Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:conf/icgs3:"
@inproceedings{DBLP:conf/icgs3/AbdullahJ19, author = {Tariq Abdullah and Andrew Jones}, title = {eHealth: Challenges Far Integrating BlockChain within Healthcare}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688184}, doi = {10.1109/ICGS3.2019.8688184}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AbdullahJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Abreu19, author = {Sergio De Abreu}, title = {A Feasibility Study on Machine Learning Techniques for {APT} Detection and Protection in VANETs}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688031}, doi = {10.1109/ICGS3.2019.8688031}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Abreu19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Adedotun-Ogundeji19, author = {Grace Adedotun{-}Ogundeji and Hamid Jahankhani}, title = {Preparing 11- 17 Years Old Girls to Become Cyber Security Experts in the Future}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688241}, doi = {10.1109/ICGS3.2019.8688241}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Adedotun-Ogundeji19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Ahmadi-Assalemi19, author = {Gabriela Ahmadi{-}Assalemi and Haider M. Al{-}Khateeb and Gregory Epiphaniou and Jon Cosson and Hamid Jahankhani and Prashant Pillai}, title = {Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688297}, doi = {10.1109/ICGS3.2019.8688297}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Ahmadi-Assalemi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AhmedKLB19, author = {Farah Ahmed and Fouad Khelifi and Ashref Lawgaly and Ahmed Bouridane}, title = {Comparative Analysis of a Deep Convolutional Neural Network for Source Camera Identification}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688260}, doi = {10.1109/ICGS3.2019.8688260}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AhmedKLB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AlBlooshiF19, author = {Yousuf AlBlooshi and Amin Hosseinian Far}, title = {A Novel Framework for Identification of Critical Business Processes}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688269}, doi = {10.1109/ICGS3.2019.8688269}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AlBlooshiF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AlbladiW19, author = {Samar Muslah Albladi and George R. S. Weir}, title = {A Conceptual Model to Predict Social Engineering Victims}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688352}, doi = {10.1109/ICGS3.2019.8688352}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AlbladiW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AlkhwaldiKQ19, author = {Abeer F. Alkhwaldi and Mumtaz M. Kamala and Rami Qahwaji}, title = {Security Perceptions in Cloud-Based e-Govemment Services}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688252}, doi = {10.1109/ICGS3.2019.8688252}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/AlkhwaldiKQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/BeaversFM19, author = {Jake L. Beavers and Michael Faulks and Jims Marchang}, title = {Hacking {NHS} Pacemakers: {A} Feasibility Study}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688214}, doi = {10.1109/ICGS3.2019.8688214}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/BeaversFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Bishop19, author = {Sherese Bishop}, title = {The Internet of Things: Implications for Consumer Privacy {\&} Security}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688024}, doi = {10.1109/ICGS3.2019.8688024}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Bishop19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/BrendanM19, author = {Ahuokpeme Chibueze Brendan and John McCarthy}, title = {Taxonomy of Threat Categorization and Threat Intelligence Platform}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688157}, doi = {10.1109/ICGS3.2019.8688157}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/BrendanM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ButtALJJK19, author = {Usman Javed Butt and Maysam Abbod and Anzor Lors and Hamid Jahankhani and Arshad Jamal and Arvind Kumar}, title = {Ransomware Threat and its Impact on {SCADA}}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688327}, doi = {10.1109/ICGS3.2019.8688327}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/ButtALJJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/CastroSSM19, author = {Nuno Castro and Henrique M. Dinis Santos and V{\'{\i}}tor J. S{\'{a}} and Maria Jos{\'{e}} Magalh{\~{a}}es}, title = {Study of the Means of Online Payment in the Portuguese Population}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688021}, doi = {10.1109/ICGS3.2019.8688021}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/CastroSSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ChelvachandranJ19, author = {Nishan Chelvachandran and Hamid Jahankhani}, title = {Data Mining Metrics to Identify and Evaluate Potential Radicalisation Through Social Media}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688189}, doi = {10.1109/ICGS3.2019.8688189}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/ChelvachandranJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ChelvachandranJ19a, author = {Nishan Chelvachandran and Hamid Jahankhani}, title = {A Study on Keyword Analytics as a Precursor to Machine Learning to Evaluate Radicalisation on Social Media}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688362}, doi = {10.1109/ICGS3.2019.8688362}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/ChelvachandranJ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/CollinsJ19, author = {Anita Collins and Hamid Jahankhani}, title = {Blockchain as a Tool for Financial Transparency in Development Aid}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688033}, doi = {10.1109/ICGS3.2019.8688033}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/CollinsJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/CopelandM19, author = {George Copeland and John McCarthy}, title = {Practical Cybersecurity for Digital Trains}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688036}, doi = {10.1109/ICGS3.2019.8688036}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/CopelandM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/CossonA19, author = {Jon Cosson and Haider Alhateeb}, title = {An Approach to Identify Risk Based Human Behaviour Profiling within an Office Environment}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688222}, doi = {10.1109/ICGS3.2019.8688222}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/CossonA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/DahalK19, author = {Binay Dahal and Yoohwan Kim}, title = {AutoEncoded Domains with Mean Activation for {DGA} Botnet Detection}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688037}, doi = {10.1109/ICGS3.2019.8688037}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/DahalK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/DoM19, author = {Anh Do and John McCarthy}, title = {Categorization of Threats and their Impacts on Critical National Infrastructure Systems}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688015}, doi = {10.1109/ICGS3.2019.8688015}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/DoM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/DurouAABE19, author = {Amal Durou and Somaya Al{-}M{\'{a}}adeed and Ibrahim A. Aref and Ahmed Bouridane and Mosa Elbendak}, title = {A Comparative Study of Machine Learning Approaches for Handwriter Identification}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688032}, doi = {10.1109/ICGS3.2019.8688032}, timestamp = {Tue, 16 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/DurouAABE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ForouzanJ19, author = {Homan Forouzan and Hamid Jahankhani}, title = {An Examination into the Level of Training, Education and Awareness Among Officers in Tackling Cybercrime within the Metropolitan Police Service}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688360}, doi = {10.1109/ICGS3.2019.8688360}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/ForouzanJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/GoldieJ19, author = {John Goldie and Hamid Jahankhani}, title = {Ethical Considerations of People with Autistic Spectrum Disorder}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688319}, doi = {10.1109/ICGS3.2019.8688319}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/GoldieJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/HaddonA19, author = {David A. E. Haddon and Haider M. Al{-}Khateeb}, title = {Investigating Data Exfiltration in {DNS} Over {HTTPS} Queries}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688016}, doi = {10.1109/ICGS3.2019.8688016}, timestamp = {Tue, 10 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/HaddonA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/HazzaaYAS19, author = {Firas Hazzaa and Sufian Yousef and Nada H. Ali and Erika Sanchez}, title = {The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc Network}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688314}, doi = {10.1109/ICGS3.2019.8688314}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/HazzaaYAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/HonnurvaliGGUKN19, author = {Mohamed Shaik Honnurvali and Naren Gupta and Keng Goh and Tariq Umar and Adnan Kabbani and Needa Nazecma}, title = {Can Future Smart Cities Powered by 100{\%} Renewables and Made Cyber Secured-A Analytical Approach}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688324}, doi = {10.1109/ICGS3.2019.8688324}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/HonnurvaliGGUKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/IbarraBDJJ19, author = {Jaime Ibarra Jimenez and Usman Javed Butt and Anh Do and Hamid Jahankhani and Arshad Jamal}, title = {Ransomware Impact to {SCADA} Systems and its Scope to Critical Infrastructure}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688299}, doi = {10.1109/ICGS3.2019.8688299}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/IbarraBDJJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/JahankhaniC19, author = {William Jahankhani and Liang Chen}, title = {Email Verification Fake or Genuine?}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688231}, doi = {10.1109/ICGS3.2019.8688231}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/JahankhaniC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/JimenezJ19, author = {Jaime Ibarra Jimenez and Hamid Jahankhani}, title = {"Privacy by Design" Governance Framework to Achieve Privacy Assurance of Personal Health Information {(PHI)} Processed by IoT-based Telemedicine Devices and Applications Within Healthcare Services}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688029}, doi = {10.1109/ICGS3.2019.8688029}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/JimenezJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Kagita19, author = {Mohan Krishna Kagita}, title = {Security and Privacy Issues for Business Intelligence in lOT}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688023}, doi = {10.1109/ICGS3.2019.8688023}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Kagita19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/KendzierskyjJ19, author = {Stefan Kendzierskyj and Hamid Jahankhani}, title = {The Role of Blockchain in Supporting Critical National Infrastructure}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688026}, doi = {10.1109/ICGS3.2019.8688026}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/KendzierskyjJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/KendzierskyjJ19a, author = {Stefan Kendzierskyj and Hamid Jahankhani}, title = {Blockchain as an Efficient and Alternative Mechanism for Strengthening and Securing the Privacy of Healthcare Patient and Clinical Research Data}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688148}, doi = {10.1109/ICGS3.2019.8688148}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/KendzierskyjJ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Manya19, author = {Bharat Manya}, title = {{BRT} - (Blockchain Relevance Theory): {A} Theoretical Framework for Blockchain {\&} {DLT} in Cyber Security Using CISv7 Controls}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688158}, doi = {10.1109/ICGS3.2019.8688158}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Manya19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MitchellHS19, author = {Ian Mitchell and Sukhvinder Hara and M. Sheriff}, title = {dAppER: Decentralised Application for Examination Review}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688143}, doi = {10.1109/ICGS3.2019.8688143}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MitchellHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MontasariH19, author = {Reza Montasari and Richard Hill}, title = {Next-Generation Digital Forensics: Challenges and Future Paradigms}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688020}, doi = {10.1109/ICGS3.2019.8688020}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MontasariH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MustafaP19, author = {Uzma Mustafa and Nada Philip}, title = {Group-Based Key Exchange for Medical IoT Device-to-Device Communication {(D2D)} Combining Secret Sharing and Physical Layer Key Exchange}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688022}, doi = {10.1109/ICGS3.2019.8688022}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MustafaP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MustafaPP19, author = {Uzma Mustafa and Eckhard Pfl{\"{u}}gel and Nada Philip}, title = {A Novel Privacy Framework for Secure M-Health Applications: The Case of the {GDPR}}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688019}, doi = {10.1109/ICGS3.2019.8688019}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MustafaPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/NkomoB19, author = {Danisa Nkomo and Ray Brown}, title = {Hybrid Cybersecurity Framework for the Internet of Medical Things {(IOMT)}}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688030}, doi = {10.1109/ICGS3.2019.8688030}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/NkomoB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/OHareML19, author = {Jamie O'Hare and Rich Macfarlane and Owen Lo}, title = {Identifying Vulnerabilities Using Internet-Wide Scanning Data}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688018}, doi = {10.1109/ICGS3.2019.8688018}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/OHareML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/OdellJ19, author = {Liam Odell and Hamid Jahankhani}, title = {{AI:} The Cyber-Physical Project Manager and their Digital Twin}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688144}, doi = {10.1109/ICGS3.2019.8688144}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/OdellJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/PimenidisP19, author = {Elias Pimenidis and Nikolaos Polatidis}, title = {Secure Social Media Spaces for Communities of Vulnerable People}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688027}, doi = {10.1109/ICGS3.2019.8688027}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/PimenidisP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/PournouriZA19, author = {Sina Pournouri and Shahrzad Zargari and Babak Akhgar}, title = {An Investigation of Using Classification Techniques in Prediction of Type of Targets in Cyber Attacks}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688266}, doi = {10.1109/ICGS3.2019.8688266}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/PournouriZA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/RamosM19, author = {Yvan Da Silva Ramos and John McCarthy}, title = {Management Versus Technical Perspectives on Threats}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688338}, doi = {10.1109/ICGS3.2019.8688338}, timestamp = {Thu, 29 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/RamosM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Ravindran19, author = {Rahul Ravindran}, title = {Circle of Trust: {A} High Volume, Energy Efficient, Stake Blind and High Attack Tolerant Blockchain Consensus Protocol}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688279}, doi = {10.1109/ICGS3.2019.8688279}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Ravindran19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Riaz19, author = {Jabran Riaz}, title = {Retail Industry Gift Card Hacking Technique Challenges}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688017}, doi = {10.1109/ICGS3.2019.8688017}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Riaz19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Ruiz19, author = {Rodrigo Ruiz}, title = {A Study of the {UK} Undergraduate Computer Science Curriculum: {A} Vision of Cybersecurity}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688137}, doi = {10.1109/ICGS3.2019.8688137}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Ruiz19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Sampana19, author = {Stephen S. Sampana}, title = {FoRCE (Forensic Recovery of Cloud Evidence): {A} Digital Cloud Forensics Framework}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688215}, doi = {10.1109/ICGS3.2019.8688215}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Sampana19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Semeraro19, author = {Jacopo Semeraro}, title = {An Investigatory Project on the Anonymity of Blockchain and Cryptocurrencies}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688035}, doi = {10.1109/ICGS3.2019.8688035}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Semeraro19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ShadAB19, author = {Asifa Shad and Tariq Abdullah and Usman Butt}, title = {Web Accessibility Adoption Framework {(WAAF)} for Businesses and Web Professionals}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688028}, doi = {10.1109/ICGS3.2019.8688028}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/ShadAB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ShnishahM19, author = {Halima Abdul Halime Shnishah and David Mulvaney}, title = {Encryption of Text File Using a User Controlled Automatically-Generated Key}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688258}, doi = {10.1109/ICGS3.2019.8688258}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/ShnishahM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Tait19, author = {Bobby L. Tait}, title = {Behavioural Biometrics Authentication Tested Using EyeWriter Technology}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688257}, doi = {10.1109/ICGS3.2019.8688257}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Tait19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/TunnicliffeOP19, author = {Martin J. Tunnicliffe and Omego Obinna and Eckhard Pfl{\"{u}}gel}, title = {Hidden Protocol Strengthening with Random Sentences as Cryptographic Nonces}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688025}, doi = {10.1109/ICGS3.2019.8688025}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/TunnicliffeOP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Welsh19, author = {Thomas Welsh}, title = {A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon in a Networked Computing Environment}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688353}, doi = {10.1109/ICGS3.2019.8688353}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Welsh19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/WoensdregtAEJ19, author = {Joseph Waldu Woensdregt and Haider M. Al{-}Khateeb and Gregory Epiphaniou and Hamid Jahankhani}, title = {AdPExT: Designing a Tool to Assess Information Gleaned from Browsers by Online Advertising Platforms}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688328}, doi = {10.1109/ICGS3.2019.8688328}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/WoensdregtAEJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Zernik19, author = {Joseph Zernik}, title = {Cybersecurity and Law in Israel - {A} Case Study}, booktitle = {{ICGS3}}, year = {2019}, url = {https://doi.org/10.1109/ICGS3.2019.8688318}, doi = {10.1109/ICGS3.2019.8688318}, timestamp = {Tue, 23 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Zernik19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icgs3/2019, title = {12th {IEEE} International Conference on Global Security, Safety and Sustainability, {ICGS3} 2019, London, UK, January 16-18, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8672787/proceeding}, isbn = {978-1-5386-7001-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AkbariZ15, author = {Akbar Sheikh Akbari and Pooneh Bagheri Zadeh}, title = {Wavelet Based Image Enlargement Technique}, booktitle = {{ICGS3}}, pages = {182--188}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_16}, doi = {10.1007/978-3-319-23276-8\_16}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AkbariZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AkhgarG15, author = {Babak Akhgar and Helen Gibson}, title = {Processing Social Media Data for Crisis Management in Athena}, booktitle = {{ICGS3}}, pages = {3--14}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_1}, doi = {10.1007/978-3-319-23276-8\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AkhgarG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Al-BaadaniY15, author = {Faris Al{-}Baadani and Sufian Yousef}, title = {A Comparison Study for Different Wireless Sensor Network Protocols}, booktitle = {{ICGS3}}, pages = {252--259}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_23}, doi = {10.1007/978-3-319-23276-8\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Al-BaadaniY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AlaviIM15, author = {Reza Alavi and Shareeful Islam and Haris Mouratidis}, title = {Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks}, booktitle = {{ICGS3}}, pages = {50--56}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_5}, doi = {10.1007/978-3-319-23276-8\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AlaviIM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AwangM15, author = {Nor Fatimah Bt. Awang and Azizah Abd Manaf}, title = {Automated Security Testing Framework for Detecting {SQL} Injection Vulnerability in Web Application}, booktitle = {{ICGS3}}, pages = {160--171}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_14}, doi = {10.1007/978-3-319-23276-8\_14}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AwangM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/BayerlA15, author = {Petra Saskia Bayerl and Babak Akhgar}, title = {Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence?}, booktitle = {{ICGS3}}, pages = {15--20}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_2}, doi = {10.1007/978-3-319-23276-8\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/BayerlA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/BottazziM15, author = {Giovanni Bottazzi and Gianluigi Me}, title = {A Survey on Financial Botnets Threat}, booktitle = {{ICGS3}}, pages = {172--181}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_15}, doi = {10.1007/978-3-319-23276-8\_15}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/BottazziM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ChandRK15, author = {Krishan Chand and Muthu Ramachandran and Ah{-}Lian Kor}, title = {Simulation of Cloud Data Security Processes and Performance}, booktitle = {{ICGS3}}, pages = {285--295}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_26}, doi = {10.1007/978-3-319-23276-8\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/ChandRK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/FakrudeenY15, author = {Mohammed Fakrudeen and Sufian Yousef}, title = {Securing the Blind User Visualization and Interaction in Touch Screen}, booktitle = {{ICGS3}}, pages = {335--347}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_30}, doi = {10.1007/978-3-319-23276-8\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/FakrudeenY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/GanjiMGP15, author = {Daniel Ganji and Haralambos Mouratidis and Saeed Malekshahi Gheytassi and Miltos Petridis}, title = {Conflicts Between Security and Privacy Measures in Software Requirements Engineering}, booktitle = {{ICGS3}}, pages = {323--334}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_29}, doi = {10.1007/978-3-319-23276-8\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/GanjiMGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/HaqJBMO15, author = {Anwar Ul Haq and Arshad Jamal and Usman Butt and Asim Majeed and Aykut Ozkaya}, title = {Understanding Privacy Concerns in Online Courses: {A} Case Study of Proctortrack}, booktitle = {{ICGS3}}, pages = {137--150}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_12}, doi = {10.1007/978-3-319-23276-8\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/HaqJBMO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/HessamiJN15, author = {Ali G. Hessami and Hamid Jahankhani and Mathews Z. Nkhoma}, title = {Responsive Cyber-Physical Risk Management {(RECYPHR)} - {A} Systems Framework}, booktitle = {{ICGS3}}, pages = {263--274}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_24}, doi = {10.1007/978-3-319-23276-8\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/HessamiJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/HosseinpourFJG15, author = {Ali Hosseinpour and Amin Hosseinian Far and Hamid Jahankhani and Alireza Ghadrdanizadi}, title = {Security and Feasibility of Power Line Communication System}, booktitle = {{ICGS3}}, pages = {244--251}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_22}, doi = {10.1007/978-3-319-23276-8\_22}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/HosseinpourFJG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/IsmailIM15, author = {Umar Mukhtar Ismail and Shareeful Islam and Haralambos Mouratidis}, title = {A Framework for Cloud Security Audit}, booktitle = {{ICGS3}}, pages = {296--309}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_27}, doi = {10.1007/978-3-319-23276-8\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/IsmailIM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/IzkiW15, author = {Fathiya Al Izki and George R. S. Weir}, title = {Gender Impact on Information Security in the Arab World}, booktitle = {{ICGS3}}, pages = {200--207}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_18}, doi = {10.1007/978-3-319-23276-8\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/IzkiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/JahankhaniAH15, author = {Hamid Jahankhani and Najib Altawell and Ali G. Hessami}, title = {Risk and Privacy Issues of Digital Oil Fields in the Cloud}, booktitle = {{ICGS3}}, pages = {275--284}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_25}, doi = {10.1007/978-3-319-23276-8\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/JahankhaniAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/LauraM15, author = {Luigi Laura and Gianluigi Me}, title = {Searching the Web for Illegal Content: The Anatomy of a Semantic Search Engine}, booktitle = {{ICGS3}}, pages = {113--122}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_10}, doi = {10.1007/978-3-319-23276-8\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/LauraM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MahmoodJO15, author = {Wakas Mahmood and Hamid Jahankhani and Aykut Ozkaya}, title = {Cloud Forensics Challenges Faced by Forensic Investigators}, booktitle = {{ICGS3}}, pages = {74--82}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_7}, doi = {10.1007/978-3-319-23276-8\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MahmoodJO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MakriL15, author = {Eleni{-}Laskarina Makri and Costas Lambrinoudakis}, title = {Towards a Common Security and Privacy Requirements Elicitation Methodology}, booktitle = {{ICGS3}}, pages = {151--159}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_13}, doi = {10.1007/978-3-319-23276-8\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MakriL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MontasariP15, author = {Reza Montasari and Pekka Peltola}, title = {Computer Forensic Analysis of Private Browsing Modes}, booktitle = {{ICGS3}}, pages = {96--109}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_9}, doi = {10.1007/978-3-319-23276-8\_9}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MontasariP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MontasariPE15, author = {Reza Montasari and Pekka Peltola and David Evans}, title = {Integrated Computer Forensics Investigation Process Model {(ICFIPM)} for Computer Crime Investigations}, booktitle = {{ICGS3}}, pages = {83--95}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_8}, doi = {10.1007/978-3-319-23276-8\_8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MontasariPE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MooreA15, author = {Chris Moore and Ameer Al{-}Nemrat}, title = {An Analysis of Honeypot Programs and the Attack Data Collected}, booktitle = {{ICGS3}}, pages = {228--238}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_20}, doi = {10.1007/978-3-319-23276-8\_20}, timestamp = {Wed, 22 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MooreA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/PournouriA15, author = {Sina Pournouri and Babak Akhgar}, title = {Improving Cyber Situational Awareness Through Data Mining and Predictive Analytic Techniques}, booktitle = {{ICGS3}}, pages = {21--34}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_3}, doi = {10.1007/978-3-319-23276-8\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/PournouriA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Ramachandran15, author = {Muthu Ramachandran}, title = {Software Security Requirements Engineering: State of the Art}, booktitle = {{ICGS3}}, pages = {313--322}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_28}, doi = {10.1007/978-3-319-23276-8\_28}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/Ramachandran15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Reynolds15, author = {Michael Reynolds}, title = {The Enemy Within: The Challenge for Business from Cyber-attack}, booktitle = {{ICGS3}}, pages = {123--136}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_11}, doi = {10.1007/978-3-319-23276-8\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Reynolds15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/RobinsonW15, author = {Gregor Robinson and George R. S. Weir}, title = {Understanding Android Security}, booktitle = {{ICGS3}}, pages = {189--199}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_17}, doi = {10.1007/978-3-319-23276-8\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/RobinsonW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/SantosMM15, author = {Henrique M. Dinis Santos and S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and Maria Jos{\'{e}} Magalh{\~{a}}es}, title = {An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms}, booktitle = {{ICGS3}}, pages = {239--243}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_21}, doi = {10.1007/978-3-319-23276-8\_21}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/SantosMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/TaalLS15, author = {Amie Taal and Jenny Le and James A. Sherer}, title = {A Consideration of eDiscovery Technologies for Internal Investigations}, booktitle = {{ICGS3}}, pages = {59--73}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_6}, doi = {10.1007/978-3-319-23276-8\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/TaalLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Tait15, author = {Bobby L. Tait}, title = {Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter}, booktitle = {{ICGS3}}, pages = {348--359}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_31}, doi = {10.1007/978-3-319-23276-8\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Tait15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Uotinen15, author = {Marko Uotinen}, title = {Detecting Deceit - Guessing or Assessing? Study on the Applicability of Veracity Assessment Methods in Human Intelligence}, booktitle = {{ICGS3}}, pages = {35--49}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_4}, doi = {10.1007/978-3-319-23276-8\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Uotinen15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Watson15, author = {David Lilburn Watson}, title = {Some Security Perils of Smart Living - {(A} Day in the Life of John {Q} Smith, a Citizen of Utopia, and His Twin Brother, Who Isn't)}, booktitle = {{ICGS3}}, pages = {211--227}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8\_19}, doi = {10.1007/978-3-319-23276-8\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Watson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icgs3/2015, editor = {Hamid Jahankhani and Alex Carlile and Babak Akhgar and Amie Taal and Ali G. Hessami and Amin Hosseinian Far}, title = {Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security - 10th International Conference, {ICGS3} 2015, London, UK, September 15-17, 2015. Proceedings}, series = {Communications in Computer and Information Science}, volume = {534}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23276-8}, doi = {10.1007/978-3-319-23276-8}, isbn = {978-3-319-23275-1}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icgs3/2011, editor = {Christos K. Georgiadis and Hamid Jahankhani and Elias Pimenidis and Rabih Bashroush and Ameer Al{-}Nemrat}, title = {Global Security, Safety and Sustainability {\&} e-Democracy - 7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy 2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {99}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33448-1}, doi = {10.1007/978-3-642-33448-1}, isbn = {978-3-642-33447-4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AlazabVWAA11, author = {Mamoun Alazab and Sitalakshmi Venkatraman and Paul A. Watters and Moutaz Alazab and Ammar Alazab}, title = {Cybercrime: The Case of Obfuscated Malware}, booktitle = {ICGS3/e-Democracy}, pages = {204--211}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_28}, doi = {10.1007/978-3-642-33448-1\_28}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/AlazabVWAA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AndroulidakisK11, author = {Iosif Androulidakis and Gorazd Kandus}, title = {{PINEPULSE:} {A} System to PINpoint and Educate Mobile Phone Users with Low Security}, booktitle = {ICGS3/e-Democracy}, pages = {62--66}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_9}, doi = {10.1007/978-3-642-33448-1\_9}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AndroulidakisK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AndroulidakisK11a, author = {Iosif Androulidakis and Gorazd Kandus}, title = {Feeling Secure vs. Being Secure the Mobile Phone User Case}, booktitle = {ICGS3/e-Democracy}, pages = {212--219}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_29}, doi = {10.1007/978-3-642-33448-1\_29}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AndroulidakisK11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/BorgesSMS11, author = {Daniela Borges and V{\'{\i}}tor J. S{\'{a}} and S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and Henrique M. Dinis Santos}, title = {Study of the Perception on the Biometric Technology by the Portuguese Citizens}, booktitle = {ICGS3/e-Democracy}, pages = {280--287}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_37}, doi = {10.1007/978-3-642-33448-1\_37}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/BorgesSMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/CerqueiraSM11, author = {Isabel Cerqueira and V{\'{\i}}tor J. S{\'{a}} and S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es}, title = {Study of the Perception on the Portuguese Citizen Card and Electronic Signature}, booktitle = {ICGS3/e-Democracy}, pages = {164--170}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_23}, doi = {10.1007/978-3-642-33448-1\_23}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/CerqueiraSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/DelliosAD11, author = {Kleanthis Dellios and Aristeidis Chronakis and Despoina Polemi}, title = {Transforming Vehicles into e-government 'Cloud Computing' Nodes}, booktitle = {ICGS3/e-Democracy}, pages = {1--8}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_1}, doi = {10.1007/978-3-642-33448-1\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/DelliosAD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/FawziBJ11, author = {Fawzi Fawzi and Rabih Bashroush and Hamid Jahankhani}, title = {GSi Compliant {RAS} for Public Private Sector Partnership}, booktitle = {ICGS3/e-Democracy}, pages = {67--71}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_10}, doi = {10.1007/978-3-642-33448-1\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/FawziBJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/FuK11, author = {Yulong Fu and Ousmane Kon{\'{e}}}, title = {A Robustness Testing Method for Network Security}, booktitle = {ICGS3/e-Democracy}, pages = {38--45}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_6}, doi = {10.1007/978-3-642-33448-1\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/FuK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/GerakosAH11, author = {Kostis Gerakos and Christos Anagnostopoulos and Stathes Hadjiefthymiades}, title = {Tuning the Epidemical Algorithm in Wireless Sensor Networks}, booktitle = {ICGS3/e-Democracy}, pages = {31--37}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_5}, doi = {10.1007/978-3-642-33448-1\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/GerakosAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/GranadilloMHD11, author = {Gustavo Gonzalez Granadillo and Yosra Ben Mustapha and Nabil Hachem and Herv{\'{e}} Debar}, title = {An Ontology-Based Model for {SIEM} Environments}, booktitle = {ICGS3/e-Democracy}, pages = {148--155}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_21}, doi = {10.1007/978-3-642-33448-1\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/GranadilloMHD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/HosseiniF11, author = {Azar Hosseini and Abolfazl Falahati}, title = {Optimum Hardware-Architecture for Modular Divider in {GF(2} m {)} with Chaos as Arbitrary Source Based on {ECC}}, booktitle = {ICGS3/e-Democracy}, pages = {245--252}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_33}, doi = {10.1007/978-3-642-33448-1\_33}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/HosseiniF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/IbrahimAJB11, author = {Nurdeen M. Ibrahim and Ameer Al{-}Nemrat and Hamid Jahankhani and Rabih Bashroush}, title = {Sufficiency of Windows Event Log as Evidence in Digital Forensics}, booktitle = {ICGS3/e-Democracy}, pages = {253--262}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_34}, doi = {10.1007/978-3-642-33448-1\_34}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/IbrahimAJB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/JahankhaniJK11, author = {Hossein Jahankhani and Thulasirajh Jayaraveendran and William Kapuku{-}Bwabw}, title = {Improved Awareness on Fake Websites and Detecting Techniques}, booktitle = {ICGS3/e-Democracy}, pages = {271--279}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_36}, doi = {10.1007/978-3-642-33448-1\_36}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/JahankhaniJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/JannatiF11, author = {Hoda Jannati and Abolfazl Falahati}, title = {Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for {RFID} Tags}, booktitle = {ICGS3/e-Democracy}, pages = {186--193}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_26}, doi = {10.1007/978-3-642-33448-1\_26}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/JannatiF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/KarayianniK11, author = {Stavroula Karayianni and Vasilios Katos}, title = {Practical Password Harvesting from Volatile Memory}, booktitle = {ICGS3/e-Democracy}, pages = {17--22}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_3}, doi = {10.1007/978-3-642-33448-1\_3}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/KarayianniK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/KardasiadouCL11, author = {Zoe Kardasiadou and Evi Chatziliasi and Konstantinos Limniotis}, title = {E-Government in Greece: Serving State's Economic Needs - Respecting the Fundamental Right to Data Protection}, booktitle = {ICGS3/e-Democracy}, pages = {179--185}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_25}, doi = {10.1007/978-3-642-33448-1\_25}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/KardasiadouCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/KaretsosNCS11, author = {Sotiris Karetsos and Maria Ntaliani and Constantina I. Costopoulou and Alexander B. Sideridis}, title = {Untangling Public Service Usage for Agribusinesses with Dialogic E-government}, booktitle = {ICGS3/e-Democracy}, pages = {120--125}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_17}, doi = {10.1007/978-3-642-33448-1\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/KaretsosNCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/KhalifaRS11, author = {Wael Khalifa and Kenneth Revett and Abdel{-}Badeeh M. Salem}, title = {In the Hacker's Eye: The Neurophysiology of a Computer Hacker}, booktitle = {ICGS3/e-Democracy}, pages = {112--119}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_16}, doi = {10.1007/978-3-642-33448-1\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/KhalifaRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/KoumaridisSG11, author = {Dimitrios Koumaridis and Emmanouil Stiakakis and Christos K. Georgiadis}, title = {Analyzing the Economic Impacts of Security Breaches Due to Outsourcing}, booktitle = {ICGS3/e-Democracy}, pages = {156--163}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_22}, doi = {10.1007/978-3-642-33448-1\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/KoumaridisSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/KrishnamurthyRJ11, author = {Ruben Krishnamurthy and Kenneth Revett and Hossein Jahankhani}, title = {On the Deployment of Artificial Immune Systems for Biometrics}, booktitle = {ICGS3/e-Democracy}, pages = {126--130}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_18}, doi = {10.1007/978-3-642-33448-1\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/KrishnamurthyRJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/LekkasZ11, author = {Dimitrios Lekkas and Dimitrios Zissis}, title = {Leveraging the e-passport {PKI} to Achieve Interoperable Security for e-government Cross Border Services}, booktitle = {ICGS3/e-Democracy}, pages = {96--103}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_14}, doi = {10.1007/978-3-642-33448-1\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/LekkasZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/LiagkouMSS11, author = {Vasiliki Liagkou and Effie Makri and Paul G. Spirakis and Yannis C. Stamatiou}, title = {A Probabilistic Key Agreement Scheme for Sensor Networks without Key Predistribution}, booktitle = {ICGS3/e-Democracy}, pages = {72--79}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_11}, doi = {10.1007/978-3-642-33448-1\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/LiagkouMSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MavridouP11, author = {Anastasia Mavridou and Mauricio Papa}, title = {A Situational Awareness Architecture for the Smart Grid}, booktitle = {ICGS3/e-Democracy}, pages = {229--236}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_31}, doi = {10.1007/978-3-642-33448-1\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MavridouP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MeloTC11, author = {Marcelo Damasceno de Melo and Jerffeson Teixeira and Gustavo Augusto Lima de Campos}, title = {A Prediction Model for Criminal Levels Specialized in Brazilian Cities}, booktitle = {ICGS3/e-Democracy}, pages = {131--138}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_19}, doi = {10.1007/978-3-642-33448-1\_19}, timestamp = {Wed, 26 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/MeloTC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/NtalianiCS11, author = {Maria Ntaliani and Constantina I. Costopoulou and Alexander B. Sideridis}, title = {Alleviating SMEs' Administrative Burdens: The Rural Inclusion Initiative}, booktitle = {ICGS3/e-Democracy}, pages = {237--244}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_32}, doi = {10.1007/978-3-642-33448-1\_32}, timestamp = {Mon, 30 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/NtalianiCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/NtouskasPP11, author = {Theodoros Ntouskas and Dimitrios Papanikas and Nineta Polemi}, title = {A Collaborative System Offering Security Management Services for SMEs/mEs}, booktitle = {ICGS3/e-Democracy}, pages = {220--228}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_30}, doi = {10.1007/978-3-642-33448-1\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/NtouskasPP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/OgilvieW11, author = {Russell Ogilvie and George R. S. Weir}, title = {Genre-Based Information Hiding}, booktitle = {ICGS3/e-Democracy}, pages = {104--111}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_15}, doi = {10.1007/978-3-642-33448-1\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/OgilvieW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/PrietoDRRA11, author = {Elsa Prieto and Rodrigo Diaz and Luigi Romano and Roland Rieke and Mohammed Achemlal}, title = {{MASSIF:} {A} Promising Solution to Enhance Olympic Games {IT} Security}, booktitle = {ICGS3/e-Democracy}, pages = {139--147}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_20}, doi = {10.1007/978-3-642-33448-1\_20}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/PrietoDRRA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ProvatidisGM11, author = {Apostolos K. Provatidis and Christos K. Georgiadis and Ioannis Mavridis}, title = {Towards Colored Petri Net Modeling of Expanded {C-TMAC}}, booktitle = {ICGS3/e-Democracy}, pages = {88--95}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_13}, doi = {10.1007/978-3-642-33448-1\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/ProvatidisGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/SavvasBPS11, author = {Ioannis Savvas and Nick Bassiliades and Elias Pimenidis and Alexander B. Sideridis}, title = {Paving the Way for a Transformational Public Administration}, booktitle = {ICGS3/e-Democracy}, pages = {194--203}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_27}, doi = {10.1007/978-3-642-33448-1\_27}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/SavvasBPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/SideridisPPK11, author = {Alexander B. Sideridis and Elias Pimenidis and Loucas Protopappas and Maria Koukouli}, title = {An Evaluation of the Initiatives and the Progress Made on e-government Services in the {EU}}, booktitle = {ICGS3/e-Democracy}, pages = {263--270}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_35}, doi = {10.1007/978-3-642-33448-1\_35}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/SideridisPPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Tait11, author = {Bobby L. Tait}, title = {Applied Phon Curve Algorithm for Improved Voice Recognition and Authentication}, booktitle = {ICGS3/e-Democracy}, pages = {23--30}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_4}, doi = {10.1007/978-3-642-33448-1\_4}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Tait11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/TheoharidouKG11, author = {Marianthi Theoharidou and Miltiadis Kandias and Dimitris Gritzalis}, title = {Securing Transportation-Critical Infrastructures: Trends and Perspectives}, booktitle = {ICGS3/e-Democracy}, pages = {171--178}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_24}, doi = {10.1007/978-3-642-33448-1\_24}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/TheoharidouKG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/TsiafoulisZP11, author = {Stergios G. Tsiafoulis and Vasilios Zorkadis and Elias Pimenidis}, title = {Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining}, booktitle = {ICGS3/e-Democracy}, pages = {9--16}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_2}, doi = {10.1007/978-3-642-33448-1\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/TsiafoulisZP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/TsiakisKG11, author = {Theodosios Tsiakis and Panagiotis Katsaros and Dimitris Gritzalis}, title = {Economic Evaluation of Interactive Audio Media for Securing Internet Services}, booktitle = {ICGS3/e-Democracy}, pages = {46--53}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_7}, doi = {10.1007/978-3-642-33448-1\_7}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/TsiakisKG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/VlachosIP11, author = {Vasileios Vlachos and Christos Ilioudis and Alexandros Papanikolaou}, title = {On the Evolution of Malware Species}, booktitle = {ICGS3/e-Democracy}, pages = {54--61}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_8}, doi = {10.1007/978-3-642-33448-1\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/VlachosIP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ZissisLK11, author = {Dimitrios Zissis and Dimitrios Lekkas and Panayiotis Koutsabasis}, title = {Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital Certificates}, booktitle = {ICGS3/e-Democracy}, pages = {80--87}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-33448-1\_12}, doi = {10.1007/978-3-642-33448-1\_12}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/ZissisLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Al-NemratJP10, author = {Ameer Al{-}Nemrat and Hamid Jahankhani and David S. Preston}, title = {Cybercrime Victimisations/Criminalisation and Punishment}, booktitle = {{ICGS3}}, pages = {55--62}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_7}, doi = {10.1007/978-3-642-15717-2\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Al-NemratJP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AliH10, author = {Hatamirad Ali and Hasan Mehrjerdi}, title = {Deployment of {ERP} Systems at Automotive Industries, Security Inspection (Case Study: {IRAN} {KHODRO} Automotive Company)}, booktitle = {{ICGS3}}, pages = {160--169}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_18}, doi = {10.1007/978-3-642-15717-2\_18}, timestamp = {Tue, 18 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/AliH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/AraboSM10, author = {Abdullahi Arabo and Qi Shi and Madjid Merabti}, title = {Dynamic Device Configuration in Ubiquitous Environments}, booktitle = {{ICGS3}}, pages = {263--273}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_28}, doi = {10.1007/978-3-642-15717-2\_28}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/AraboSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/CaldeiraMS10, author = {Filipe Caldeira and Edmundo Monteiro and Paulo Sim{\~{o}}es}, title = {Trust and Reputation Management for Critical Infrastructure Protection}, booktitle = {{ICGS3}}, pages = {39--47}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_5}, doi = {10.1007/978-3-642-15717-2\_5}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/CaldeiraMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/FalahatiA10, author = {Abolfazl Falahati and Mahdi Azarafrooz}, title = {Mitigation of Control Channel Jamming via Combinatorial Key Distribution}, booktitle = {{ICGS3}}, pages = {274--281}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_29}, doi = {10.1007/978-3-642-15717-2\_29}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/FalahatiA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/FarPJW10, author = {Amin Hosseinian Far and Elias Pimenidis and Hamid Jahankhani and D. C. Wijeyesekera}, title = {A Review on Sustainability Models}, booktitle = {{ICGS3}}, pages = {216--222}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_23}, doi = {10.1007/978-3-642-15717-2\_23}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/FarPJW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/GeorgiadisKP10, author = {Christos K. Georgiadis and Ioannis Kokkinidis and Elias Pimenidis}, title = {A Coloured Petri Net Analysis of the Transaction Internet Protocol}, booktitle = {{ICGS3}}, pages = {238--249}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_26}, doi = {10.1007/978-3-642-15717-2\_26}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/GeorgiadisKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Gonilho-PereiraZFLJA10, author = {Cristiana Gonilho{-}Pereira and Emilija Zdraveva and Raul Fangueiro and Senentxu Lanceros{-}Mendez and Said Jalali and M{\'{a}}rio de Ara{\'{u}}jo}, title = {Self-monitoring Composite Rods for Sustainable Construction}, booktitle = {{ICGS3}}, pages = {193--201}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_21}, doi = {10.1007/978-3-642-15717-2\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Gonilho-PereiraZFLJA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/HessamiK10, author = {Ali G. Hessami and Nicos Karcanias}, title = {Systems Assurance, Complexity and Emergence: The Need for a Systems Based Approach}, booktitle = {{ICGS3}}, pages = {202--215}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_22}, doi = {10.1007/978-3-642-15717-2\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/HessamiK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/JahankhaniM10, author = {Hossein Jahankhani and Maktuba Mohid}, title = {Analysis of Fingerprint Image to Verify a Person}, booktitle = {{ICGS3}}, pages = {104--119}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_13}, doi = {10.1007/978-3-642-15717-2\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/JahankhaniM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/JannatiF10, author = {Hoda Jannati and Abolfazl Falahati}, title = {A Proxy Signature Scheme Based on Coding Theory}, booktitle = {{ICGS3}}, pages = {282--290}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_30}, doi = {10.1007/978-3-642-15717-2\_30}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/JannatiF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/LoureiroLA10, author = {Isabel F. Loureiro and Celina P. Le{\~{a}}o and Pedro M. Arezes}, title = {Management of the Benefits on the Client's Involvement on Ergonomic Analysis}, booktitle = {{ICGS3}}, pages = {1--8}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_1}, doi = {10.1007/978-3-642-15717-2\_1}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/LoureiroLA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MartinsM10, author = {Tiago Martins and S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es}, title = {Baby-Crying Acceptance}, booktitle = {{ICGS3}}, pages = {63--70}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_8}, doi = {10.1007/978-3-642-15717-2\_8}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MartinsM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MartinsS10, author = {Jos{\'{e}} Martins and Henrique dos Santos}, title = {Methods of Organizational Information Security - {(A} Literature Review)}, booktitle = {{ICGS3}}, pages = {120--130}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_14}, doi = {10.1007/978-3-642-15717-2\_14}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MartinsS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/MorranW10, author = {Michael Morran and George R. S. Weir}, title = {An Approach to Textual Steganography}, booktitle = {{ICGS3}}, pages = {48--54}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_6}, doi = {10.1007/978-3-642-15717-2\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/MorranW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Mourao10, author = {Paulo Mour{\~{a}}o}, title = {"Fiscal Illusion Causes Fiscal Delusion - Please Be Careful!"}, booktitle = {{ICGS3}}, pages = {232--237}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_25}, doi = {10.1007/978-3-642-15717-2\_25}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Mourao10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/NavareG10, author = {Jyoti Navare and Orhan Gemikonakli}, title = {Governance and Risk Management of Network and Information Security: The Role of Public Private Partnerships in Managing the Existing and Emerging Risks}, booktitle = {{ICGS3}}, pages = {170--177}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_19}, doi = {10.1007/978-3-642-15717-2\_19}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icgs3/NavareG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Peikari10, author = {Hamid Reza Peikari}, title = {A Study on the Interrelations between the Security-Related Antecedents of Customers' Online Trust}, booktitle = {{ICGS3}}, pages = {139--148}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_16}, doi = {10.1007/978-3-642-15717-2\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Peikari10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Peikari10a, author = {Hamid Reza Peikari}, title = {Does Nationality Matter in the {B2C} Environment? Results from a Two Nation Study}, booktitle = {{ICGS3}}, pages = {149--159}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_17}, doi = {10.1007/978-3-642-15717-2\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Peikari10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Peikari10b, author = {Hamid Reza Peikari}, title = {The Influence of Security Statement, Technical Protection, and Privacy on Satisfaction and Loyalty; {A} Structural Equation Modeling}, booktitle = {{ICGS3}}, pages = {223--231}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_24}, doi = {10.1007/978-3-642-15717-2\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Peikari10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/PereiraS10, author = {Teresa Susana Mendes Pereira and Henrique M. Dinis Santos}, title = {A Security Audit Framework to Manage Information System Security}, booktitle = {{ICGS3}}, pages = {9--18}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_2}, doi = {10.1007/978-3-642-15717-2\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/PereiraS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/RashedS10, author = {Abdullah Rashed and Henrique M. Dinis Santos}, title = {Multimodal Biometrics and Multilayered {IDM} for Secure Authentication}, booktitle = {{ICGS3}}, pages = {87--95}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_11}, doi = {10.1007/978-3-642-15717-2\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/RashedS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/RashedS10a, author = {Abdullah Rashed and Henrique M. Dinis Santos}, title = {{OTM} Machine Acceptance: In the Arab Culture}, booktitle = {{ICGS3}}, pages = {131--138}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_15}, doi = {10.1007/978-3-642-15717-2\_15}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/RashedS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/RevettM10, author = {Kenneth Revett and S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es}, title = {Cognitive Biometrics: Challenges for the Future}, booktitle = {{ICGS3}}, pages = {79--86}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_10}, doi = {10.1007/978-3-642-15717-2\_10}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/RevettM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/SaarelainenJ10, author = {Tapio Saarelainen and Jorma Jormakka}, title = {Collaboration and Command Tools for Crises Management}, booktitle = {{ICGS3}}, pages = {28--38}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_4}, doi = {10.1007/978-3-642-15717-2\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/SaarelainenJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/SanayeiS10, author = {Ali Sanayei and Reza Shafe'ei}, title = {The Effect of Non-technical Factors in {B2C} E-Commerce - {(A} Case Study in Iran)}, booktitle = {{ICGS3}}, pages = {178--192}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_20}, doi = {10.1007/978-3-642-15717-2\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/SanayeiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/ShayanAQ10, author = {Ali Shayan and Behnam Abdi and Malihe Qeisari}, title = {Identification of the Required Security Practices during e-Government Maturity}, booktitle = {{ICGS3}}, pages = {250--262}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_27}, doi = {10.1007/978-3-642-15717-2\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/ShayanAQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/SuWZX10, author = {Shibin Su and Heng Wang and Hua Zhang and Wei Xiong}, title = {Design of Discrete Variable Structure Controller Based on Variable Boundary Layer}, booktitle = {{ICGS3}}, pages = {71--78}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_9}, doi = {10.1007/978-3-642-15717-2\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/SuWZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/Tait10, author = {Bobby L. Tait}, title = {Secure Biometric Multi-Logon System Based on Current Authentication Technologies}, booktitle = {{ICGS3}}, pages = {96--103}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_12}, doi = {10.1007/978-3-642-15717-2\_12}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/Tait10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/TavallaeiF10, author = {Saeed Ebadi Tavallaei and Abolfazl Falahati}, title = {Partially Key Distribution with Public Key Cryptosystem Based on Error Control Codes}, booktitle = {{ICGS3}}, pages = {291--299}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_31}, doi = {10.1007/978-3-642-15717-2\_31}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/TavallaeiF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icgs3/TolnaiS10, author = {Annette Tolnai and Sebastiaan H. von Solms}, title = {The Cloud's Core Virtual Infrastructure Security}, booktitle = {{ICGS3}}, pages = {19--27}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2\_3}, doi = {10.1007/978-3-642-15717-2\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/TolnaiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icgs3/2010, editor = {S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and Hamid Jahankhani and Ali G. Hessami}, title = {Global Security, Safety, and Sustainability - 6th International Conference, {ICGS3} 2010, Braga, Portugal, September 1-3, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {92}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15717-2}, doi = {10.1007/978-3-642-15717-2}, isbn = {978-3-642-15716-5}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icgs3/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.