:facetid:toc:\"db/conf/icitst/icitst2016.bht\"OK:facetid:toc:db/conf/icitst/icitst2016.bhtAdnan Ahmed 0001Pardeep Kumar 0003Ali Raza BhangwarMuhammad Ibrahim ChannaA secure and QoS aware routing protocol for Wireless Sensor Network.ICITST313-3172016Conference and Workshop Papersclosedconf/icitst/AhmedKBC1610.1109/ICITST.2016.7856720https://doi.org/10.1109/ICITST.2016.7856720https://dblp.org/rec/conf/icitst/AhmedKBC16URL#3272420Emad Al-MohammedNigel LingeA generic, personalized electronic program guide system for accessing multiple online TV providers.ICITST291-2962016Conference and Workshop Papersclosedconf/icitst/Al-MohammedL1610.1109/ICITST.2016.7856715https://doi.org/10.1109/ICITST.2016.7856715https://dblp.org/rec/conf/icitst/Al-MohammedL16URL#3272421Neamah Al-NaffakhNathan L. ClarkePaul Dowland 0001Fudong Li 0001Activity Recognition using wearable computing.ICITST189-1952016Conference and Workshop Papersclosedconf/icitst/Al-NaffakhCDL1610.1109/ICITST.2016.7856695https://doi.org/10.1109/ICITST.2016.7856695https://dblp.org/rec/conf/icitst/Al-NaffakhCDL16URL#3272422Mohammad Al-SmadiOmar QawasmehBashar TalafhaMahmoud Al-AyyoubYaser JararwehElhadj BenkhelifaAn enhanced framework for aspect-based sentiment analysis of Hotels' reviews: Arabic reviews case study.ICITST98-1032016Conference and Workshop Papersclosedconf/icitst/Al-SmadiQTAJB1610.1109/ICITST.2016.7856675https://doi.org/10.1109/ICITST.2016.7856675https://dblp.org/rec/conf/icitst/Al-SmadiQTAJB16URL#3272423Aisha Suliaman AlazriTelecommunication traffic through submarine cables: Security and vulnerabilities.ICITST372-3752016Conference and Workshop Papersclosedconf/icitst/Alazri1610.1109/ICITST.2016.7856733https://doi.org/10.1109/ICITST.2016.7856733https://dblp.org/rec/conf/icitst/Alazri16URL#3272424Khawla Alghafli 0001Thomas Martin 0002Identification and recovery of video fragments for forensics file carving.ICITST267-2722016Conference and Workshop Papersclosedconf/icitst/AlghafliM1610.1109/ICITST.2016.7856710https://doi.org/10.1109/ICITST.2016.7856710https://dblp.org/rec/conf/icitst/AlghafliM16URL#3272425Ibrahim AlmarashdehMutasem AlsmadiHeuristic evaluation of mobile government portal services: An experts' review.ICITST427-4312016Conference and Workshop Papersclosedconf/icitst/AlmarashdehA1610.1109/ICITST.2016.7856746https://doi.org/10.1109/ICITST.2016.7856746https://dblp.org/rec/conf/icitst/AlmarashdehA16URL#3272426Norah Ahmed AlmubairikGary B. WillsAutomated penetration testing based on a threat model.ICITST413-4142016Conference and Workshop Papersclosedconf/icitst/AlmubairikW1610.1109/ICITST.2016.7856742https://doi.org/10.1109/ICITST.2016.7856742https://dblp.org/rec/conf/icitst/AlmubairikW16URL#3272427Mohammad Kamel AlomariDigital divide impact on e-voting adoption in middle eastern country.ICITST409-4122016Conference and Workshop Papersclosedconf/icitst/Alomari1610.1109/ICITST.2016.7856741https://doi.org/10.1109/ICITST.2016.7856741https://dblp.org/rec/conf/icitst/Alomari16URL#3272428Mutlaq Jalimid AlotaibiSteven FurnellNathan L. ClarkeInformation security policies: A review of challenges and influencing factors.ICITST352-3582016Conference and Workshop Papersclosedconf/icitst/AlotaibiFC1610.1109/ICITST.2016.7856729https://doi.org/10.1109/ICITST.2016.7856729https://dblp.org/rec/conf/icitst/AlotaibiFC16URL#3272429Faisal AlotaibiSteven FurnellIngo StengelMaria PapadakiA survey of cyber-security awareness in Saudi Arabia.ICITST154-1582016Conference and Workshop Papersclosedconf/icitst/AlotaibiFSP1610.1109/ICITST.2016.7856687https://doi.org/10.1109/ICITST.2016.7856687https://dblp.org/rec/conf/icitst/AlotaibiFSP16URL#3272430Gaseb AlotibiNathan L. ClarkeFudong Li 0001Steven FurnellUser profiling from network traffic via novel application-level interactions.ICITST279-2852016Conference and Workshop Papersclosedconf/icitst/AlotibiCLF1610.1109/ICITST.2016.7856712https://doi.org/10.1109/ICITST.2016.7856712https://dblp.org/rec/conf/icitst/AlotibiCLF16URL#3272431Yousuf AlsalamiChan Yeob YeunThomas Martin 0002Majid KhonjiLinear and differential cryptanalysis of small-sized random (n, m)-S-boxes.ICITST447-4542016Conference and Workshop Papersclosedconf/icitst/AlsalamiYMK1610.1109/ICITST.2016.7856751https://doi.org/10.1109/ICITST.2016.7856751https://dblp.org/rec/conf/icitst/AlsalamiYMK16URL#3272432Takashi AmanoRyo OnumaHiroki NakayamaHiroaki KaminagaYouzou MiyaderaShoichi NakamuraGaze network extraction from bookmarks in accordance with search intentions.ICITST472-4732016Conference and Workshop Papersclosedconf/icitst/AmanoONKMN1610.1109/ICITST.2016.7856756https://doi.org/10.1109/ICITST.2016.7856756https://dblp.org/rec/conf/icitst/AmanoONKMN16URL#3272433Carles Antón-HaroInvited speaker (IEEE Spain section professional activities): Scientific resumes and job interviews - how to make (a positive) impact.ICITST202016Conference and Workshop Papersclosedconf/icitst/Anton-Haro1610.1109/ICITST.2016.7856656https://doi.org/10.1109/ICITST.2016.7856656https://dblp.org/rec/conf/icitst/Anton-Haro16URL#3272434Daisuke ArakawaHiroki NakayamaRyo OnumaHiroaki KaminagaYouzou MiyaderaShoichi NakamuraDynamically visualizing the relationships between Web pages depending on user's search viewpoints.ICITST474-4752016Conference and Workshop Papersclosedconf/icitst/ArakawaNOKMN1610.1109/ICITST.2016.7856757https://doi.org/10.1109/ICITST.2016.7856757https://dblp.org/rec/conf/icitst/ArakawaNOKMN16URL#3272435Sihem BensimessaoudNadjib BadacheSouad BenmezianeAmina DjellalbiaAn enhanced approach to preserving privacy in social network data publishing.ICITST80-852016Conference and Workshop Papersclosedconf/icitst/BensimessaoudBB1610.1109/ICITST.2016.7856671https://doi.org/10.1109/ICITST.2016.7856671https://dblp.org/rec/conf/icitst/BensimessaoudBB16URL#3272436Francesco BuccafurriGianluca LaxSerena NicolazzoAntonino NoceraRange query integrity in the cloud: the case of video surveillance.ICITST170-1752016Conference and Workshop Papersclosedconf/icitst/BuccafurriLNN1610.1109/ICITST.2016.7856691https://doi.org/10.1109/ICITST.2016.7856691https://dblp.org/rec/conf/icitst/BuccafurriLNN16URL#3272437Sandra Stincic ClarkeKeynote speaker 4: Data silos of the IoT kind.ICITST192016Conference and Workshop Papersclosedconf/icitst/Clarke1610.1109/ICITST.2016.7856655https://doi.org/10.1109/ICITST.2016.7856655https://dblp.org/rec/conf/icitst/Clarke16URL#3272438Óscar CorchoKeynote speaker 3: Open Data city portals: Working towards their homogeneisation.ICITST182016Conference and Workshop Papersclosedconf/icitst/Corcho1610.1109/ICITST.2016.7856654https://doi.org/10.1109/ICITST.2016.7856654https://dblp.org/rec/conf/icitst/Corcho16URL#3272439Amina DjellalbiaNadjib BadacheSouad BenmezianeSihem BensimessaoudAnonymous authentication scheme in e-Health Cloud environment.ICITST47-522016Conference and Workshop Papersclosedconf/icitst/DjellalbiaBBB1610.1109/ICITST.2016.7856664https://doi.org/10.1109/ICITST.2016.7856664https://dblp.org/rec/conf/icitst/DjellalbiaBBB16URL#3272440Robin FayChristoph RulandCompressive Sensing encryption modes and their security.ICITST119-1262016Conference and Workshop Papersclosedconf/icitst/FayR1610.1109/ICITST.2016.7856681https://doi.org/10.1109/ICITST.2016.7856681https://dblp.org/rec/conf/icitst/FayR16URL#3272441Steven FurnellCharles A. ShoniregunWelcome message.ICITST32016Conference and Workshop Papersclosedconf/icitst/FurnellS1610.1109/ICITST.2016.7856648https://doi.org/10.1109/ICITST.2016.7856648https://dblp.org/rec/conf/icitst/FurnellS16URL#3272442Oleg GarasymIna TaralovaRené LoziKey requirements for the design of robust chaotic PRNG.ICITST33-382016Conference and Workshop Papersclosedconf/icitst/GarasymTL1610.1109/ICITST.2016.7856660https://doi.org/10.1109/ICITST.2016.7856660https://dblp.org/rec/conf/icitst/GarasymTL16URL#3272443Aiman GhannamiChenxi ShaoExperience-based learning for identifying sub-regions in Wireless Sensor Networks.ICITST326-3272016Conference and Workshop Papersclosedconf/icitst/GhannamiS1610.1109/ICITST.2016.7856722https://doi.org/10.1109/ICITST.2016.7856722https://dblp.org/rec/conf/icitst/GhannamiS16URL#3272444Aiman GhannamiChenxi ShaoEfficient fast recovery mechanism in Software-Defined Networks: Multipath routing approach.ICITST432-4352016Conference and Workshop Papersclosedconf/icitst/GhannamiS16a10.1109/ICITST.2016.7856747https://doi.org/10.1109/ICITST.2016.7856747https://dblp.org/rec/conf/icitst/GhannamiS16aURL#3272445Alessandro GrecoAlberto CaponiGiuseppe Bianchi 0001Facing lateral movements using widespread behavioral probes.ICITST159-1602016Conference and Workshop Papersclosedconf/icitst/GrecoCB1610.1109/ICITST.2016.7856688https://doi.org/10.1109/ICITST.2016.7856688https://dblp.org/rec/conf/icitst/GrecoCB16URL#3272446Cynthia Lizbeth Guzman-CandelarioJose Juan Garcia-HernandezLoreto Gonzalez-HernandezA low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack.ICITST27-322016Conference and Workshop Papersclosedconf/icitst/Guzman-Candelario1610.1109/ICITST.2016.7856659https://doi.org/10.1109/ICITST.2016.7856659https://dblp.org/rec/conf/icitst/Guzman-Candelario16URL#3272447Lotfi HajjemSalah BenabdallahAn MMAS-GA for resource allocation in multi-cloud systems.ICITST421-4262016Conference and Workshop Papersclosedconf/icitst/HajjemB1610.1109/ICITST.2016.7856745https://doi.org/10.1109/ICITST.2016.7856745https://dblp.org/rec/conf/icitst/HajjemB16URL#3272448Jorge Lopez Hernandez-ArdietaKeynote speaker 2: Cyber ranges: The (r)evolution in cybersecurity training.ICITST16-172016Conference and Workshop Papersclosedconf/icitst/Hernandez-Ardieta1610.1109/ICITST.2016.7856653https://doi.org/10.1109/ICITST.2016.7856653https://dblp.org/rec/conf/icitst/Hernandez-Ardieta16URL#3272449Yi HuDustin SulekAnthony CarellaJoshua CoxAllyson FrameKaren CiprianoEmploying miniaturized computers for distributed vulnerability assessment.ICITST57-612016Conference and Workshop Papersclosedconf/icitst/HuSCCFC1610.1109/ICITST.2016.7856666https://doi.org/10.1109/ICITST.2016.7856666https://dblp.org/rec/conf/icitst/HuSCCFC16URL#3272450Ons JallouliSafwan El AssadMaryline ChettoRobust chaos-based stream-cipher for secure public communication channels.ICITST23-262016Conference and Workshop Papersclosedconf/icitst/JallouliAC1610.1109/ICITST.2016.7856658https://doi.org/10.1109/ICITST.2016.7856658https://dblp.org/rec/conf/icitst/JallouliAC16URL#3272451Seyed Mahdi JameiiMohsen MaadaniIntelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks.ICITST416-4202016Conference and Workshop Papersclosedconf/icitst/JameiiM1610.1109/ICITST.2016.7856744https://doi.org/10.1109/ICITST.2016.7856744https://dblp.org/rec/conf/icitst/JameiiM16URL#3272452Isil KarabeyGamze AkmanA cryptographic approach for secure client - server chat application using public key infrastructure (PKI).ICITST442-4462016Conference and Workshop Papersclosedconf/icitst/KarabeyA1610.1109/ICITST.2016.7856750https://doi.org/10.1109/ICITST.2016.7856750https://dblp.org/rec/conf/icitst/KarabeyA16URL#3272453Murizah KassimNor Azura AyopAdaptive Policing Algorithms on inbound internet traffic using Generalized Pareto model.ICITST217-2222016Conference and Workshop Papersclosedconf/icitst/KassimA1610.1109/ICITST.2016.7856700https://doi.org/10.1109/ICITST.2016.7856700https://dblp.org/rec/conf/icitst/KassimA16URL#3272454Asad Masood KhattakFarkhund IqbalPatrick C. K. HungJwo-Shiun SunGuan-Pu PanJing-Jie LinPrivacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD).ICITST204-2092016Conference and Workshop Papersclosedconf/icitst/KhattakIHSPL1610.1109/ICITST.2016.7856697https://doi.org/10.1109/ICITST.2016.7856697https://dblp.org/rec/conf/icitst/KhattakIHSPL16URL#3272455Sanjay KumarAri ViinikainenTimo Hämäläinen 0002Machine learning classification model for Network based Intrusion Detection System.ICITST242-2492016Conference and Workshop Papersclosedconf/icitst/KumarV01610.1109/ICITST.2016.7856705https://doi.org/10.1109/ICITST.2016.7856705https://dblp.org/rec/conf/icitst/KumarV016URL#3272456Jarkko KuusijärviReijo SavolaPekka SavolainenAntti EvestiMitigating IoT security threats with a trusted Network element.ICITST260-2652016Conference and Workshop Papersclosedconf/icitst/KuusijarviSSE1610.1109/ICITST.2016.7856708https://doi.org/10.1109/ICITST.2016.7856708https://dblp.org/rec/conf/icitst/KuusijarviSSE16URL#3272457Michal KvetMonika VajsováPerformance study of the index structures in audited environment.ICITST459-4642016Conference and Workshop Papersclosedconf/icitst/KvetV1610.1109/ICITST.2016.7856753https://doi.org/10.1109/ICITST.2016.7856753https://dblp.org/rec/conf/icitst/KvetV16URL#3272458Chung Kwan LawWen XieZheng XuYi DouChin Ting YuHenry C. B. ChanDaniel Wai Kei KwongSystem and Protocols for secure Intercloud Communications.ICITST399-4042016Conference and Workshop Papersclosedconf/icitst/LawXXDYCK1610.1109/ICITST.2016.7856739https://doi.org/10.1109/ICITST.2016.7856739https://dblp.org/rec/conf/icitst/LawXXDYCK16URL#3272459Madeline LittleAspen OlmstedTemporal resource scheduling equity.ICITST297-2992016Conference and Workshop Papersclosedconf/icitst/LittleO1610.1109/ICITST.2016.7856716https://doi.org/10.1109/ICITST.2016.7856716https://dblp.org/rec/conf/icitst/LittleO16URL#3272460Dennis M. LupianaFredrick MtenziKiCM: A knowledge-intensive context model.ICITST223-2292016Conference and Workshop Papersclosedconf/icitst/LupianaM1610.1109/ICITST.2016.7856701https://doi.org/10.1109/ICITST.2016.7856701https://dblp.org/rec/conf/icitst/LupianaM16URL#3272461Kheng Kok MarZhengQing HuChee Yong LawMeifen WangSecure cloud distributed file system.ICITST176-1812016Conference and Workshop Papersclosedconf/icitst/MarHLW1610.1109/ICITST.2016.7856692https://doi.org/10.1109/ICITST.2016.7856692https://dblp.org/rec/conf/icitst/MarHLW16URL#3272462Tomas Marques-ArpaJordi Serra-RuizPRS signal in acquiring evidence of Digital Chain of Custody.ICITST273-2782016Conference and Workshop Papersclosedconf/icitst/Marques-ArpaS1610.1109/ICITST.2016.7856711https://doi.org/10.1109/ICITST.2016.7856711https://dblp.org/rec/conf/icitst/Marques-ArpaS16URL#3272463Antonis MichalasSharing in the rain: Secure and efficient data sharing for the Cloud.ICITST182-1872016Conference and Workshop Papersclosedconf/icitst/Michalas1610.1109/ICITST.2016.7856693https://doi.org/10.1109/ICITST.2016.7856693https://dblp.org/rec/conf/icitst/Michalas16URL#3272464Regio A. MichelinAvelino F. ZorzoMarcia B. CamposCharles V. NeuAlex M. S. OrozcoSmartphone as a biometric service for web authentication.ICITST405-4082016Conference and Workshop Papersclosedconf/icitst/MichelinZCNO1610.1109/ICITST.2016.7856740https://doi.org/10.1109/ICITST.2016.7856740https://dblp.org/rec/conf/icitst/MichelinZCNO16URL#3272465Sean T. MillerCurtis Busby-EarleThe role of machine learning in botnet detection.ICITST359-3642016Conference and Workshop Papersclosedconf/icitst/MillerB1610.1109/ICITST.2016.7856730https://doi.org/10.1109/ICITST.2016.7856730https://dblp.org/rec/conf/icitst/MillerB16URL#3272466Sophia MoganediNjabulo MkhontoJabu MtsweniEvaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing services.ICITST335-3392016Conference and Workshop Papersclosedconf/icitst/MoganediMM1610.1109/ICITST.2016.7856725https://doi.org/10.1109/ICITST.2016.7856725https://dblp.org/rec/conf/icitst/MoganediMM16URL#3272467Belghachi MohamedFeham MohamedExperimental evaluation of RPL protocol.ICITST455-4582016Conference and Workshop Papersclosedconf/icitst/MohamedM1610.1109/ICITST.2016.7856752https://doi.org/10.1109/ICITST.2016.7856752https://dblp.org/rec/conf/icitst/MohamedM16URL#3272468Benfilali MostefaSofiane Boukli HaceneAdaptive image compression in wireless sensor networks.ICITST437-4412016Conference and Workshop Papersclosedconf/icitst/MostefaS1610.1109/ICITST.2016.7856749https://doi.org/10.1109/ICITST.2016.7856749https://dblp.org/rec/conf/icitst/MostefaS16URL#3272469Moses MoyoMarianne LoockSouth African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review.ICITST250-2542016Conference and Workshop Papersclosedconf/icitst/MoyoL1610.1109/ICITST.2016.7856706https://doi.org/10.1109/ICITST.2016.7856706https://dblp.org/rec/conf/icitst/MoyoL16URL#3272470Hlib MykhailenkoGiovanni NegliaFabrice HuetWhich metrics for vertex-cut partitioning?ICITST74-792016Conference and Workshop Papersclosedconf/icitst/MykhailenkoNH1610.1109/ICITST.2016.7856670https://doi.org/10.1109/ICITST.2016.7856670https://dblp.org/rec/conf/icitst/MykhailenkoNH16URL#3272471Hiroki NakayamaShoichi NakamuraKaname NozakiYasuhiko MorimotoHiroaki KaminagaYouzou MiyaderaLearning History Transition Graphs for understanding the programming learning situations.ICITST476-4772016Conference and Workshop Papersclosedconf/icitst/NakayamaNNMKM1610.1109/ICITST.2016.7856758https://doi.org/10.1109/ICITST.2016.7856758https://dblp.org/rec/conf/icitst/NakayamaNNMKM16URL#3272472Roberto NardoneRicardo J. RodríguezStefano Marrone 0001Formal security assessment of Modbus protocol.ICITST142-1472016Conference and Workshop Papersclosedconf/icitst/NardoneRM1610.1109/ICITST.2016.7856685https://doi.org/10.1109/ICITST.2016.7856685https://dblp.org/rec/conf/icitst/NardoneRM16URL#3272473Mohamed A. NassarLayla A. A. El-SayedYousry TahaEfficient parallel Stochastic Gradient Descent for matrix factorization using GPU.ICITST63-682016Conference and Workshop Papersclosedconf/icitst/NassarET1610.1109/ICITST.2016.7856668https://doi.org/10.1109/ICITST.2016.7856668https://dblp.org/rec/conf/icitst/NassarET16URL#3272474T. NawrathDaniel Fischer 0003Bernd MarkscheffelPrivacy-sensitive data in connected cars.ICITST392-3932016Conference and Workshop Papersclosedconf/icitst/NawrathFM1610.1109/ICITST.2016.7856736https://doi.org/10.1109/ICITST.2016.7856736https://dblp.org/rec/conf/icitst/NawrathFM16URL#3272475Charles V. NeuAvelino F. ZorzoAlex M. S. OrozcoRegio A. MichelinAn approach for detecting encrypted insider attacks on OpenFlow SDN Networks.ICITST210-2152016Conference and Workshop Papersclosedconf/icitst/NeuZOM1610.1109/ICITST.2016.7856698https://doi.org/10.1109/ICITST.2016.7856698https://dblp.org/rec/conf/icitst/NeuZOM16URL#3272476Niranjan SivakumarMaxime CrepelDominique BoullierRisk management in payment system architectures.ICITST4782016Conference and Workshop Papersclosedconf/icitst/NiranjanMD1610.1109/ICITST.2016.7856759https://doi.org/10.1109/ICITST.2016.7856759https://dblp.org/rec/conf/icitst/NiranjanMD16URL#3272477Aspen OlmstedModeling cloud applications for partition contingency.ICITST230-2342016Conference and Workshop Papersclosedconf/icitst/Olmsted1610.1109/ICITST.2016.7856702https://doi.org/10.1109/ICITST.2016.7856702https://dblp.org/rec/conf/icitst/Olmsted16URL#3272478Leandro Ordoñez-AnteThomas VanhoveGregory van SeghbroeckTim WautersFilip De TurckInteractive querying and data visualization for abuse detection in social network sites.ICITST104-1092016Conference and Workshop Papersclosedconf/icitst/Ordonez-AnteVSW1610.1109/ICITST.2016.7856676https://doi.org/10.1109/ICITST.2016.7856676https://dblp.org/rec/conf/icitst/Ordonez-AnteVSW16URL#3272479Alex M. S. OrozcoCharles V. NeuRegio A. MichelinAvelino F. ZorzoSecurity analysis of forwarding strategies in network time measurements using Openflow.ICITST148-1532016Conference and Workshop Papersclosedconf/icitst/OrozcoNMZ1610.1109/ICITST.2016.7856686https://doi.org/10.1109/ICITST.2016.7856686https://dblp.org/rec/conf/icitst/OrozcoNMZ16URL#3272480Gozde OzcanSule Gündüz ÖgüdücüApplying different classification techniques in reciprocal job recommender system for considering job candidate preferences.ICITST235-2402016Conference and Workshop Papersclosedconf/icitst/OzcanO1610.1109/ICITST.2016.7856703https://doi.org/10.1109/ICITST.2016.7856703https://dblp.org/rec/conf/icitst/OzcanO16URL#3272481Abdullateef Rabab'ahMahmoud Al-AyyoubMohammed A. ShehabYaser JararwehBernard J. JansenUsing the Panama Papers to explore the financial networks of the Middle East.ICITST92-972016Conference and Workshop Papersclosedconf/icitst/RababahASJJ1610.1109/ICITST.2016.7856674https://doi.org/10.1109/ICITST.2016.7856674https://dblp.org/rec/conf/icitst/RababahASJJ16URL#3272482Aasim RafiqueShoaib AzamMoongu JeonSangwook LeeFace-deidentification in images using Restricted Boltzmann Machines.ICITST69-732016Conference and Workshop Papersclosedconf/icitst/RafiqueAJL1610.1109/ICITST.2016.7856669https://doi.org/10.1109/ICITST.2016.7856669https://dblp.org/rec/conf/icitst/RafiqueAJL16URL#3272483Samaneh RashidibajganA trust structure for detection of sybil attacks in opportunistic networks.ICITST347-3512016Conference and Workshop Papersclosedconf/icitst/Rashidibajgan1610.1109/ICITST.2016.7856728https://doi.org/10.1109/ICITST.2016.7856728https://dblp.org/rec/conf/icitst/Rashidibajgan16URL#3272484Tasneem SalahM. Jamal ZemerlyChan Yeob YeunMahmoud Al-QutayriYousof Al-HammadiThe evolution of distributed systems towards microservices architecture.ICITST318-3252016Conference and Workshop Papersclosedconf/icitst/SalahZYAA1610.1109/ICITST.2016.7856721https://doi.org/10.1109/ICITST.2016.7856721https://dblp.org/rec/conf/icitst/SalahZYAA16URL#3272485Aymen J. SalmanAdil Al-YasiriDeveloping Domain-Specific Language for Wireless Sensor Network application development.ICITST301-3082016Conference and Workshop Papersclosedconf/icitst/SalmanA1610.1109/ICITST.2016.7856718https://doi.org/10.1109/ICITST.2016.7856718https://dblp.org/rec/conf/icitst/SalmanA16URL#3272486Andres Paz SampedroShantanu SrivastavaCost to serve of large scale online systems.ICITST395-3982016Conference and Workshop Papersclosedconf/icitst/SampedroS1610.1109/ICITST.2016.7856738https://doi.org/10.1109/ICITST.2016.7856738https://dblp.org/rec/conf/icitst/SampedroS16URL#3272487Tiago SantosCarlos SerrãoSecure Javascript Object Notation (SecJSON) Enabling granular confidentiality and integrity of JSON documents.ICITST329-3342016Conference and Workshop Papersclosedconf/icitst/SantosS1610.1109/ICITST.2016.7856724https://doi.org/10.1109/ICITST.2016.7856724https://dblp.org/rec/conf/icitst/SantosS16URL#3272488Neyire Deniz SarierEfficient biometric-based Encryption for fingerprints.ICITST127-1322016Conference and Workshop Papersclosedconf/icitst/Sarier1610.1109/ICITST.2016.7856682https://doi.org/10.1109/ICITST.2016.7856682https://dblp.org/rec/conf/icitst/Sarier16URL#3272489Nouredine SeddikiAmel DouliMaximizing the wireless sensor networks lifetime.ICITST309-3122016Conference and Workshop Papersclosedconf/icitst/SeddikiD1610.1109/ICITST.2016.7856719https://doi.org/10.1109/ICITST.2016.7856719https://dblp.org/rec/conf/icitst/SeddikiD16URL#3272490Aneesha SethiFederica PaciGary B. WillsEEVi - framework for evaluating the effectiveness of visualization in cyber-security.ICITST340-3452016Conference and Workshop Papersclosedconf/icitst/SethiPW1610.1109/ICITST.2016.7856726https://doi.org/10.1109/ICITST.2016.7856726https://dblp.org/rec/conf/icitst/SethiPW16URL#3272491Prathap SiddavaatamReza SedaghatMin Hsuan ChengAn adaptive security framework with extensible computational complexity for cipher systems.ICITST133-1402016Conference and Workshop Papersclosedconf/icitst/SiddavaatamSC1610.1109/ICITST.2016.7856683https://doi.org/10.1109/ICITST.2016.7856683https://dblp.org/rec/conf/icitst/SiddavaatamSC16URL#3272492Gabriele SpengerJörg Keller 0001Structural improvements of chaotic PRNG implementations.ICITST465-4702016Conference and Workshop Papersclosedconf/icitst/Spenger01610.1109/ICITST.2016.7856754https://doi.org/10.1109/ICITST.2016.7856754https://dblp.org/rec/conf/icitst/Spenger016URL#3272493S. SrinivasanData privacy concerns involving cloud.ICITST53-562016Conference and Workshop Papersclosedconf/icitst/Srinivasan1610.1109/ICITST.2016.7856665https://doi.org/10.1109/ICITST.2016.7856665https://dblp.org/rec/conf/icitst/Srinivasan16URL#3272494Louis TajanDirk WesthoffChristian A. ReuterFrederik ArmknechtPrivate information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing.ICITST162-1692016Conference and Workshop Papersclosedconf/icitst/TajanWRA1610.1109/ICITST.2016.7856690https://doi.org/10.1109/ICITST.2016.7856690https://dblp.org/rec/conf/icitst/TajanWRA16URL#3272495Lo'ai Ali TawalbehTurki F. Al-SomaniHilal HoussainTowards secure communications: Review of side channel attacks and countermeasures on ECC.ICITST87-912016Conference and Workshop Papersclosedconf/icitst/TawalbehAH1610.1109/ICITST.2016.7856673https://doi.org/10.1109/ICITST.2016.7856673https://dblp.org/rec/conf/icitst/TawalbehAH16URL#3272496Ilaria Torre 0001Frosina KocevaOdnan Ref SanchezGiovanni AdorniA framework for personal data protection in the IoT.ICITST384-3912016Conference and Workshop Papersclosedconf/icitst/TorreKSA1610.1109/ICITST.2016.7856735https://doi.org/10.1109/ICITST.2016.7856735https://dblp.org/rec/conf/icitst/TorreKSA16URL#3272497Zakia El UahhabiHanan El BakkaliAn approach for evaluating trust in X.509 certificates.ICITST196-2032016Conference and Workshop Papersclosedconf/icitst/UahhabiB1610.1109/ICITST.2016.7856696https://doi.org/10.1109/ICITST.2016.7856696https://dblp.org/rec/conf/icitst/UahhabiB16URL#3272498Gaurav VarshneyManoj MisraPradeep K. AtreyImproving the accuracy of Search Engine based anti-phishing solutions using lightweight features.ICITST365-3702016Conference and Workshop Papersclosedconf/icitst/VarshneyMA1610.1109/ICITST.2016.7856731https://doi.org/10.1109/ICITST.2016.7856731https://dblp.org/rec/conf/icitst/VarshneyMA16URL#3272499Pedro Roger Magalhães VasconcelosGisele Azevedo de Araújo FreitasThales Guimaraes MarquesVirtualization technologies in web conferencing systems: A performance overview.ICITST376-3832016Conference and Workshop Papersclosedconf/icitst/VasconcelosFM1610.1109/ICITST.2016.7856734https://doi.org/10.1109/ICITST.2016.7856734https://dblp.org/rec/conf/icitst/VasconcelosFM16URL#3272500Radu VeleaNoel GordonComparison of color profile gamut coverage for computer monitors.ICITST287-2902016Conference and Workshop Papersclosedconf/icitst/VeleaG1610.1109/ICITST.2016.7856714https://doi.org/10.1109/ICITST.2016.7856714https://dblp.org/rec/conf/icitst/VeleaG16URL#3272501Gerard VidalRabei BechikhRhouma RhoumaSafya BelghithA commercial application of a chaos-based-stream cipher: Performance and Security analysis.ICITST39-442016Conference and Workshop Papersclosedconf/icitst/VidalBRB1610.1109/ICITST.2016.7856661https://doi.org/10.1109/ICITST.2016.7856661https://dblp.org/rec/conf/icitst/VidalBRB16URL#3272502Tiago VieiraCarlos SerrãoWeb security in the finance sector.ICITST255-2592016Conference and Workshop Papersclosedconf/icitst/VieiraS1610.1109/ICITST.2016.7856707https://doi.org/10.1109/ICITST.2016.7856707https://dblp.org/rec/conf/icitst/VieiraS16URL#3272503Martin VisserKeynote speaker 1: Critical Infrastructures SMART ready?ICITST152016Conference and Workshop Papersclosedconf/icitst/Visser1610.1109/ICITST.2016.7856652https://doi.org/10.1109/ICITST.2016.7856652https://dblp.org/rec/conf/icitst/Visser16URL#327250411th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016ICITSTIEEE2016Editorshipconf/icitst/2016https://ieeexplore.ieee.org/xpl/conhome/7847254/proceedinghttps://dblp.org/rec/conf/icitst/2016URL#3359664