Search dblp for Publications

export results for "toc:db/conf/IEEEias/IEEEias2011.bht:"

 download as .bib file

@inproceedings{DBLP:conf/IEEEias/AbdullahZR11,
  author       = {Nik Azura Nik Abdullah and
                  Norul Hidayah Lot Ahmad Zawawi and
                  Hazlin Abdul Rani},
  title        = {Analysis on Lightweight Block Cipher, {KTANTAN}},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {46--51},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122793},
  doi          = {10.1109/ISIAS.2011.6122793},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AbdullahZR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AhlanL11,
  author       = {Abdul Rahman Ahlan and
                  Muharman Lubis},
  title        = {Information security awareness in university: Maintaining learnability,
                  performance and adaptability through roles of responsibility},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {246--250},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122827},
  doi          = {10.1109/ISIAS.2011.6122827},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AhlanL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AhmadAM11,
  author       = {Nurul Haszeli Ahmad and
                  Syed Ahmad Aljunid and
                  Jamalul{-}lail Ab Manan},
  title        = {Understanding vulnerabilities by refining taxonomy},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {25--29},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122789},
  doi          = {10.1109/ISIAS.2011.6122789},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AhmadAM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AhmadJM11,
  author       = {Zaid Ahmad and
                  Kamarularifin Abd. Jalil and
                  Jamalul{-}lail Ab Manan},
  title        = {Black hole effect mitigation method in {AODV} routing protocol},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {151--155},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122811},
  doi          = {10.1109/ISIAS.2011.6122811},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AhmadJM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AhmadW11,
  author       = {Adnan Ahmad and
                  Brian Whitworth},
  title        = {Distributed access control for social networks},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {68--73},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122797},
  doi          = {10.1109/ISIAS.2011.6122797},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AhmadW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AhmadW11a,
  author       = {Adnan Ahmad and
                  Brian Whitworth},
  title        = {Access control taxonomy for social networks},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {256--261},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122829},
  doi          = {10.1109/ISIAS.2011.6122829},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AhmadW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Al-HujailanAA11,
  author       = {Hajar Al{-}Hujailan and
                  Mznah Al{-}Rodhaan and
                  Abdullah Al{-}Dhelaan},
  title        = {A cooperative intrusion detection scheme for clustered mobile ad hoc
                  networks},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {179--185},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122816},
  doi          = {10.1109/ISIAS.2011.6122816},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Al-HujailanAA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Al-Sinani11,
  author       = {Haitham S. Al{-}Sinani},
  title        = {Integrating OAuth with Information card systems},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {198--203},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122819},
  doi          = {10.1109/ISIAS.2011.6122819},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Al-Sinani11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/AminJ11,
  author       = {Farshad Amin and
                  Amir Hossein Jahangir},
  title        = {Time and energy cost analysis of Kerberos security protocol in Wireless
                  Sensor Networks},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {308--313},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122838},
  doi          = {10.1109/ISIAS.2011.6122838},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/AminJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Atta-ur-RahmanNQM11,
  author       = {Atta{-}ur{-}Rahman and
                  Muhammad Tahir Naseem and
                  Ijaz Mansoor Qureshi and
                  Muhammad Zeeshan Muzaffar},
  title        = {Reversible watermarking using Residue Number System},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {162--166},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122813},
  doi          = {10.1109/ISIAS.2011.6122813},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Atta-ur-RahmanNQM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BaqarAISAM11,
  author       = {Mohtashim Baqar and
                  Sohaib Azhar and
                  Zeeshan Iqbal and
                  Irfan Shakeel and
                  Laeeq Ahmed and
                  Muhammad Moinuddin},
  title        = {Efficient iris recognition system based on dual boundary detection
                  using robust variable learning rate Multilayer Feed Forward neural
                  network},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {326--330},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122841},
  doi          = {10.1109/ISIAS.2011.6122841},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BaqarAISAM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/BellaBG11,
  author       = {Giampaolo Bella and
                  Denis Butin and
                  David Gray},
  title        = {Holistic analysis of mix protocols},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {338--343},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122843},
  doi          = {10.1109/ISIAS.2011.6122843},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/BellaBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/CaviglioneMM11,
  author       = {Luca Caviglione and
                  Alessio Merlo and
                  Mauro Migliardi},
  title        = {What is Green Security?},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {366--371},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122781},
  doi          = {10.1109/ISIAS.2011.6122781},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/CaviglioneMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ColarikJ11,
  author       = {Andrew M. Colarik and
                  Lech J. Janczewski},
  title        = {Developing a grand strategy for Cyber War},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {52--57},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122794},
  doi          = {10.1109/ISIAS.2011.6122794},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ColarikJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DabbaghGFEH11,
  author       = {Mehiar Dabbagh and
                  Ali J. Ghandour and
                  Kassem Fawaz and
                  Wassim El{-}Hajj and
                  Hazem M. Hajj},
  title        = {Slow port scanning detection},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {228--233},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122824},
  doi          = {10.1109/ISIAS.2011.6122824},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DabbaghGFEH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DaryabarDU11,
  author       = {Farid Daryabar and
                  Ali Dehghantanha and
                  Nur Izura Udzir},
  title        = {Investigation of bypassing malware defences and malware detections},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {173--178},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122815},
  doi          = {10.1109/ISIAS.2011.6122815},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DaryabarDU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DehghantanhaUM11,
  author       = {Ali Dehghantanha and
                  Nur Izura Udzir and
                  Ramlan Mahmod},
  title        = {Towards data centric mobile security},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {62--67},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122796},
  doi          = {10.1109/ISIAS.2011.6122796},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DehghantanhaUM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/DemongeotTT11,
  author       = {Thomas Demongeot and
                  Eric Totel and
                  Yves Le Traon},
  title        = {Preventing data leakage in service orchestration},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {122--127},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122806},
  doi          = {10.1109/ISIAS.2011.6122806},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/DemongeotTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/El-SemaryA11,
  author       = {Aly Mohamed El{-}Semary and
                  Mohamed Mostafa A. Azim},
  title        = {A two-tier energy-efficient secure routing protocol for Wireless Sensor
                  Networks},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {331--337},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122842},
  doi          = {10.1109/ISIAS.2011.6122842},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/El-SemaryA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ErG11,
  author       = {Fusun Citak Er and
                  Ensar Gul},
  title        = {Comparison of digital audio watermarking techniques for the security
                  of {VOIP} communications},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122787},
  doi          = {10.1109/ISIAS.2011.6122787},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ErG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HaghighiVY11,
  author       = {Mehdi Salkhordeh Haghighi and
                  Abedin Vahedian and
                  Hadi Sadoghi Yazdi},
  title        = {Extending Dempster Shafer method by multilayer decision template in
                  classifier fusion},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {128--133},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122807},
  doi          = {10.1109/ISIAS.2011.6122807},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HaghighiVY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HidayatFMCA11,
  author       = {Erwin Hidayat and
                  Nur A. Fajrian and
                  Azah Kamilah Muda and
                  Yun{-}Huoy Choo and
                  Sabrina Ahmad},
  title        = {A comparative study of feature extraction using {PCA} and {LDA} for
                  face recognition},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {354--359},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122779},
  doi          = {10.1109/ISIAS.2011.6122779},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HidayatFMCA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/HosoyaYKH11,
  author       = {Gou Hosoya and
                  Hideki Yagi and
                  Manabu Kobayashi and
                  Shigeichi Hirasawa},
  title        = {On the capacity of fingerprinting codes against unknown size of colluders},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {234--239},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122825},
  doi          = {10.1109/ISIAS.2011.6122825},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/HosoyaYKH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/IsaBSZ11,
  author       = {Herman Isa and
                  Iskandar Bahari and
                  Hasibah Sufian and
                  Muhammad Reza Z'aba},
  title        = {{AES:} Current security and efficiency analysis of its alternatives},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {267--274},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122831},
  doi          = {10.1109/ISIAS.2011.6122831},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/IsaBSZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JafarabadiA11,
  author       = {Ahmad Jafarabadi and
                  Mohammad Abdollahi Azgomi},
  title        = {An {SIR} model for the propagation of topology-aware active worms
                  considering the join and leave of hosts},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {204--209},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122820},
  doi          = {10.1109/ISIAS.2011.6122820},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JafarabadiA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JaleelJH11,
  author       = {Mohammad Uruj Jaleel and
                  Mohammad Asghar Jamil and
                  Kashiful Haq},
  title        = {Energy efficient delay leap routing in multicast using feed back neural
                  networks},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {251--255},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122828},
  doi          = {10.1109/ISIAS.2011.6122828},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JaleelJH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/JaliFD11,
  author       = {Mohd Zalisham Jali and
                  Steven Furnell and
                  Paul Dowland},
  title        = {Multifactor graphical passwords: An assessment of end-user performance},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122786},
  doi          = {10.1109/ISIAS.2011.6122786},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/JaliFD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/Kamata11,
  author       = {Sei{-}ichiro Kamata},
  title        = {A common key encryption algorithm using N-dimensional Hilbert curves},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {275--279},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122832},
  doi          = {10.1109/ISIAS.2011.6122832},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/Kamata11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KapiI11,
  author       = {Azyan Yusra Kapi and
                  Subariah Ibrahim},
  title        = {Fixed size encoding scheme for software watermarking},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {35--39},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122791},
  doi          = {10.1109/ISIAS.2011.6122791},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KapiI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KhanTPL11,
  author       = {Muhammad Khurram Khan and
                  Pei{-}wei Tsai and
                  Jeng{-}Shyang Pan and
                  Bin{-}Yih Liao},
  title        = {Biometric driven initiative system for passive continuous authentication},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {139--144},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122809},
  doi          = {10.1109/ISIAS.2011.6122809},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KhanTPL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KhanYA11,
  author       = {Rasib Hassan Khan and
                  Jukka Ylitalo and
                  Abu Shohel Ahmed},
  title        = {OpenID authentication as a service in OpenStack},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {372--377},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122782},
  doi          = {10.1109/ISIAS.2011.6122782},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KhanYA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/KhosraviG11,
  author       = {Mohammad Javad Khosravi and
                  Samaneh Ghandali},
  title        = {A secure joint wavelet based steganography and secret sharing method},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {222--227},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122823},
  doi          = {10.1109/ISIAS.2011.6122823},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/KhosraviG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LiK11,
  author       = {Sheng Li and
                  Alex C. Kot},
  title        = {A novel system for fingerprint privacy protection\({}^{\mbox{1}}\)},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {262--266},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122830},
  doi          = {10.1109/ISIAS.2011.6122830},
  timestamp    = {Sun, 17 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LinWH11,
  author       = {Kuan Jen Lin and
                  Chih Ping Weng and
                  Tsai Kun Hou},
  title        = {Enhance hardware security using {FIFO} in pipelines},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {344--349},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122844},
  doi          = {10.1109/ISIAS.2011.6122844},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LinWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/LundinL11,
  author       = {Reine Lundin and
                  Stefan Lindskog},
  title        = {Guesswork changes in multi-processor attacks},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {145--150},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122810},
  doi          = {10.1109/ISIAS.2011.6122810},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/LundinL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MaggiGB11,
  author       = {Federico Maggi and
                  Simone Gasparini and
                  Giacomo Boracchi},
  title        = {A fast eavesdropping attack against touchscreens},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {320--325},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122840},
  doi          = {10.1109/ISIAS.2011.6122840},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MaggiGB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MalikD11,
  author       = {Ahmad Kamran Malik and
                  Schahram Dustdar},
  title        = {Enhanced sharing and privacy in distributed information sharing environments},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {286--291},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122834},
  doi          = {10.1109/ISIAS.2011.6122834},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MalikD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MalikS11,
  author       = {Siddharth Malik and
                  Anjali Sardana},
  title        = {Secure Vault: {A} privacy preserving reliable architecture for Secure
                  Social Networking},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {116--121},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122805},
  doi          = {10.1109/ISIAS.2011.6122805},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MalikS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MengK11,
  author       = {Yuxin Meng and
                  Lam{-}for Kwok},
  title        = {Adaptive context-aware packet filter scheme using statistic-based
                  blacklist generation in network intrusion detection},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {74--79},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122798},
  doi          = {10.1109/ISIAS.2011.6122798},
  timestamp    = {Fri, 12 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MengK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MeshramM11,
  author       = {Chandrashekhar Meshram and
                  Suchitra A. Meshram},
  title        = {An identity based beta cryptosystem},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {298--303},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122836},
  doi          = {10.1109/ISIAS.2011.6122836},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MeshramM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MohdJT11,
  author       = {Abidalrahman Moh'd and
                  Yaser Jararweh and
                  Lo'ai Ali Tawalbeh},
  title        = {{AES-512:} 512-bit Advanced Encryption Standard algorithm design and
                  evaluation},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {292--297},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122835},
  doi          = {10.1109/ISIAS.2011.6122835},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MohdJT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MubarakMY11,
  author       = {Mohd Faizal Mubarak and
                  Jamalul{-}lail Ab Manan and
                  Saadiah Yahya},
  title        = {Trusted anonymizer-based {RFID} system with integrity verification},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {98--103},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122802},
  doi          = {10.1109/ISIAS.2011.6122802},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MubarakMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/MudaYSU11,
  author       = {Zaiton Muda and
                  Warusia Yassin and
                  Md Nasir Sulaiman and
                  Nur Izura Udzir},
  title        = {Intrusion detection based on k-means clustering and OneR classification},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {192--197},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122818},
  doi          = {10.1109/ISIAS.2011.6122818},
  timestamp    = {Fri, 16 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/MudaYSU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/NosratiTT11,
  author       = {Elham Nosrati and
                  S. Navid Hashemi Tonekaboni and
                  S. Majid Hashemi Tonekaboni},
  title        = {Examining {CSCF} entity attacks scenarios and vulnerabilities in {IP}
                  Multimedia Subsystems},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {304--307},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122837},
  doi          = {10.1109/ISIAS.2011.6122837},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/NosratiTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/OuedraogoMHBKDP11,
  author       = {Moussa Ouedraogo and
                  Haralambos Mouratidis and
                  Artur Hecker and
                  C{\'{e}}dric Bonhomme and
                  Djamel Khadraoui and
                  Eric Dubois and
                  David Preston},
  title        = {A new approach to evaluating security assurance},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {215--221},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122822},
  doi          = {10.1109/ISIAS.2011.6122822},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/OuedraogoMHBKDP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/PaulCS11,
  author       = {Mithun Paul and
                  Nitin Singh Chauhan and
                  Ashutosh Saxena},
  title        = {A security analysis of smartphone data flow and feasible solutions
                  for lawful interception},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122788},
  doi          = {10.1109/ISIAS.2011.6122788},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/PaulCS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RakLA11,
  author       = {Massimiliano Rak and
                  Loredana Liccardo and
                  Rocco Aversa},
  title        = {A SLA-based interface for security management in cloud and {GRID}
                  integrations},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {378--383},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122783},
  doi          = {10.1109/ISIAS.2011.6122783},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RakLA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RamliA11,
  author       = {Sofia Najwa Ramli and
                  Rabiah Ahmad},
  title        = {Surveying the Wireless Body Area Network in the realm of wireless
                  communication},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {58--61},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122845},
  doi          = {10.1109/ISIAS.2011.6122845},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RamliA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RassamMZ11,
  author       = {Murad A. Rassam and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  title        = {A novel intrusion detection framework for Wireless Sensor Networks},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {350--353},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122778},
  doi          = {10.1109/ISIAS.2011.6122778},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RassamMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SaadT11,
  author       = {Sherif Saad and
                  Issa Traor{\'{e}}},
  title        = {A semantic analysis approach to manage {IDS} alerts flooding},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {156--161},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122812},
  doi          = {10.1109/ISIAS.2011.6122812},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SaadT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SaadiBG11,
  author       = {Karima Ait Saadi and
                  Ahmed Bouridane and
                  Abdelrazek Guessoum},
  title        = {{H.264/AVC} digital fingerprinting based on content adaptive embedding},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {360--365},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122780},
  doi          = {10.1109/ISIAS.2011.6122780},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SaadiBG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SabriNS11,
  author       = {Fatin Norsyafawati Mohd Sabri and
                  Norita Md Norwawi and
                  Kamaruzzaman Seman},
  title        = {Hybrid of rough set theory and Artificial Immune Recognition System
                  as a solution to decrease false alarm rate in intrusion detection
                  system},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {134--138},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122808},
  doi          = {10.1109/ISIAS.2011.6122808},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SabriNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SafieSP11,
  author       = {Sairul Izwan Safie and
                  John J. Soraghan and
                  Lykourgos Petropoulakis},
  title        = {Pulse Active Mean {(PAM):} {A} {PIN} supporting feature extraction
                  algorithm for doubly secure authentication},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {210--214},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122821},
  doi          = {10.1109/ISIAS.2011.6122821},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SafieSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SamardjiskaCG11,
  author       = {Simona Samardjiska and
                  Yanling Chen and
                  Danilo Gligoroski},
  title        = {Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary
                  Galois fields},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {314--319},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122839},
  doi          = {10.1109/ISIAS.2011.6122839},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SamardjiskaCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShahadiJ11,
  author       = {Haider Ismael Shahadi and
                  Razali Jidin},
  title        = {High capacity and inaudibility audio steganography scheme},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {104--109},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122803},
  doi          = {10.1109/ISIAS.2011.6122803},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShahadiJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ShuhaimiARA11,
  author       = {Mohammad Ali Arsyad bin Mohd Shuhaimi and
                  Zaheera binti Zainal Abidin and
                  Irda binti Roslan and
                  Syarulnaziah binti Anawar},
  title        = {The new services in Nagios: Network bandwidth utility, email notification
                  and sms alert in improving the network performance},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {86--91},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122800},
  doi          = {10.1109/ISIAS.2011.6122800},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ShuhaimiARA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/SomCM11,
  author       = {Subhranil Som and
                  Niladri Shekhar Chatergee and
                  J. K. Mandal},
  title        = {Key based bit level genetic cryptographic technique {(KBGCT)}},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {240--245},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122826},
  doi          = {10.1109/ISIAS.2011.6122826},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/SomCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TaremianN11,
  author       = {Hamid Reza Taremian and
                  Mahdi Pakdaman Naeini},
  title        = {Hybrid Intelligent Decision Support System for credit risk assessment},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {167--172},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122814},
  doi          = {10.1109/ISIAS.2011.6122814},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TaremianN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/TeoWDS11,
  author       = {Sui{-}Guan Teo and
                  Kenneth Koon{-}Ho Wong and
                  Ed Dawson and
                  Leonie Simpson},
  title        = {State convergence and the effectiveness of time-memory-data tradeoffs},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {92--97},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122801},
  doi          = {10.1109/ISIAS.2011.6122801},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/TeoWDS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/VeerubhotlaS11,
  author       = {Ravi Sankar Veerubhotla and
                  Ashutosh Saxena},
  title        = {A {DRM} framework towards preventing digital piracy},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122785},
  doi          = {10.1109/ISIAS.2011.6122785},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/VeerubhotlaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WeerasenaBKDNW11,
  author       = {H. H. Weerasena and
                  P. B. S. Bandara and
                  J. R. B. Kulasekara and
                  B. M. B. Dassanayake and
                  U. A. A. Niroshika and
                  P. R. Wijenayake},
  title        = {Strategic approach for high performance object tracking in a network
                  of surveillance cameras},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {280--285},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122846},
  doi          = {10.1109/ISIAS.2011.6122846},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WeerasenaBKDNW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WilkinY11,
  author       = {Tee Wilkin and
                  Shih Yin Ooi},
  title        = {State of the art: Signature verification system},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {110--115},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122804},
  doi          = {10.1109/ISIAS.2011.6122804},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WilkinY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/XuTY11,
  author       = {Dongyang Xu and
                  Zhi Tang and
                  Yinyan Yu},
  title        = {An extended rights expression model supporting dynamic digital rights
                  management},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {186--191},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122817},
  doi          = {10.1109/ISIAS.2011.6122817},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/XuTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/YapYY11,
  author       = {Wun{-}She Yap and
                  Sze Ling Yeo and
                  Chee Hoo Yian},
  title        = {Cryptanalysis of the full {CHAIN} cipher},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {40--45},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122792},
  doi          = {10.1109/ISIAS.2011.6122792},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/YapYY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZabidiMZ11,
  author       = {Muhammad Najmi Ahmad Zabidi and
                  Mohd Aizaini Maarof and
                  Anazida Zainal},
  title        = {Ensemble based categorization and adaptive model for malware detection},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {80--85},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122799},
  doi          = {10.1109/ISIAS.2011.6122799},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZabidiMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZamanidoostNHFF11,
  author       = {Yadollah Zamanidoost and
                  Antonio Navarro and
                  Zhinoos Razavi Hesabi and
                  Nima Rahimi Froshani and
                  Fatemeh Farnia},
  title        = {Robust video watermarking against {JPEG} compression in 3D-DWT domain},
  booktitle    = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  pages        = {30--34},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIAS.2011.6122790},
  doi          = {10.1109/ISIAS.2011.6122790},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZamanidoostNHFF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEias/2011,
  title        = {7th International Conference on Information Assurance and Security,
                  {IAS} 2011, Melacca, Malaysia, December 5-8, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6112288/proceeding},
  isbn         = {978-1-4577-2154-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics