Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/IEEEias/IEEEias2011.bht:"
@inproceedings{DBLP:conf/IEEEias/AbdullahZR11, author = {Nik Azura Nik Abdullah and Norul Hidayah Lot Ahmad Zawawi and Hazlin Abdul Rani}, title = {Analysis on Lightweight Block Cipher, {KTANTAN}}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {46--51}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122793}, doi = {10.1109/ISIAS.2011.6122793}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AbdullahZR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AhlanL11, author = {Abdul Rahman Ahlan and Muharman Lubis}, title = {Information security awareness in university: Maintaining learnability, performance and adaptability through roles of responsibility}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {246--250}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122827}, doi = {10.1109/ISIAS.2011.6122827}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AhlanL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AhmadAM11, author = {Nurul Haszeli Ahmad and Syed Ahmad Aljunid and Jamalul{-}lail Ab Manan}, title = {Understanding vulnerabilities by refining taxonomy}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {25--29}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122789}, doi = {10.1109/ISIAS.2011.6122789}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AhmadAM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AhmadJM11, author = {Zaid Ahmad and Kamarularifin Abd. Jalil and Jamalul{-}lail Ab Manan}, title = {Black hole effect mitigation method in {AODV} routing protocol}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {151--155}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122811}, doi = {10.1109/ISIAS.2011.6122811}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AhmadJM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AhmadW11, author = {Adnan Ahmad and Brian Whitworth}, title = {Distributed access control for social networks}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {68--73}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122797}, doi = {10.1109/ISIAS.2011.6122797}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AhmadW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AhmadW11a, author = {Adnan Ahmad and Brian Whitworth}, title = {Access control taxonomy for social networks}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {256--261}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122829}, doi = {10.1109/ISIAS.2011.6122829}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/AhmadW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Al-HujailanAA11, author = {Hajar Al{-}Hujailan and Mznah Al{-}Rodhaan and Abdullah Al{-}Dhelaan}, title = {A cooperative intrusion detection scheme for clustered mobile ad hoc networks}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {179--185}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122816}, doi = {10.1109/ISIAS.2011.6122816}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/Al-HujailanAA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Al-Sinani11, author = {Haitham S. Al{-}Sinani}, title = {Integrating OAuth with Information card systems}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {198--203}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122819}, doi = {10.1109/ISIAS.2011.6122819}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/Al-Sinani11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/AminJ11, author = {Farshad Amin and Amir Hossein Jahangir}, title = {Time and energy cost analysis of Kerberos security protocol in Wireless Sensor Networks}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {308--313}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122838}, doi = {10.1109/ISIAS.2011.6122838}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/AminJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Atta-ur-RahmanNQM11, author = {Atta{-}ur{-}Rahman and Muhammad Tahir Naseem and Ijaz Mansoor Qureshi and Muhammad Zeeshan Muzaffar}, title = {Reversible watermarking using Residue Number System}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {162--166}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122813}, doi = {10.1109/ISIAS.2011.6122813}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/Atta-ur-RahmanNQM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BaqarAISAM11, author = {Mohtashim Baqar and Sohaib Azhar and Zeeshan Iqbal and Irfan Shakeel and Laeeq Ahmed and Muhammad Moinuddin}, title = {Efficient iris recognition system based on dual boundary detection using robust variable learning rate Multilayer Feed Forward neural network}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {326--330}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122841}, doi = {10.1109/ISIAS.2011.6122841}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/BaqarAISAM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/BellaBG11, author = {Giampaolo Bella and Denis Butin and David Gray}, title = {Holistic analysis of mix protocols}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {338--343}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122843}, doi = {10.1109/ISIAS.2011.6122843}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/BellaBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/CaviglioneMM11, author = {Luca Caviglione and Alessio Merlo and Mauro Migliardi}, title = {What is Green Security?}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {366--371}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122781}, doi = {10.1109/ISIAS.2011.6122781}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/CaviglioneMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ColarikJ11, author = {Andrew M. Colarik and Lech J. Janczewski}, title = {Developing a grand strategy for Cyber War}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {52--57}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122794}, doi = {10.1109/ISIAS.2011.6122794}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/ColarikJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/DabbaghGFEH11, author = {Mehiar Dabbagh and Ali J. Ghandour and Kassem Fawaz and Wassim El{-}Hajj and Hazem M. Hajj}, title = {Slow port scanning detection}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {228--233}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122824}, doi = {10.1109/ISIAS.2011.6122824}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/DabbaghGFEH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/DaryabarDU11, author = {Farid Daryabar and Ali Dehghantanha and Nur Izura Udzir}, title = {Investigation of bypassing malware defences and malware detections}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {173--178}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122815}, doi = {10.1109/ISIAS.2011.6122815}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/DaryabarDU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/DehghantanhaUM11, author = {Ali Dehghantanha and Nur Izura Udzir and Ramlan Mahmod}, title = {Towards data centric mobile security}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {62--67}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122796}, doi = {10.1109/ISIAS.2011.6122796}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/DehghantanhaUM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/DemongeotTT11, author = {Thomas Demongeot and Eric Totel and Yves Le Traon}, title = {Preventing data leakage in service orchestration}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {122--127}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122806}, doi = {10.1109/ISIAS.2011.6122806}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/DemongeotTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/El-SemaryA11, author = {Aly Mohamed El{-}Semary and Mohamed Mostafa A. Azim}, title = {A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {331--337}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122842}, doi = {10.1109/ISIAS.2011.6122842}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/El-SemaryA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ErG11, author = {Fusun Citak Er and Ensar Gul}, title = {Comparison of digital audio watermarking techniques for the security of {VOIP} communications}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {13--18}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122787}, doi = {10.1109/ISIAS.2011.6122787}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/ErG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HaghighiVY11, author = {Mehdi Salkhordeh Haghighi and Abedin Vahedian and Hadi Sadoghi Yazdi}, title = {Extending Dempster Shafer method by multilayer decision template in classifier fusion}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {128--133}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122807}, doi = {10.1109/ISIAS.2011.6122807}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/HaghighiVY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HidayatFMCA11, author = {Erwin Hidayat and Nur A. Fajrian and Azah Kamilah Muda and Yun{-}Huoy Choo and Sabrina Ahmad}, title = {A comparative study of feature extraction using {PCA} and {LDA} for face recognition}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {354--359}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122779}, doi = {10.1109/ISIAS.2011.6122779}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/HidayatFMCA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HosoyaYKH11, author = {Gou Hosoya and Hideki Yagi and Manabu Kobayashi and Shigeichi Hirasawa}, title = {On the capacity of fingerprinting codes against unknown size of colluders}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {234--239}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122825}, doi = {10.1109/ISIAS.2011.6122825}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/HosoyaYKH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/IsaBSZ11, author = {Herman Isa and Iskandar Bahari and Hasibah Sufian and Muhammad Reza Z'aba}, title = {{AES:} Current security and efficiency analysis of its alternatives}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {267--274}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122831}, doi = {10.1109/ISIAS.2011.6122831}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/IsaBSZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JafarabadiA11, author = {Ahmad Jafarabadi and Mohammad Abdollahi Azgomi}, title = {An {SIR} model for the propagation of topology-aware active worms considering the join and leave of hosts}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {204--209}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122820}, doi = {10.1109/ISIAS.2011.6122820}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/JafarabadiA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JaleelJH11, author = {Mohammad Uruj Jaleel and Mohammad Asghar Jamil and Kashiful Haq}, title = {Energy efficient delay leap routing in multicast using feed back neural networks}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {251--255}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122828}, doi = {10.1109/ISIAS.2011.6122828}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/JaleelJH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/JaliFD11, author = {Mohd Zalisham Jali and Steven Furnell and Paul Dowland}, title = {Multifactor graphical passwords: An assessment of end-user performance}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {7--12}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122786}, doi = {10.1109/ISIAS.2011.6122786}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/JaliFD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/Kamata11, author = {Sei{-}ichiro Kamata}, title = {A common key encryption algorithm using N-dimensional Hilbert curves}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {275--279}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122832}, doi = {10.1109/ISIAS.2011.6122832}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/Kamata11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KapiI11, author = {Azyan Yusra Kapi and Subariah Ibrahim}, title = {Fixed size encoding scheme for software watermarking}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {35--39}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122791}, doi = {10.1109/ISIAS.2011.6122791}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KapiI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KhanTPL11, author = {Muhammad Khurram Khan and Pei{-}wei Tsai and Jeng{-}Shyang Pan and Bin{-}Yih Liao}, title = {Biometric driven initiative system for passive continuous authentication}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {139--144}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122809}, doi = {10.1109/ISIAS.2011.6122809}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KhanTPL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KhanYA11, author = {Rasib Hassan Khan and Jukka Ylitalo and Abu Shohel Ahmed}, title = {OpenID authentication as a service in OpenStack}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {372--377}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122782}, doi = {10.1109/ISIAS.2011.6122782}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KhanYA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/KhosraviG11, author = {Mohammad Javad Khosravi and Samaneh Ghandali}, title = {A secure joint wavelet based steganography and secret sharing method}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {222--227}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122823}, doi = {10.1109/ISIAS.2011.6122823}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/KhosraviG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LiK11, author = {Sheng Li and Alex C. Kot}, title = {A novel system for fingerprint privacy protection\({}^{\mbox{1}}\)}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {262--266}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122830}, doi = {10.1109/ISIAS.2011.6122830}, timestamp = {Sun, 17 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/LiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LinWH11, author = {Kuan Jen Lin and Chih Ping Weng and Tsai Kun Hou}, title = {Enhance hardware security using {FIFO} in pipelines}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {344--349}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122844}, doi = {10.1109/ISIAS.2011.6122844}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/LinWH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/LundinL11, author = {Reine Lundin and Stefan Lindskog}, title = {Guesswork changes in multi-processor attacks}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {145--150}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122810}, doi = {10.1109/ISIAS.2011.6122810}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/LundinL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MaggiGB11, author = {Federico Maggi and Simone Gasparini and Giacomo Boracchi}, title = {A fast eavesdropping attack against touchscreens}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {320--325}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122840}, doi = {10.1109/ISIAS.2011.6122840}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MaggiGB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MalikD11, author = {Ahmad Kamran Malik and Schahram Dustdar}, title = {Enhanced sharing and privacy in distributed information sharing environments}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {286--291}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122834}, doi = {10.1109/ISIAS.2011.6122834}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MalikD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MalikS11, author = {Siddharth Malik and Anjali Sardana}, title = {Secure Vault: {A} privacy preserving reliable architecture for Secure Social Networking}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {116--121}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122805}, doi = {10.1109/ISIAS.2011.6122805}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MalikS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MengK11, author = {Yuxin Meng and Lam{-}for Kwok}, title = {Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {74--79}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122798}, doi = {10.1109/ISIAS.2011.6122798}, timestamp = {Fri, 12 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/MengK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MeshramM11, author = {Chandrashekhar Meshram and Suchitra A. Meshram}, title = {An identity based beta cryptosystem}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {298--303}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122836}, doi = {10.1109/ISIAS.2011.6122836}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MeshramM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MohdJT11, author = {Abidalrahman Moh'd and Yaser Jararweh and Lo'ai Ali Tawalbeh}, title = {{AES-512:} 512-bit Advanced Encryption Standard algorithm design and evaluation}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {292--297}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122835}, doi = {10.1109/ISIAS.2011.6122835}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MohdJT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MubarakMY11, author = {Mohd Faizal Mubarak and Jamalul{-}lail Ab Manan and Saadiah Yahya}, title = {Trusted anonymizer-based {RFID} system with integrity verification}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {98--103}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122802}, doi = {10.1109/ISIAS.2011.6122802}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MubarakMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/MudaYSU11, author = {Zaiton Muda and Warusia Yassin and Md Nasir Sulaiman and Nur Izura Udzir}, title = {Intrusion detection based on k-means clustering and OneR classification}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {192--197}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122818}, doi = {10.1109/ISIAS.2011.6122818}, timestamp = {Fri, 16 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/MudaYSU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/NosratiTT11, author = {Elham Nosrati and S. Navid Hashemi Tonekaboni and S. Majid Hashemi Tonekaboni}, title = {Examining {CSCF} entity attacks scenarios and vulnerabilities in {IP} Multimedia Subsystems}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {304--307}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122837}, doi = {10.1109/ISIAS.2011.6122837}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/NosratiTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/OuedraogoMHBKDP11, author = {Moussa Ouedraogo and Haralambos Mouratidis and Artur Hecker and C{\'{e}}dric Bonhomme and Djamel Khadraoui and Eric Dubois and David Preston}, title = {A new approach to evaluating security assurance}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {215--221}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122822}, doi = {10.1109/ISIAS.2011.6122822}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/OuedraogoMHBKDP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/PaulCS11, author = {Mithun Paul and Nitin Singh Chauhan and Ashutosh Saxena}, title = {A security analysis of smartphone data flow and feasible solutions for lawful interception}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {19--24}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122788}, doi = {10.1109/ISIAS.2011.6122788}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/PaulCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RakLA11, author = {Massimiliano Rak and Loredana Liccardo and Rocco Aversa}, title = {A SLA-based interface for security management in cloud and {GRID} integrations}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {378--383}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122783}, doi = {10.1109/ISIAS.2011.6122783}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/RakLA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RamliA11, author = {Sofia Najwa Ramli and Rabiah Ahmad}, title = {Surveying the Wireless Body Area Network in the realm of wireless communication}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {58--61}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122845}, doi = {10.1109/ISIAS.2011.6122845}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/RamliA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RassamMZ11, author = {Murad A. Rassam and Mohd Aizaini Maarof and Anazida Zainal}, title = {A novel intrusion detection framework for Wireless Sensor Networks}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {350--353}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122778}, doi = {10.1109/ISIAS.2011.6122778}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/RassamMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SaadT11, author = {Sherif Saad and Issa Traor{\'{e}}}, title = {A semantic analysis approach to manage {IDS} alerts flooding}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {156--161}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122812}, doi = {10.1109/ISIAS.2011.6122812}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/SaadT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SaadiBG11, author = {Karima Ait Saadi and Ahmed Bouridane and Abdelrazek Guessoum}, title = {{H.264/AVC} digital fingerprinting based on content adaptive embedding}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {360--365}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122780}, doi = {10.1109/ISIAS.2011.6122780}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/SaadiBG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SabriNS11, author = {Fatin Norsyafawati Mohd Sabri and Norita Md Norwawi and Kamaruzzaman Seman}, title = {Hybrid of rough set theory and Artificial Immune Recognition System as a solution to decrease false alarm rate in intrusion detection system}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {134--138}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122808}, doi = {10.1109/ISIAS.2011.6122808}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/SabriNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SafieSP11, author = {Sairul Izwan Safie and John J. Soraghan and Lykourgos Petropoulakis}, title = {Pulse Active Mean {(PAM):} {A} {PIN} supporting feature extraction algorithm for doubly secure authentication}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {210--214}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122821}, doi = {10.1109/ISIAS.2011.6122821}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/SafieSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SamardjiskaCG11, author = {Simona Samardjiska and Yanling Chen and Danilo Gligoroski}, title = {Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {314--319}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122839}, doi = {10.1109/ISIAS.2011.6122839}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/SamardjiskaCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ShahadiJ11, author = {Haider Ismael Shahadi and Razali Jidin}, title = {High capacity and inaudibility audio steganography scheme}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {104--109}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122803}, doi = {10.1109/ISIAS.2011.6122803}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/ShahadiJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ShuhaimiARA11, author = {Mohammad Ali Arsyad bin Mohd Shuhaimi and Zaheera binti Zainal Abidin and Irda binti Roslan and Syarulnaziah binti Anawar}, title = {The new services in Nagios: Network bandwidth utility, email notification and sms alert in improving the network performance}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {86--91}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122800}, doi = {10.1109/ISIAS.2011.6122800}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ShuhaimiARA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/SomCM11, author = {Subhranil Som and Niladri Shekhar Chatergee and J. K. Mandal}, title = {Key based bit level genetic cryptographic technique {(KBGCT)}}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {240--245}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122826}, doi = {10.1109/ISIAS.2011.6122826}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/SomCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/TaremianN11, author = {Hamid Reza Taremian and Mahdi Pakdaman Naeini}, title = {Hybrid Intelligent Decision Support System for credit risk assessment}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {167--172}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122814}, doi = {10.1109/ISIAS.2011.6122814}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/TaremianN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/TeoWDS11, author = {Sui{-}Guan Teo and Kenneth Koon{-}Ho Wong and Ed Dawson and Leonie Simpson}, title = {State convergence and the effectiveness of time-memory-data tradeoffs}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {92--97}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122801}, doi = {10.1109/ISIAS.2011.6122801}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/TeoWDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/VeerubhotlaS11, author = {Ravi Sankar Veerubhotla and Ashutosh Saxena}, title = {A {DRM} framework towards preventing digital piracy}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122785}, doi = {10.1109/ISIAS.2011.6122785}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/VeerubhotlaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/WeerasenaBKDNW11, author = {H. H. Weerasena and P. B. S. Bandara and J. R. B. Kulasekara and B. M. B. Dassanayake and U. A. A. Niroshika and P. R. Wijenayake}, title = {Strategic approach for high performance object tracking in a network of surveillance cameras}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {280--285}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122846}, doi = {10.1109/ISIAS.2011.6122846}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/WeerasenaBKDNW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/WilkinY11, author = {Tee Wilkin and Shih Yin Ooi}, title = {State of the art: Signature verification system}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {110--115}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122804}, doi = {10.1109/ISIAS.2011.6122804}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/WilkinY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/XuTY11, author = {Dongyang Xu and Zhi Tang and Yinyan Yu}, title = {An extended rights expression model supporting dynamic digital rights management}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {186--191}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122817}, doi = {10.1109/ISIAS.2011.6122817}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/XuTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/YapYY11, author = {Wun{-}She Yap and Sze Ling Yeo and Chee Hoo Yian}, title = {Cryptanalysis of the full {CHAIN} cipher}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {40--45}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122792}, doi = {10.1109/ISIAS.2011.6122792}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/YapYY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZabidiMZ11, author = {Muhammad Najmi Ahmad Zabidi and Mohd Aizaini Maarof and Anazida Zainal}, title = {Ensemble based categorization and adaptive model for malware detection}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {80--85}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122799}, doi = {10.1109/ISIAS.2011.6122799}, timestamp = {Mon, 29 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/ZabidiMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZamanidoostNHFF11, author = {Yadollah Zamanidoost and Antonio Navarro and Zhinoos Razavi Hesabi and Nima Rahimi Froshani and Fatemeh Farnia}, title = {Robust video watermarking against {JPEG} compression in 3D-DWT domain}, booktitle = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, pages = {30--34}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIAS.2011.6122790}, doi = {10.1109/ISIAS.2011.6122790}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ZamanidoostNHFF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEias/2011, title = {7th International Conference on Information Assurance and Security, {IAS} 2011, Melacca, Malaysia, December 5-8, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6112288/proceeding}, isbn = {978-1-4577-2154-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.