-Chin Wu, Meng-Yi Chen, Chi-Hsiang Chao, Chang-En Pu:
Study on STR markers of DNA for improving the power of identification on cases in Taiwan. 403-408 - Juan Camilo Vásquez-Correa, Nicanor García, Juan Rafael Orozco-Arroyave, Julián David Arias-Londoño, Jesús Francisco Vargas-Bonilla, Elmar Nöth:
Emotion recognition from speech under environmental noise conditions using wavelet decomposition. 247-252 - Ching-Wei Huang:
Security system and actual operation benefit of data transmission on heterogeneous network. 165-168 - Didi Rosiyadi, Shi-Jinn Horng, Nova Hadi Lestriandoko:
A resistant digital image watermarking scheme based on masking model. 1-4 - Yi Ming Dai, Keh Shiou Liu:
TACSA: A web-service based system for coastal surveillance and situational awareness. 409-413 - Yanik Sterchi, Adrian Schwaninger:
A first simulation on optimizing EDS for cabin baggage screening regarding throughput. 55-60 - Jen-Chieh Wang, Wei-Fun Cheng, Han-Chiang Chen, Hung-Li Chien:
Benefit of construct information security environment based on lightweight virtualization technology. 1-4 - Chia-Ling Wu:
A goal-driven approach to modeling security concerns in network management system. 123-129 - Jing-Zhong Wang, Tian-Xi Wu, Tsung-Ying Sun:
An audio secret sharing system based on fractal encoding. 211-216 - Chao-Ting Su, Hsi-Chun Wang:
Self-authentication watermark by digital halftoning. 1-6 - Aythami Morales, Moisés Díaz Cabrera, Gloria Llinas-Sanchez, Miguel A. Ferrer:
Earprint recognition based on an ensemble of global and local features. 253-258 - Jyh-Ren Shieh:
An end-to-end encrypted domain proximity recommendation system using secret sharing homomorphic cryptography. 1-6 - Belen Fernandez-Saavedra, Raul Sánchez-Reillo, Carlos Sanchez-Redondo, Ramon Blanco-Gonzalo:
Testing of biometric systems integrated in mobile devices. 321-326 - Adrian R. Chavez, William M. S. Stout, Sean Peisert:
Techniques for the dynamic randomization of network attributes. 1-6 - Cheng-Lung Lee, Chun-Chih Lin, Ming-Fong Tai, Chi-Chang Liu:
Nuclear forensics and nuclear crime scene management problem in Taiwan. 277-280 - Yao-Tang Chang, Yih-Chuan Lin:
The scrambling cryptography implemented with chaotic sequence trigger optical switch algorithm in WDM passive optical network. 259-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.