Search dblp for Publications

export results for "stream:conf/icgs3:"

 download as .bib file

@inproceedings{DBLP:conf/icgs3/AbdullahJ19,
  author       = {Tariq Abdullah and
                  Andrew Jones},
  title        = {eHealth: Challenges Far Integrating BlockChain within Healthcare},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688184},
  doi          = {10.1109/ICGS3.2019.8688184},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AbdullahJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Abreu19,
  author       = {Sergio De Abreu},
  title        = {A Feasibility Study on Machine Learning Techniques for {APT} Detection
                  and Protection in VANETs},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688031},
  doi          = {10.1109/ICGS3.2019.8688031},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Abreu19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Adedotun-Ogundeji19,
  author       = {Grace Adedotun{-}Ogundeji and
                  Hamid Jahankhani},
  title        = {Preparing 11- 17 Years Old Girls to Become Cyber Security Experts
                  in the Future},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688241},
  doi          = {10.1109/ICGS3.2019.8688241},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Adedotun-Ogundeji19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Ahmadi-Assalemi19,
  author       = {Gabriela Ahmadi{-}Assalemi and
                  Haider M. Al{-}Khateeb and
                  Gregory Epiphaniou and
                  Jon Cosson and
                  Hamid Jahankhani and
                  Prashant Pillai},
  title        = {Federated Blockchain-Based Tracking and Liability Attribution Framework
                  for Employees and Cyber-Physical Objects in a Smart Workplace},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688297},
  doi          = {10.1109/ICGS3.2019.8688297},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Ahmadi-Assalemi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AhmedKLB19,
  author       = {Farah Ahmed and
                  Fouad Khelifi and
                  Ashref Lawgaly and
                  Ahmed Bouridane},
  title        = {Comparative Analysis of a Deep Convolutional Neural Network for Source
                  Camera Identification},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688260},
  doi          = {10.1109/ICGS3.2019.8688260},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AhmedKLB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AlBlooshiF19,
  author       = {Yousuf AlBlooshi and
                  Amin Hosseinian Far},
  title        = {A Novel Framework for Identification of Critical Business Processes},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688269},
  doi          = {10.1109/ICGS3.2019.8688269},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AlBlooshiF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AlbladiW19,
  author       = {Samar Muslah Albladi and
                  George R. S. Weir},
  title        = {A Conceptual Model to Predict Social Engineering Victims},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688352},
  doi          = {10.1109/ICGS3.2019.8688352},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AlbladiW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AlkhwaldiKQ19,
  author       = {Abeer F. Alkhwaldi and
                  Mumtaz M. Kamala and
                  Rami Qahwaji},
  title        = {Security Perceptions in Cloud-Based e-Govemment Services},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688252},
  doi          = {10.1109/ICGS3.2019.8688252},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/AlkhwaldiKQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/BeaversFM19,
  author       = {Jake L. Beavers and
                  Michael Faulks and
                  Jims Marchang},
  title        = {Hacking {NHS} Pacemakers: {A} Feasibility Study},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688214},
  doi          = {10.1109/ICGS3.2019.8688214},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/BeaversFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Bishop19,
  author       = {Sherese Bishop},
  title        = {The Internet of Things: Implications for Consumer Privacy {\&}
                  Security},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688024},
  doi          = {10.1109/ICGS3.2019.8688024},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Bishop19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/BrendanM19,
  author       = {Ahuokpeme Chibueze Brendan and
                  John McCarthy},
  title        = {Taxonomy of Threat Categorization and Threat Intelligence Platform},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688157},
  doi          = {10.1109/ICGS3.2019.8688157},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/BrendanM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ButtALJJK19,
  author       = {Usman Javed Butt and
                  Maysam Abbod and
                  Anzor Lors and
                  Hamid Jahankhani and
                  Arshad Jamal and
                  Arvind Kumar},
  title        = {Ransomware Threat and its Impact on {SCADA}},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688327},
  doi          = {10.1109/ICGS3.2019.8688327},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/ButtALJJK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/CastroSSM19,
  author       = {Nuno Castro and
                  Henrique M. Dinis Santos and
                  V{\'{\i}}tor J. S{\'{a}} and
                  Maria Jos{\'{e}} Magalh{\~{a}}es},
  title        = {Study of the Means of Online Payment in the Portuguese Population},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688021},
  doi          = {10.1109/ICGS3.2019.8688021},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/CastroSSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ChelvachandranJ19,
  author       = {Nishan Chelvachandran and
                  Hamid Jahankhani},
  title        = {Data Mining Metrics to Identify and Evaluate Potential Radicalisation
                  Through Social Media},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688189},
  doi          = {10.1109/ICGS3.2019.8688189},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/ChelvachandranJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ChelvachandranJ19a,
  author       = {Nishan Chelvachandran and
                  Hamid Jahankhani},
  title        = {A Study on Keyword Analytics as a Precursor to Machine Learning to
                  Evaluate Radicalisation on Social Media},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688362},
  doi          = {10.1109/ICGS3.2019.8688362},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/ChelvachandranJ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/CollinsJ19,
  author       = {Anita Collins and
                  Hamid Jahankhani},
  title        = {Blockchain as a Tool for Financial Transparency in Development Aid},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688033},
  doi          = {10.1109/ICGS3.2019.8688033},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/CollinsJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/CopelandM19,
  author       = {George Copeland and
                  John McCarthy},
  title        = {Practical Cybersecurity for Digital Trains},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688036},
  doi          = {10.1109/ICGS3.2019.8688036},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/CopelandM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/CossonA19,
  author       = {Jon Cosson and
                  Haider Alhateeb},
  title        = {An Approach to Identify Risk Based Human Behaviour Profiling within
                  an Office Environment},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688222},
  doi          = {10.1109/ICGS3.2019.8688222},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/CossonA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/DahalK19,
  author       = {Binay Dahal and
                  Yoohwan Kim},
  title        = {AutoEncoded Domains with Mean Activation for {DGA} Botnet Detection},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688037},
  doi          = {10.1109/ICGS3.2019.8688037},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/DahalK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/DoM19,
  author       = {Anh Do and
                  John McCarthy},
  title        = {Categorization of Threats and their Impacts on Critical National Infrastructure
                  Systems},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688015},
  doi          = {10.1109/ICGS3.2019.8688015},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/DoM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/DurouAABE19,
  author       = {Amal Durou and
                  Somaya Al{-}M{\'{a}}adeed and
                  Ibrahim A. Aref and
                  Ahmed Bouridane and
                  Mosa Elbendak},
  title        = {A Comparative Study of Machine Learning Approaches for Handwriter
                  Identification},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688032},
  doi          = {10.1109/ICGS3.2019.8688032},
  timestamp    = {Tue, 16 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/DurouAABE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ForouzanJ19,
  author       = {Homan Forouzan and
                  Hamid Jahankhani},
  title        = {An Examination into the Level of Training, Education and Awareness
                  Among Officers in Tackling Cybercrime within the Metropolitan Police
                  Service},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688360},
  doi          = {10.1109/ICGS3.2019.8688360},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/ForouzanJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/GoldieJ19,
  author       = {John Goldie and
                  Hamid Jahankhani},
  title        = {Ethical Considerations of People with Autistic Spectrum Disorder},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688319},
  doi          = {10.1109/ICGS3.2019.8688319},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/GoldieJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/HaddonA19,
  author       = {David A. E. Haddon and
                  Haider M. Al{-}Khateeb},
  title        = {Investigating Data Exfiltration in {DNS} Over {HTTPS} Queries},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688016},
  doi          = {10.1109/ICGS3.2019.8688016},
  timestamp    = {Tue, 10 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/HaddonA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/HazzaaYAS19,
  author       = {Firas Hazzaa and
                  Sufian Yousef and
                  Nada H. Ali and
                  Erika Sanchez},
  title        = {The Effect of Nodes Density on Real Time Traffic in Mobile Ad Hoc
                  Network},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688314},
  doi          = {10.1109/ICGS3.2019.8688314},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/HazzaaYAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/HonnurvaliGGUKN19,
  author       = {Mohamed Shaik Honnurvali and
                  Naren Gupta and
                  Keng Goh and
                  Tariq Umar and
                  Adnan Kabbani and
                  Needa Nazecma},
  title        = {Can Future Smart Cities Powered by 100{\%} Renewables and Made Cyber
                  Secured-A Analytical Approach},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688324},
  doi          = {10.1109/ICGS3.2019.8688324},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/HonnurvaliGGUKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/IbarraBDJJ19,
  author       = {Jaime Ibarra Jimenez and
                  Usman Javed Butt and
                  Anh Do and
                  Hamid Jahankhani and
                  Arshad Jamal},
  title        = {Ransomware Impact to {SCADA} Systems and its Scope to Critical Infrastructure},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688299},
  doi          = {10.1109/ICGS3.2019.8688299},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/IbarraBDJJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/JahankhaniC19,
  author       = {William Jahankhani and
                  Liang Chen},
  title        = {Email Verification Fake or Genuine?},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688231},
  doi          = {10.1109/ICGS3.2019.8688231},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/JahankhaniC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/JimenezJ19,
  author       = {Jaime Ibarra Jimenez and
                  Hamid Jahankhani},
  title        = {"Privacy by Design" Governance Framework to Achieve Privacy Assurance
                  of Personal Health Information {(PHI)} Processed by IoT-based Telemedicine
                  Devices and Applications Within Healthcare Services},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688029},
  doi          = {10.1109/ICGS3.2019.8688029},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/JimenezJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Kagita19,
  author       = {Mohan Krishna Kagita},
  title        = {Security and Privacy Issues for Business Intelligence in lOT},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688023},
  doi          = {10.1109/ICGS3.2019.8688023},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Kagita19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/KendzierskyjJ19,
  author       = {Stefan Kendzierskyj and
                  Hamid Jahankhani},
  title        = {The Role of Blockchain in Supporting Critical National Infrastructure},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688026},
  doi          = {10.1109/ICGS3.2019.8688026},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/KendzierskyjJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/KendzierskyjJ19a,
  author       = {Stefan Kendzierskyj and
                  Hamid Jahankhani},
  title        = {Blockchain as an Efficient and Alternative Mechanism for Strengthening
                  and Securing the Privacy of Healthcare Patient and Clinical Research
                  Data},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688148},
  doi          = {10.1109/ICGS3.2019.8688148},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/KendzierskyjJ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Manya19,
  author       = {Bharat Manya},
  title        = {{BRT} - (Blockchain Relevance Theory): {A} Theoretical Framework for
                  Blockchain {\&} {DLT} in Cyber Security Using CISv7 Controls},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688158},
  doi          = {10.1109/ICGS3.2019.8688158},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Manya19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MitchellHS19,
  author       = {Ian Mitchell and
                  Sukhvinder Hara and
                  M. Sheriff},
  title        = {dAppER: Decentralised Application for Examination Review},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688143},
  doi          = {10.1109/ICGS3.2019.8688143},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MitchellHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MontasariH19,
  author       = {Reza Montasari and
                  Richard Hill},
  title        = {Next-Generation Digital Forensics: Challenges and Future Paradigms},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688020},
  doi          = {10.1109/ICGS3.2019.8688020},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MontasariH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MustafaP19,
  author       = {Uzma Mustafa and
                  Nada Philip},
  title        = {Group-Based Key Exchange for Medical IoT Device-to-Device Communication
                  {(D2D)} Combining Secret Sharing and Physical Layer Key Exchange},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688022},
  doi          = {10.1109/ICGS3.2019.8688022},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MustafaP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MustafaPP19,
  author       = {Uzma Mustafa and
                  Eckhard Pfl{\"{u}}gel and
                  Nada Philip},
  title        = {A Novel Privacy Framework for Secure M-Health Applications: The Case
                  of the {GDPR}},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688019},
  doi          = {10.1109/ICGS3.2019.8688019},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MustafaPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/NkomoB19,
  author       = {Danisa Nkomo and
                  Ray Brown},
  title        = {Hybrid Cybersecurity Framework for the Internet of Medical Things
                  {(IOMT)}},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688030},
  doi          = {10.1109/ICGS3.2019.8688030},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/NkomoB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/OHareML19,
  author       = {Jamie O'Hare and
                  Rich Macfarlane and
                  Owen Lo},
  title        = {Identifying Vulnerabilities Using Internet-Wide Scanning Data},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688018},
  doi          = {10.1109/ICGS3.2019.8688018},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/OHareML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/OdellJ19,
  author       = {Liam Odell and
                  Hamid Jahankhani},
  title        = {{AI:} The Cyber-Physical Project Manager and their Digital Twin},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688144},
  doi          = {10.1109/ICGS3.2019.8688144},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/OdellJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/PimenidisP19,
  author       = {Elias Pimenidis and
                  Nikolaos Polatidis},
  title        = {Secure Social Media Spaces for Communities of Vulnerable People},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688027},
  doi          = {10.1109/ICGS3.2019.8688027},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/PimenidisP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/PournouriZA19,
  author       = {Sina Pournouri and
                  Shahrzad Zargari and
                  Babak Akhgar},
  title        = {An Investigation of Using Classification Techniques in Prediction
                  of Type of Targets in Cyber Attacks},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688266},
  doi          = {10.1109/ICGS3.2019.8688266},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/PournouriZA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/RamosM19,
  author       = {Yvan Da Silva Ramos and
                  John McCarthy},
  title        = {Management Versus Technical Perspectives on Threats},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688338},
  doi          = {10.1109/ICGS3.2019.8688338},
  timestamp    = {Thu, 29 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/RamosM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Ravindran19,
  author       = {Rahul Ravindran},
  title        = {Circle of Trust: {A} High Volume, Energy Efficient, Stake Blind and
                  High Attack Tolerant Blockchain Consensus Protocol},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688279},
  doi          = {10.1109/ICGS3.2019.8688279},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Ravindran19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Riaz19,
  author       = {Jabran Riaz},
  title        = {Retail Industry Gift Card Hacking Technique Challenges},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688017},
  doi          = {10.1109/ICGS3.2019.8688017},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Riaz19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Ruiz19,
  author       = {Rodrigo Ruiz},
  title        = {A Study of the {UK} Undergraduate Computer Science Curriculum: {A}
                  Vision of Cybersecurity},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688137},
  doi          = {10.1109/ICGS3.2019.8688137},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Ruiz19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Sampana19,
  author       = {Stephen S. Sampana},
  title        = {FoRCE (Forensic Recovery of Cloud Evidence): {A} Digital Cloud Forensics
                  Framework},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688215},
  doi          = {10.1109/ICGS3.2019.8688215},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Sampana19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Semeraro19,
  author       = {Jacopo Semeraro},
  title        = {An Investigatory Project on the Anonymity of Blockchain and Cryptocurrencies},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688035},
  doi          = {10.1109/ICGS3.2019.8688035},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Semeraro19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ShadAB19,
  author       = {Asifa Shad and
                  Tariq Abdullah and
                  Usman Butt},
  title        = {Web Accessibility Adoption Framework {(WAAF)} for Businesses and Web
                  Professionals},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688028},
  doi          = {10.1109/ICGS3.2019.8688028},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/ShadAB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ShnishahM19,
  author       = {Halima Abdul Halime Shnishah and
                  David Mulvaney},
  title        = {Encryption of Text File Using a User Controlled Automatically-Generated
                  Key},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688258},
  doi          = {10.1109/ICGS3.2019.8688258},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/ShnishahM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Tait19,
  author       = {Bobby L. Tait},
  title        = {Behavioural Biometrics Authentication Tested Using EyeWriter Technology},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688257},
  doi          = {10.1109/ICGS3.2019.8688257},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Tait19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/TunnicliffeOP19,
  author       = {Martin J. Tunnicliffe and
                  Omego Obinna and
                  Eckhard Pfl{\"{u}}gel},
  title        = {Hidden Protocol Strengthening with Random Sentences as Cryptographic
                  Nonces},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688025},
  doi          = {10.1109/ICGS3.2019.8688025},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/TunnicliffeOP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Welsh19,
  author       = {Thomas Welsh},
  title        = {A Cybersecurity Threat Model for the Detection of a Ransomware Cyberweapon
                  in a Networked Computing Environment},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688353},
  doi          = {10.1109/ICGS3.2019.8688353},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Welsh19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/WoensdregtAEJ19,
  author       = {Joseph Waldu Woensdregt and
                  Haider M. Al{-}Khateeb and
                  Gregory Epiphaniou and
                  Hamid Jahankhani},
  title        = {AdPExT: Designing a Tool to Assess Information Gleaned from Browsers
                  by Online Advertising Platforms},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688328},
  doi          = {10.1109/ICGS3.2019.8688328},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/WoensdregtAEJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Zernik19,
  author       = {Joseph Zernik},
  title        = {Cybersecurity and Law in Israel - {A} Case Study},
  booktitle    = {{ICGS3}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICGS3.2019.8688318},
  doi          = {10.1109/ICGS3.2019.8688318},
  timestamp    = {Tue, 23 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Zernik19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icgs3/2019,
  title        = {12th {IEEE} International Conference on Global Security, Safety and
                  Sustainability, {ICGS3} 2019, London, UK, January 16-18, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8672787/proceeding},
  isbn         = {978-1-5386-7001-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AkbariZ15,
  author       = {Akbar Sheikh Akbari and
                  Pooneh Bagheri Zadeh},
  title        = {Wavelet Based Image Enlargement Technique},
  booktitle    = {{ICGS3}},
  pages        = {182--188},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_16},
  doi          = {10.1007/978-3-319-23276-8\_16},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AkbariZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AkhgarG15,
  author       = {Babak Akhgar and
                  Helen Gibson},
  title        = {Processing Social Media Data for Crisis Management in Athena},
  booktitle    = {{ICGS3}},
  pages        = {3--14},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_1},
  doi          = {10.1007/978-3-319-23276-8\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AkhgarG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Al-BaadaniY15,
  author       = {Faris Al{-}Baadani and
                  Sufian Yousef},
  title        = {A Comparison Study for Different Wireless Sensor Network Protocols},
  booktitle    = {{ICGS3}},
  pages        = {252--259},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_23},
  doi          = {10.1007/978-3-319-23276-8\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Al-BaadaniY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AlaviIM15,
  author       = {Reza Alavi and
                  Shareeful Islam and
                  Haris Mouratidis},
  title        = {Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud
                  Environment: Threats and Risks},
  booktitle    = {{ICGS3}},
  pages        = {50--56},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_5},
  doi          = {10.1007/978-3-319-23276-8\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AlaviIM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AwangM15,
  author       = {Nor Fatimah Bt. Awang and
                  Azizah Abd Manaf},
  title        = {Automated Security Testing Framework for Detecting {SQL} Injection
                  Vulnerability in Web Application},
  booktitle    = {{ICGS3}},
  pages        = {160--171},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_14},
  doi          = {10.1007/978-3-319-23276-8\_14},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AwangM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/BayerlA15,
  author       = {Petra Saskia Bayerl and
                  Babak Akhgar},
  title        = {Online Surveillance Awareness as Impact on Data Validity for Open-Source
                  Intelligence?},
  booktitle    = {{ICGS3}},
  pages        = {15--20},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_2},
  doi          = {10.1007/978-3-319-23276-8\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/BayerlA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/BottazziM15,
  author       = {Giovanni Bottazzi and
                  Gianluigi Me},
  title        = {A Survey on Financial Botnets Threat},
  booktitle    = {{ICGS3}},
  pages        = {172--181},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_15},
  doi          = {10.1007/978-3-319-23276-8\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/BottazziM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ChandRK15,
  author       = {Krishan Chand and
                  Muthu Ramachandran and
                  Ah{-}Lian Kor},
  title        = {Simulation of Cloud Data Security Processes and Performance},
  booktitle    = {{ICGS3}},
  pages        = {285--295},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_26},
  doi          = {10.1007/978-3-319-23276-8\_26},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/ChandRK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/FakrudeenY15,
  author       = {Mohammed Fakrudeen and
                  Sufian Yousef},
  title        = {Securing the Blind User Visualization and Interaction in Touch Screen},
  booktitle    = {{ICGS3}},
  pages        = {335--347},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_30},
  doi          = {10.1007/978-3-319-23276-8\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/FakrudeenY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/GanjiMGP15,
  author       = {Daniel Ganji and
                  Haralambos Mouratidis and
                  Saeed Malekshahi Gheytassi and
                  Miltos Petridis},
  title        = {Conflicts Between Security and Privacy Measures in Software Requirements
                  Engineering},
  booktitle    = {{ICGS3}},
  pages        = {323--334},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_29},
  doi          = {10.1007/978-3-319-23276-8\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/GanjiMGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/HaqJBMO15,
  author       = {Anwar Ul Haq and
                  Arshad Jamal and
                  Usman Butt and
                  Asim Majeed and
                  Aykut Ozkaya},
  title        = {Understanding Privacy Concerns in Online Courses: {A} Case Study of
                  Proctortrack},
  booktitle    = {{ICGS3}},
  pages        = {137--150},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_12},
  doi          = {10.1007/978-3-319-23276-8\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/HaqJBMO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/HessamiJN15,
  author       = {Ali G. Hessami and
                  Hamid Jahankhani and
                  Mathews Z. Nkhoma},
  title        = {Responsive Cyber-Physical Risk Management {(RECYPHR)} - {A} Systems
                  Framework},
  booktitle    = {{ICGS3}},
  pages        = {263--274},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_24},
  doi          = {10.1007/978-3-319-23276-8\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/HessamiJN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/HosseinpourFJG15,
  author       = {Ali Hosseinpour and
                  Amin Hosseinian Far and
                  Hamid Jahankhani and
                  Alireza Ghadrdanizadi},
  title        = {Security and Feasibility of Power Line Communication System},
  booktitle    = {{ICGS3}},
  pages        = {244--251},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_22},
  doi          = {10.1007/978-3-319-23276-8\_22},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/HosseinpourFJG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/IsmailIM15,
  author       = {Umar Mukhtar Ismail and
                  Shareeful Islam and
                  Haralambos Mouratidis},
  title        = {A Framework for Cloud Security Audit},
  booktitle    = {{ICGS3}},
  pages        = {296--309},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_27},
  doi          = {10.1007/978-3-319-23276-8\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/IsmailIM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/IzkiW15,
  author       = {Fathiya Al Izki and
                  George R. S. Weir},
  title        = {Gender Impact on Information Security in the Arab World},
  booktitle    = {{ICGS3}},
  pages        = {200--207},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_18},
  doi          = {10.1007/978-3-319-23276-8\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/IzkiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/JahankhaniAH15,
  author       = {Hamid Jahankhani and
                  Najib Altawell and
                  Ali G. Hessami},
  title        = {Risk and Privacy Issues of Digital Oil Fields in the Cloud},
  booktitle    = {{ICGS3}},
  pages        = {275--284},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_25},
  doi          = {10.1007/978-3-319-23276-8\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/JahankhaniAH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/LauraM15,
  author       = {Luigi Laura and
                  Gianluigi Me},
  title        = {Searching the Web for Illegal Content: The Anatomy of a Semantic Search
                  Engine},
  booktitle    = {{ICGS3}},
  pages        = {113--122},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_10},
  doi          = {10.1007/978-3-319-23276-8\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/LauraM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MahmoodJO15,
  author       = {Wakas Mahmood and
                  Hamid Jahankhani and
                  Aykut Ozkaya},
  title        = {Cloud Forensics Challenges Faced by Forensic Investigators},
  booktitle    = {{ICGS3}},
  pages        = {74--82},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_7},
  doi          = {10.1007/978-3-319-23276-8\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MahmoodJO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MakriL15,
  author       = {Eleni{-}Laskarina Makri and
                  Costas Lambrinoudakis},
  title        = {Towards a Common Security and Privacy Requirements Elicitation Methodology},
  booktitle    = {{ICGS3}},
  pages        = {151--159},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_13},
  doi          = {10.1007/978-3-319-23276-8\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MakriL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MontasariP15,
  author       = {Reza Montasari and
                  Pekka Peltola},
  title        = {Computer Forensic Analysis of Private Browsing Modes},
  booktitle    = {{ICGS3}},
  pages        = {96--109},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_9},
  doi          = {10.1007/978-3-319-23276-8\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MontasariP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MontasariPE15,
  author       = {Reza Montasari and
                  Pekka Peltola and
                  David Evans},
  title        = {Integrated Computer Forensics Investigation Process Model {(ICFIPM)}
                  for Computer Crime Investigations},
  booktitle    = {{ICGS3}},
  pages        = {83--95},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_8},
  doi          = {10.1007/978-3-319-23276-8\_8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MontasariPE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MooreA15,
  author       = {Chris Moore and
                  Ameer Al{-}Nemrat},
  title        = {An Analysis of Honeypot Programs and the Attack Data Collected},
  booktitle    = {{ICGS3}},
  pages        = {228--238},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_20},
  doi          = {10.1007/978-3-319-23276-8\_20},
  timestamp    = {Wed, 22 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MooreA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/PournouriA15,
  author       = {Sina Pournouri and
                  Babak Akhgar},
  title        = {Improving Cyber Situational Awareness Through Data Mining and Predictive
                  Analytic Techniques},
  booktitle    = {{ICGS3}},
  pages        = {21--34},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_3},
  doi          = {10.1007/978-3-319-23276-8\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/PournouriA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Ramachandran15,
  author       = {Muthu Ramachandran},
  title        = {Software Security Requirements Engineering: State of the Art},
  booktitle    = {{ICGS3}},
  pages        = {313--322},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_28},
  doi          = {10.1007/978-3-319-23276-8\_28},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/Ramachandran15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Reynolds15,
  author       = {Michael Reynolds},
  title        = {The Enemy Within: The Challenge for Business from Cyber-attack},
  booktitle    = {{ICGS3}},
  pages        = {123--136},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_11},
  doi          = {10.1007/978-3-319-23276-8\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Reynolds15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/RobinsonW15,
  author       = {Gregor Robinson and
                  George R. S. Weir},
  title        = {Understanding Android Security},
  booktitle    = {{ICGS3}},
  pages        = {189--199},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_17},
  doi          = {10.1007/978-3-319-23276-8\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/RobinsonW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/SantosMM15,
  author       = {Henrique M. Dinis Santos and
                  S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
                  Maria Jos{\'{e}} Magalh{\~{a}}es},
  title        = {An Immunity Based Configuration for Multilayer Single Featured Biometric
                  Authentication Algorithms},
  booktitle    = {{ICGS3}},
  pages        = {239--243},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_21},
  doi          = {10.1007/978-3-319-23276-8\_21},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/SantosMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/TaalLS15,
  author       = {Amie Taal and
                  Jenny Le and
                  James A. Sherer},
  title        = {A Consideration of eDiscovery Technologies for Internal Investigations},
  booktitle    = {{ICGS3}},
  pages        = {59--73},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_6},
  doi          = {10.1007/978-3-319-23276-8\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/TaalLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Tait15,
  author       = {Bobby L. Tait},
  title        = {Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural
                  Pin Using the Eyewriter},
  booktitle    = {{ICGS3}},
  pages        = {348--359},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_31},
  doi          = {10.1007/978-3-319-23276-8\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Tait15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Uotinen15,
  author       = {Marko Uotinen},
  title        = {Detecting Deceit - Guessing or Assessing? Study on the Applicability
                  of Veracity Assessment Methods in Human Intelligence},
  booktitle    = {{ICGS3}},
  pages        = {35--49},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_4},
  doi          = {10.1007/978-3-319-23276-8\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Uotinen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Watson15,
  author       = {David Lilburn Watson},
  title        = {Some Security Perils of Smart Living - {(A} Day in the Life of John
                  {Q} Smith, a Citizen of Utopia, and His Twin Brother, Who Isn't)},
  booktitle    = {{ICGS3}},
  pages        = {211--227},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8\_19},
  doi          = {10.1007/978-3-319-23276-8\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Watson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icgs3/2015,
  editor       = {Hamid Jahankhani and
                  Alex Carlile and
                  Babak Akhgar and
                  Amie Taal and
                  Ali G. Hessami and
                  Amin Hosseinian Far},
  title        = {Global Security, Safety and Sustainability: Tomorrow's Challenges
                  of Cyber Security - 10th International Conference, {ICGS3} 2015, London,
                  UK, September 15-17, 2015. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {534},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23276-8},
  doi          = {10.1007/978-3-319-23276-8},
  isbn         = {978-3-319-23275-1},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icgs3/2011,
  editor       = {Christos K. Georgiadis and
                  Hamid Jahankhani and
                  Elias Pimenidis and
                  Rabih Bashroush and
                  Ameer Al{-}Nemrat},
  title        = {Global Security, Safety and Sustainability {\&} e-Democracy -
                  7th International and 4th e-Democracy, Joint Conferences, ICGS3/e-Democracy
                  2011, Thessaloniki, Greece, August 24-26, 2011, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {99},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33448-1},
  doi          = {10.1007/978-3-642-33448-1},
  isbn         = {978-3-642-33447-4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AlazabVWAA11,
  author       = {Mamoun Alazab and
                  Sitalakshmi Venkatraman and
                  Paul A. Watters and
                  Moutaz Alazab and
                  Ammar Alazab},
  title        = {Cybercrime: The Case of Obfuscated Malware},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {204--211},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_28},
  doi          = {10.1007/978-3-642-33448-1\_28},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/AlazabVWAA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AndroulidakisK11,
  author       = {Iosif Androulidakis and
                  Gorazd Kandus},
  title        = {{PINEPULSE:} {A} System to PINpoint and Educate Mobile Phone Users
                  with Low Security},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {62--66},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_9},
  doi          = {10.1007/978-3-642-33448-1\_9},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AndroulidakisK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AndroulidakisK11a,
  author       = {Iosif Androulidakis and
                  Gorazd Kandus},
  title        = {Feeling Secure vs. Being Secure the Mobile Phone User Case},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {212--219},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_29},
  doi          = {10.1007/978-3-642-33448-1\_29},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AndroulidakisK11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/BorgesSMS11,
  author       = {Daniela Borges and
                  V{\'{\i}}tor J. S{\'{a}} and
                  S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
                  Henrique M. Dinis Santos},
  title        = {Study of the Perception on the Biometric Technology by the Portuguese
                  Citizens},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {280--287},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_37},
  doi          = {10.1007/978-3-642-33448-1\_37},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/BorgesSMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/CerqueiraSM11,
  author       = {Isabel Cerqueira and
                  V{\'{\i}}tor J. S{\'{a}} and
                  S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es},
  title        = {Study of the Perception on the Portuguese Citizen Card and Electronic
                  Signature},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {164--170},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_23},
  doi          = {10.1007/978-3-642-33448-1\_23},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/CerqueiraSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/DelliosAD11,
  author       = {Kleanthis Dellios and
                  Aristeidis Chronakis and
                  Despoina Polemi},
  title        = {Transforming Vehicles into e-government 'Cloud Computing' Nodes},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {1--8},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_1},
  doi          = {10.1007/978-3-642-33448-1\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/DelliosAD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/FawziBJ11,
  author       = {Fawzi Fawzi and
                  Rabih Bashroush and
                  Hamid Jahankhani},
  title        = {GSi Compliant {RAS} for Public Private Sector Partnership},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {67--71},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_10},
  doi          = {10.1007/978-3-642-33448-1\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/FawziBJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/FuK11,
  author       = {Yulong Fu and
                  Ousmane Kon{\'{e}}},
  title        = {A Robustness Testing Method for Network Security},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {38--45},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_6},
  doi          = {10.1007/978-3-642-33448-1\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/FuK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/GerakosAH11,
  author       = {Kostis Gerakos and
                  Christos Anagnostopoulos and
                  Stathes Hadjiefthymiades},
  title        = {Tuning the Epidemical Algorithm in Wireless Sensor Networks},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {31--37},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_5},
  doi          = {10.1007/978-3-642-33448-1\_5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/GerakosAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/GranadilloMHD11,
  author       = {Gustavo Gonzalez Granadillo and
                  Yosra Ben Mustapha and
                  Nabil Hachem and
                  Herv{\'{e}} Debar},
  title        = {An Ontology-Based Model for {SIEM} Environments},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {148--155},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_21},
  doi          = {10.1007/978-3-642-33448-1\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/GranadilloMHD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/HosseiniF11,
  author       = {Azar Hosseini and
                  Abolfazl Falahati},
  title        = {Optimum Hardware-Architecture for Modular Divider in {GF(2} m {)}
                  with Chaos as Arbitrary Source Based on {ECC}},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {245--252},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_33},
  doi          = {10.1007/978-3-642-33448-1\_33},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/HosseiniF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/IbrahimAJB11,
  author       = {Nurdeen M. Ibrahim and
                  Ameer Al{-}Nemrat and
                  Hamid Jahankhani and
                  Rabih Bashroush},
  title        = {Sufficiency of Windows Event Log as Evidence in Digital Forensics},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {253--262},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_34},
  doi          = {10.1007/978-3-642-33448-1\_34},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/IbrahimAJB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/JahankhaniJK11,
  author       = {Hossein Jahankhani and
                  Thulasirajh Jayaraveendran and
                  William Kapuku{-}Bwabw},
  title        = {Improved Awareness on Fake Websites and Detecting Techniques},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {271--279},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_36},
  doi          = {10.1007/978-3-642-33448-1\_36},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/JahankhaniJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/JannatiF11,
  author       = {Hoda Jannati and
                  Abolfazl Falahati},
  title        = {Cryptanalysis and Enhancement of a Secure Group Ownership Transfer
                  Protocol for {RFID} Tags},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {186--193},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_26},
  doi          = {10.1007/978-3-642-33448-1\_26},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/JannatiF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/KarayianniK11,
  author       = {Stavroula Karayianni and
                  Vasilios Katos},
  title        = {Practical Password Harvesting from Volatile Memory},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {17--22},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_3},
  doi          = {10.1007/978-3-642-33448-1\_3},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/KarayianniK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/KardasiadouCL11,
  author       = {Zoe Kardasiadou and
                  Evi Chatziliasi and
                  Konstantinos Limniotis},
  title        = {E-Government in Greece: Serving State's Economic Needs - Respecting
                  the Fundamental Right to Data Protection},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {179--185},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_25},
  doi          = {10.1007/978-3-642-33448-1\_25},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/KardasiadouCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/KaretsosNCS11,
  author       = {Sotiris Karetsos and
                  Maria Ntaliani and
                  Constantina I. Costopoulou and
                  Alexander B. Sideridis},
  title        = {Untangling Public Service Usage for Agribusinesses with Dialogic E-government},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {120--125},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_17},
  doi          = {10.1007/978-3-642-33448-1\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/KaretsosNCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/KhalifaRS11,
  author       = {Wael Khalifa and
                  Kenneth Revett and
                  Abdel{-}Badeeh M. Salem},
  title        = {In the Hacker's Eye: The Neurophysiology of a Computer Hacker},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {112--119},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_16},
  doi          = {10.1007/978-3-642-33448-1\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/KhalifaRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/KoumaridisSG11,
  author       = {Dimitrios Koumaridis and
                  Emmanouil Stiakakis and
                  Christos K. Georgiadis},
  title        = {Analyzing the Economic Impacts of Security Breaches Due to Outsourcing},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {156--163},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_22},
  doi          = {10.1007/978-3-642-33448-1\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/KoumaridisSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/KrishnamurthyRJ11,
  author       = {Ruben Krishnamurthy and
                  Kenneth Revett and
                  Hossein Jahankhani},
  title        = {On the Deployment of Artificial Immune Systems for Biometrics},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {126--130},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_18},
  doi          = {10.1007/978-3-642-33448-1\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/KrishnamurthyRJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/LekkasZ11,
  author       = {Dimitrios Lekkas and
                  Dimitrios Zissis},
  title        = {Leveraging the e-passport {PKI} to Achieve Interoperable Security
                  for e-government Cross Border Services},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {96--103},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_14},
  doi          = {10.1007/978-3-642-33448-1\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/LekkasZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/LiagkouMSS11,
  author       = {Vasiliki Liagkou and
                  Effie Makri and
                  Paul G. Spirakis and
                  Yannis C. Stamatiou},
  title        = {A Probabilistic Key Agreement Scheme for Sensor Networks without Key
                  Predistribution},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {72--79},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_11},
  doi          = {10.1007/978-3-642-33448-1\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/LiagkouMSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MavridouP11,
  author       = {Anastasia Mavridou and
                  Mauricio Papa},
  title        = {A Situational Awareness Architecture for the Smart Grid},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {229--236},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_31},
  doi          = {10.1007/978-3-642-33448-1\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MavridouP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MeloTC11,
  author       = {Marcelo Damasceno de Melo and
                  Jerffeson Teixeira and
                  Gustavo Augusto Lima de Campos},
  title        = {A Prediction Model for Criminal Levels Specialized in Brazilian Cities},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {131--138},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_19},
  doi          = {10.1007/978-3-642-33448-1\_19},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/MeloTC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/NtalianiCS11,
  author       = {Maria Ntaliani and
                  Constantina I. Costopoulou and
                  Alexander B. Sideridis},
  title        = {Alleviating SMEs' Administrative Burdens: The Rural Inclusion Initiative},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {237--244},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_32},
  doi          = {10.1007/978-3-642-33448-1\_32},
  timestamp    = {Mon, 30 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/NtalianiCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/NtouskasPP11,
  author       = {Theodoros Ntouskas and
                  Dimitrios Papanikas and
                  Nineta Polemi},
  title        = {A Collaborative System Offering Security Management Services for SMEs/mEs},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {220--228},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_30},
  doi          = {10.1007/978-3-642-33448-1\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/NtouskasPP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/OgilvieW11,
  author       = {Russell Ogilvie and
                  George R. S. Weir},
  title        = {Genre-Based Information Hiding},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {104--111},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_15},
  doi          = {10.1007/978-3-642-33448-1\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/OgilvieW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/PrietoDRRA11,
  author       = {Elsa Prieto and
                  Rodrigo Diaz and
                  Luigi Romano and
                  Roland Rieke and
                  Mohammed Achemlal},
  title        = {{MASSIF:} {A} Promising Solution to Enhance Olympic Games {IT} Security},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {139--147},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_20},
  doi          = {10.1007/978-3-642-33448-1\_20},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/PrietoDRRA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ProvatidisGM11,
  author       = {Apostolos K. Provatidis and
                  Christos K. Georgiadis and
                  Ioannis Mavridis},
  title        = {Towards Colored Petri Net Modeling of Expanded {C-TMAC}},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {88--95},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_13},
  doi          = {10.1007/978-3-642-33448-1\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/ProvatidisGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/SavvasBPS11,
  author       = {Ioannis Savvas and
                  Nick Bassiliades and
                  Elias Pimenidis and
                  Alexander B. Sideridis},
  title        = {Paving the Way for a Transformational Public Administration},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {194--203},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_27},
  doi          = {10.1007/978-3-642-33448-1\_27},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/SavvasBPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/SideridisPPK11,
  author       = {Alexander B. Sideridis and
                  Elias Pimenidis and
                  Loucas Protopappas and
                  Maria Koukouli},
  title        = {An Evaluation of the Initiatives and the Progress Made on e-government
                  Services in the {EU}},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {263--270},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_35},
  doi          = {10.1007/978-3-642-33448-1\_35},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/SideridisPPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Tait11,
  author       = {Bobby L. Tait},
  title        = {Applied Phon Curve Algorithm for Improved Voice Recognition and Authentication},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {23--30},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_4},
  doi          = {10.1007/978-3-642-33448-1\_4},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Tait11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/TheoharidouKG11,
  author       = {Marianthi Theoharidou and
                  Miltiadis Kandias and
                  Dimitris Gritzalis},
  title        = {Securing Transportation-Critical Infrastructures: Trends and Perspectives},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {171--178},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_24},
  doi          = {10.1007/978-3-642-33448-1\_24},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/TheoharidouKG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/TsiafoulisZP11,
  author       = {Stergios G. Tsiafoulis and
                  Vasilios Zorkadis and
                  Elias Pimenidis},
  title        = {Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving
                  Data Mining},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {9--16},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_2},
  doi          = {10.1007/978-3-642-33448-1\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/TsiafoulisZP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/TsiakisKG11,
  author       = {Theodosios Tsiakis and
                  Panagiotis Katsaros and
                  Dimitris Gritzalis},
  title        = {Economic Evaluation of Interactive Audio Media for Securing Internet
                  Services},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {46--53},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_7},
  doi          = {10.1007/978-3-642-33448-1\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/TsiakisKG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/VlachosIP11,
  author       = {Vasileios Vlachos and
                  Christos Ilioudis and
                  Alexandros Papanikolaou},
  title        = {On the Evolution of Malware Species},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {54--61},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_8},
  doi          = {10.1007/978-3-642-33448-1\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/VlachosIP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ZissisLK11,
  author       = {Dimitrios Zissis and
                  Dimitrios Lekkas and
                  Panayiotis Koutsabasis},
  title        = {Cryptographic Dysfunctionality-A Survey on User Perceptions of Digital
                  Certificates},
  booktitle    = {ICGS3/e-Democracy},
  pages        = {80--87},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-33448-1\_12},
  doi          = {10.1007/978-3-642-33448-1\_12},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/ZissisLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Al-NemratJP10,
  author       = {Ameer Al{-}Nemrat and
                  Hamid Jahankhani and
                  David S. Preston},
  title        = {Cybercrime Victimisations/Criminalisation and Punishment},
  booktitle    = {{ICGS3}},
  pages        = {55--62},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_7},
  doi          = {10.1007/978-3-642-15717-2\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Al-NemratJP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AliH10,
  author       = {Hatamirad Ali and
                  Hasan Mehrjerdi},
  title        = {Deployment of {ERP} Systems at Automotive Industries, Security Inspection
                  (Case Study: {IRAN} {KHODRO} Automotive Company)},
  booktitle    = {{ICGS3}},
  pages        = {160--169},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_18},
  doi          = {10.1007/978-3-642-15717-2\_18},
  timestamp    = {Tue, 18 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/AliH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/AraboSM10,
  author       = {Abdullahi Arabo and
                  Qi Shi and
                  Madjid Merabti},
  title        = {Dynamic Device Configuration in Ubiquitous Environments},
  booktitle    = {{ICGS3}},
  pages        = {263--273},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_28},
  doi          = {10.1007/978-3-642-15717-2\_28},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/AraboSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/CaldeiraMS10,
  author       = {Filipe Caldeira and
                  Edmundo Monteiro and
                  Paulo Sim{\~{o}}es},
  title        = {Trust and Reputation Management for Critical Infrastructure Protection},
  booktitle    = {{ICGS3}},
  pages        = {39--47},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_5},
  doi          = {10.1007/978-3-642-15717-2\_5},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/CaldeiraMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/FalahatiA10,
  author       = {Abolfazl Falahati and
                  Mahdi Azarafrooz},
  title        = {Mitigation of Control Channel Jamming via Combinatorial Key Distribution},
  booktitle    = {{ICGS3}},
  pages        = {274--281},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_29},
  doi          = {10.1007/978-3-642-15717-2\_29},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/FalahatiA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/FarPJW10,
  author       = {Amin Hosseinian Far and
                  Elias Pimenidis and
                  Hamid Jahankhani and
                  D. C. Wijeyesekera},
  title        = {A Review on Sustainability Models},
  booktitle    = {{ICGS3}},
  pages        = {216--222},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_23},
  doi          = {10.1007/978-3-642-15717-2\_23},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/FarPJW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/GeorgiadisKP10,
  author       = {Christos K. Georgiadis and
                  Ioannis Kokkinidis and
                  Elias Pimenidis},
  title        = {A Coloured Petri Net Analysis of the Transaction Internet Protocol},
  booktitle    = {{ICGS3}},
  pages        = {238--249},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_26},
  doi          = {10.1007/978-3-642-15717-2\_26},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/GeorgiadisKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Gonilho-PereiraZFLJA10,
  author       = {Cristiana Gonilho{-}Pereira and
                  Emilija Zdraveva and
                  Raul Fangueiro and
                  Senentxu Lanceros{-}Mendez and
                  Said Jalali and
                  M{\'{a}}rio de Ara{\'{u}}jo},
  title        = {Self-monitoring Composite Rods for Sustainable Construction},
  booktitle    = {{ICGS3}},
  pages        = {193--201},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_21},
  doi          = {10.1007/978-3-642-15717-2\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Gonilho-PereiraZFLJA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/HessamiK10,
  author       = {Ali G. Hessami and
                  Nicos Karcanias},
  title        = {Systems Assurance, Complexity and Emergence: The Need for a Systems
                  Based Approach},
  booktitle    = {{ICGS3}},
  pages        = {202--215},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_22},
  doi          = {10.1007/978-3-642-15717-2\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/HessamiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/JahankhaniM10,
  author       = {Hossein Jahankhani and
                  Maktuba Mohid},
  title        = {Analysis of Fingerprint Image to Verify a Person},
  booktitle    = {{ICGS3}},
  pages        = {104--119},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_13},
  doi          = {10.1007/978-3-642-15717-2\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/JahankhaniM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/JannatiF10,
  author       = {Hoda Jannati and
                  Abolfazl Falahati},
  title        = {A Proxy Signature Scheme Based on Coding Theory},
  booktitle    = {{ICGS3}},
  pages        = {282--290},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_30},
  doi          = {10.1007/978-3-642-15717-2\_30},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/JannatiF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/LoureiroLA10,
  author       = {Isabel F. Loureiro and
                  Celina P. Le{\~{a}}o and
                  Pedro M. Arezes},
  title        = {Management of the Benefits on the Client's Involvement on Ergonomic
                  Analysis},
  booktitle    = {{ICGS3}},
  pages        = {1--8},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_1},
  doi          = {10.1007/978-3-642-15717-2\_1},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/LoureiroLA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MartinsM10,
  author       = {Tiago Martins and
                  S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es},
  title        = {Baby-Crying Acceptance},
  booktitle    = {{ICGS3}},
  pages        = {63--70},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_8},
  doi          = {10.1007/978-3-642-15717-2\_8},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MartinsM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MartinsS10,
  author       = {Jos{\'{e}} Martins and
                  Henrique dos Santos},
  title        = {Methods of Organizational Information Security - {(A} Literature Review)},
  booktitle    = {{ICGS3}},
  pages        = {120--130},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_14},
  doi          = {10.1007/978-3-642-15717-2\_14},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MartinsS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/MorranW10,
  author       = {Michael Morran and
                  George R. S. Weir},
  title        = {An Approach to Textual Steganography},
  booktitle    = {{ICGS3}},
  pages        = {48--54},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_6},
  doi          = {10.1007/978-3-642-15717-2\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/MorranW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Mourao10,
  author       = {Paulo Mour{\~{a}}o},
  title        = {"Fiscal Illusion Causes Fiscal Delusion - Please Be Careful!"},
  booktitle    = {{ICGS3}},
  pages        = {232--237},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_25},
  doi          = {10.1007/978-3-642-15717-2\_25},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Mourao10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/NavareG10,
  author       = {Jyoti Navare and
                  Orhan Gemikonakli},
  title        = {Governance and Risk Management of Network and Information Security:
                  The Role of Public Private Partnerships in Managing the Existing and
                  Emerging Risks},
  booktitle    = {{ICGS3}},
  pages        = {170--177},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_19},
  doi          = {10.1007/978-3-642-15717-2\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icgs3/NavareG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Peikari10,
  author       = {Hamid Reza Peikari},
  title        = {A Study on the Interrelations between the Security-Related Antecedents
                  of Customers' Online Trust},
  booktitle    = {{ICGS3}},
  pages        = {139--148},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_16},
  doi          = {10.1007/978-3-642-15717-2\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Peikari10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Peikari10a,
  author       = {Hamid Reza Peikari},
  title        = {Does Nationality Matter in the {B2C} Environment? Results from a Two
                  Nation Study},
  booktitle    = {{ICGS3}},
  pages        = {149--159},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_17},
  doi          = {10.1007/978-3-642-15717-2\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Peikari10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Peikari10b,
  author       = {Hamid Reza Peikari},
  title        = {The Influence of Security Statement, Technical Protection, and Privacy
                  on Satisfaction and Loyalty; {A} Structural Equation Modeling},
  booktitle    = {{ICGS3}},
  pages        = {223--231},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_24},
  doi          = {10.1007/978-3-642-15717-2\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Peikari10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/PereiraS10,
  author       = {Teresa Susana Mendes Pereira and
                  Henrique M. Dinis Santos},
  title        = {A Security Audit Framework to Manage Information System Security},
  booktitle    = {{ICGS3}},
  pages        = {9--18},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_2},
  doi          = {10.1007/978-3-642-15717-2\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/PereiraS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/RashedS10,
  author       = {Abdullah Rashed and
                  Henrique M. Dinis Santos},
  title        = {Multimodal Biometrics and Multilayered {IDM} for Secure Authentication},
  booktitle    = {{ICGS3}},
  pages        = {87--95},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_11},
  doi          = {10.1007/978-3-642-15717-2\_11},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/RashedS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/RashedS10a,
  author       = {Abdullah Rashed and
                  Henrique M. Dinis Santos},
  title        = {{OTM} Machine Acceptance: In the Arab Culture},
  booktitle    = {{ICGS3}},
  pages        = {131--138},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_15},
  doi          = {10.1007/978-3-642-15717-2\_15},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/RashedS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/RevettM10,
  author       = {Kenneth Revett and
                  S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es},
  title        = {Cognitive Biometrics: Challenges for the Future},
  booktitle    = {{ICGS3}},
  pages        = {79--86},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_10},
  doi          = {10.1007/978-3-642-15717-2\_10},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/RevettM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/SaarelainenJ10,
  author       = {Tapio Saarelainen and
                  Jorma Jormakka},
  title        = {Collaboration and Command Tools for Crises Management},
  booktitle    = {{ICGS3}},
  pages        = {28--38},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_4},
  doi          = {10.1007/978-3-642-15717-2\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/SaarelainenJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/SanayeiS10,
  author       = {Ali Sanayei and
                  Reza Shafe'ei},
  title        = {The Effect of Non-technical Factors in {B2C} E-Commerce - {(A} Case
                  Study in Iran)},
  booktitle    = {{ICGS3}},
  pages        = {178--192},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_20},
  doi          = {10.1007/978-3-642-15717-2\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/SanayeiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/ShayanAQ10,
  author       = {Ali Shayan and
                  Behnam Abdi and
                  Malihe Qeisari},
  title        = {Identification of the Required Security Practices during e-Government
                  Maturity},
  booktitle    = {{ICGS3}},
  pages        = {250--262},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_27},
  doi          = {10.1007/978-3-642-15717-2\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/ShayanAQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/SuWZX10,
  author       = {Shibin Su and
                  Heng Wang and
                  Hua Zhang and
                  Wei Xiong},
  title        = {Design of Discrete Variable Structure Controller Based on Variable
                  Boundary Layer},
  booktitle    = {{ICGS3}},
  pages        = {71--78},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_9},
  doi          = {10.1007/978-3-642-15717-2\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/SuWZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/Tait10,
  author       = {Bobby L. Tait},
  title        = {Secure Biometric Multi-Logon System Based on Current Authentication
                  Technologies},
  booktitle    = {{ICGS3}},
  pages        = {96--103},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_12},
  doi          = {10.1007/978-3-642-15717-2\_12},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/Tait10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/TavallaeiF10,
  author       = {Saeed Ebadi Tavallaei and
                  Abolfazl Falahati},
  title        = {Partially Key Distribution with Public Key Cryptosystem Based on Error
                  Control Codes},
  booktitle    = {{ICGS3}},
  pages        = {291--299},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_31},
  doi          = {10.1007/978-3-642-15717-2\_31},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/TavallaeiF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icgs3/TolnaiS10,
  author       = {Annette Tolnai and
                  Sebastiaan H. von Solms},
  title        = {The Cloud's Core Virtual Infrastructure Security},
  booktitle    = {{ICGS3}},
  pages        = {19--27},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2\_3},
  doi          = {10.1007/978-3-642-15717-2\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/TolnaiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icgs3/2010,
  editor       = {S{\'{e}}rgio Tenreiro de Magalh{\~{a}}es and
                  Hamid Jahankhani and
                  Ali G. Hessami},
  title        = {Global Security, Safety, and Sustainability - 6th International Conference,
                  {ICGS3} 2010, Braga, Portugal, September 1-3, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {92},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15717-2},
  doi          = {10.1007/978-3-642-15717-2},
  isbn         = {978-3-642-15716-5},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icgs3/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics