default search action
Search dblp for Publications
export results for "toc:db/conf/icitst/icitst2015.bht:"
@inproceedings{DBLP:conf/icitst/AbdounATADK15, author = {Nabil Abdoun and Safwan El Assad and Mohammad AbuTaha and Rima Assaf and Olivier D{\'{e}}forges and Mohamad Khalil}, title = {Hash function based on efficient Chaotic Neural Network}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {32--37}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412051}, doi = {10.1109/ICITST.2015.7412051}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdounATADK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbuTahaAFQD15, author = {Mohammed AbuTaha and Safwan El Assad and Mousa Farajallah and Audrey Queudet and Olivier D{\'{e}}forges}, title = {Chaos-based cryptosystems using dependent diffusion: An overview}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {44--49}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412053}, doi = {10.1109/ICITST.2015.7412053}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbuTahaAFQD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-Fedaghi15, author = {Sabah Al{-}Fedaghi}, title = {Conceptual maps for physical security}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {343--348}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412118}, doi = {10.1109/ICITST.2015.7412118}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-Fedaghi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-Khasawneh15, author = {Ahmad Al{-}Khasawneh}, title = {Toward power consumption in partitioned Wireless Sensors Networks routing technique}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {238--241}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412097}, doi = {10.1109/ICITST.2015.7412097}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-Khasawneh15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-khomsanAAA15, author = {Mashail N. Alkhomsan and Alaa Al{-}Arjan and Abrar Al{-}Amro and Khalid Al{-}Nafjan}, title = {Usability evaluation of Twitter on Android platform for elderly Arab users using morae evaluation tool}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {446--447}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412139}, doi = {10.1109/ICITST.2015.7412139}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-khomsanAAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alazri15, author = {Aisha Suliaman Alazri}, title = {The awareness of social engineering in information revolution: Techniques and challenges}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {198--201}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412088}, doi = {10.1109/ICITST.2015.7412088}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alazri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AldawsariBE15, author = {Bandar Aldawsari and Thar Baker and David England}, title = {Towards a holistic brokerage system for multi-cloud environment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {249--255}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412100}, doi = {10.1109/ICITST.2015.7412100}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AldawsariBE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlkeemYZ15, author = {Ebrahim Al Alkeem and Chan Yeob Yeun and M. Jamal Zemerly}, title = {Security and privacy framework for ubiquitous healthcare IoT devices}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {70--75}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412059}, doi = {10.1109/ICITST.2015.7412059}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlkeemYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlmutairiPF15, author = {Abdulrazaq Almutairi and David J. Parish and James A. Flint}, title = {Predicting multi-stage attacks based on {IP} information}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {384--390}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412127}, doi = {10.1109/ICITST.2015.7412127}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlmutairiPF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiFC15, author = {Saud Alotaibi and Steven Furnell and Nathan L. Clarke}, title = {Transparent authentication systems for mobile device security: {A} review}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {406--413}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412131}, doi = {10.1109/ICITST.2015.7412131}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlthebyanMYJ15, author = {Qutaibah Althebyan and Rami Mohawesh and Qussai Yaseen and Yaser Jararweh}, title = {Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {226--231}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412094}, doi = {10.1109/ICITST.2015.7412094}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlthebyanMYJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlthobaitiM15, author = {Maha Althobaiti and Pam J. Mayhew}, title = {Usable security of authentication process: New approach and practical assessment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {179--180}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412083}, doi = {10.1109/ICITST.2015.7412083}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlthobaitiM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmanS15, author = {Waqas Aman and Einar Snekkenes}, title = {Managing security trade-offs in the Internet of Things using adaptive security}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {362--368}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412122}, doi = {10.1109/ICITST.2015.7412122}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AouamiSRO15, author = {Rachid Aouami and Essaid Sabir and Mounir Rifi and Mohamed Ouzzif}, title = {Fountain-code-enabled {DCF} for optimazing throughput in wireless sensors}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {431--436}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412136}, doi = {10.1109/ICITST.2015.7412136}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AouamiSRO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AyoungSA15, author = {Azerikatoa D. Ayoung and Boyce Sigweni and Pamela Abbott}, title = {Case-based reasoning system for predicting the sustainability of a telecentre}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {125--130}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412072}, doi = {10.1109/ICITST.2015.7412072}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AyoungSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BaekKA15, author = {Gui{-}hyun Baek and Su{-}kyoung Kim and Ki{-}hong Ahn}, title = {Framework for automatically construct ontology knowledge base from semi-structured datasets}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {152--157}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412077}, doi = {10.1109/ICITST.2015.7412077}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BaekKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BeniwalZL15, author = {Rohit Beniwal and Pavol Zavarsky and Dale Lindskog}, title = {Study of compliance of Apple's location based APIs with recommendations of the {IETF} Geopriv}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {214--219}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412092}, doi = {10.1109/ICITST.2015.7412092}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BeniwalZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CampbellPM15, author = {Ronald M. Campbell and Keshnee Padayachee and Themba Masombuka}, title = {A survey of honeypot research: Trends and opportunities}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {208--212}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412090}, doi = {10.1109/ICITST.2015.7412090}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CampbellPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Chetto15, author = {Maryline Chetto}, title = {Keynote speaker 5: Issues in energy harvesting cyber-physical systems}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {21}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412046}, doi = {10.1109/ICITST.2015.7412046}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Chetto15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DasMN15, author = {Batsayan Das and Lakshmipadmaja Maddali and Harshita Vani Nallagonda}, title = {Role-based privilege isolation: {A} novel authorization model for Android smart devices}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {220--225}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412093}, doi = {10.1109/ICITST.2015.7412093}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DasMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DelailY15, author = {Buti Al Delail and Chan Yeob Yeun}, title = {Recent advances of smart glass application security and privacy}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {65--69}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412058}, doi = {10.1109/ICITST.2015.7412058}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/DelailY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DennisO15, author = {Richard Dennis and Gareth Owen}, title = {Rep on the block: {A} next generation reputation system based on the blockchain}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {131--138}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412073}, doi = {10.1109/ICITST.2015.7412073}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DennisO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FallahpourM15, author = {Mehdi Fallahpour and David Meg{\'{\i}}as}, title = {Transparent high capacity audio watermarking in wavelet domain}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {242--247}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412098}, doi = {10.1109/ICITST.2015.7412098}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FallahpourM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FarooqKVI15, author = {Ali Farooq and Syed Rameez Ullah Kakakhel and Seppo Virtanen and Jouni Isoaho}, title = {A taxonomy of perceived information security and privacy threats among {IT} security students}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {280--286}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412106}, doi = {10.1109/ICITST.2015.7412106}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/FarooqKVI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FengTM15, author = {Guanyuan Feng and Xuezhi Tan and Lin Ma}, title = {Visual location recognition using smartphone sensors for indoor environment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {426--430}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412135}, doi = {10.1109/ICITST.2015.7412135}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FengTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Frein15, author = {Ruair{\'{\i}} de Fr{\'{e}}in}, title = {Load-adjusted video quality prediction methods for missing data}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {314--319}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412111}, doi = {10.1109/ICITST.2015.7412111}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Frein15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Geels15, author = {Frank W. Geels}, title = {Keynote speaker 4: Socio-technical transitions towards sustainability}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {20}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412045}, doi = {10.1109/ICITST.2015.7412045}, timestamp = {Sat, 28 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Geels15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GhauriHI15, author = {Sajjad Ahmed Ghauri and Hasan Humayun and Mobeen Iqbal}, title = {Low complexity linear equalization of doubly selective channel}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {400--405}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412130}, doi = {10.1109/ICITST.2015.7412130}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GhauriHI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HentabliM15, author = {Wahiba Hentabli and Fatiha Merazka}, title = {An extension of RSA{\_}512 to RSA{\_}1024 core under hardware platform based on montgomery powering}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {448--453}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412140}, doi = {10.1109/ICITST.2015.7412140}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HentabliM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HillmannSRR15, author = {Peter Hillmann and Lars Stiemert and Gabi Dreo Rodosek and Oliver Rose}, title = {Dragoon: Advanced modelling of {IP} geolocation by use of latency measurements}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {438--445}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412138}, doi = {10.1109/ICITST.2015.7412138}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HillmannSRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HlyneZB15, author = {Chit Nyi Nyi Hlyne and Pavol Zavarsky and Sergey Butakov}, title = {{SCAP} benchmark for Cisco router security configuration compliance}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {270--276}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412104}, doi = {10.1109/ICITST.2015.7412104}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/HlyneZB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hurley-SmithWA15, author = {Darren Hurley{-}Smith and Jodie Wetherall and Andrew A. Adekunle}, title = {Virtual closed networks: {A} secure approach to autonomous mobile ad hoc networks}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {391--398}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412128}, doi = {10.1109/ICITST.2015.7412128}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Hurley-SmithWA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JallouliACLC15, author = {Ons Jallouli and Safwan El Assad and Maryline Chetto and Ren{\'{e}} Lozi and Daniel Caragata}, title = {A novel chaotic generator based on weakly-coupled discrete skewtent maps}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {38--43}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412052}, doi = {10.1109/ICITST.2015.7412052}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JallouliACLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JilnaDJ15, author = {Payingat Jilna and P. P. Deepthi and U. K. Jayaraj}, title = {Optimized hardware design and implementation of {EC} based key management scheme for {WSN}}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {164--169}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412079}, doi = {10.1109/ICITST.2015.7412079}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JilnaDJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Kim15, author = {Mincheol Kim}, title = {Application of theory of reasoned action in u-health system}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {177--178}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412082}, doi = {10.1109/ICITST.2015.7412082}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Kim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimP15, author = {Min{-}Gu Kim and Sung Bum Pan}, title = {A study on the flame detection and object classification technique using the color information}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {120--123}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412070}, doi = {10.1109/ICITST.2015.7412070}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimakE15, author = {Stefan Kimak and Jeremy Ellman}, title = {The role of {HTML5} IndexedDB, the past, present and future}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {379--383}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412126}, doi = {10.1109/ICITST.2015.7412126}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimakE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KoscinaC15, author = {Mirko Koscina and Daniel Caragata}, title = {Bench-marking of traditional cryptographic algorithms and chaos-based algorithms with {DNA} operations}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {26--31}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412050}, doi = {10.1109/ICITST.2015.7412050}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KoscinaC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KuzeIYCM15, author = {Naomi Kuze and Shu Ishikura and Takeshi Yagi and Daiki Chiba and Masayuki Murata}, title = {Crawler classification using ant-based clustering scheme}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {84--89}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412063}, doi = {10.1109/ICITST.2015.7412063}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/KuzeIYCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LahmerZ15, author = {Ibrahim Lahmer and Ning Zhang}, title = {MapReduce: {A} critical analysis of existing authentication methods}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {302--313}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412110}, doi = {10.1109/ICITST.2015.7412110}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/LahmerZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LebronSL15, author = {David Lebron and Hossain Shahriar and Rubana Yasmin Lupu}, title = {Security concerns and mitigation approaches for MOOC-based applications}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {145--150}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412075}, doi = {10.1109/ICITST.2015.7412075}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LebronSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MahmoudYAZ15, author = {Rwan Mahmoud and Tasneem Yousuf and Fadi A. Aloul and Imran A. Zualkernan}, title = {Internet of things (IoT) security: Current status, challenges and prospective measures}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {336--341}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412116}, doi = {10.1109/ICITST.2015.7412116}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/MahmoudYAZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MakitlaM15, author = {Ishmael Makitla and Jabu Mtsweni}, title = {A generalized web service response time metric to support collaborative and corroborative web service monitoring}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {373--377}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412124}, doi = {10.1109/ICITST.2015.7412124}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MakitlaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MansooriY15, author = {Fatema Al Mansoori and Chan Yeob Yeun}, title = {Emerging new trends of location based systems security}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {158--163}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412078}, doi = {10.1109/ICITST.2015.7412078}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/MansooriY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MarLC15, author = {Kheng Kok Mar and Chee Yong Law and Victoria Chin}, title = {Secure personal cloud storage}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {108--113}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412068}, doi = {10.1109/ICITST.2015.7412068}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MarLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MedberyO15, author = {Clinton Medbery and Aspen Olmsted}, title = {HeartSync: Mobile pacemaker failure detector}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {277--279}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412105}, doi = {10.1109/ICITST.2015.7412105}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MedberyO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MerazkaB15, author = {Fatiha Merazka and Fulvio Babich}, title = {Dynamic forward error correction algorithm over {IP} network services for {ITU-T} {G.722.2} codec}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {369--372}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412123}, doi = {10.1109/ICITST.2015.7412123}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MerazkaB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NtrigkogiasP15, author = {Christos Ntrigkogias and Nineta Polemi}, title = {Assessment of research efforts in surveillance systems}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {288--294}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412108}, doi = {10.1109/ICITST.2015.7412108}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NtrigkogiasP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Olmsted15, author = {Aspen Olmsted}, title = {Keynote speaker 3: Secure software engineering in the cloud}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {19}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412044}, doi = {10.1109/ICITST.2015.7412044}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Olmsted15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Olmsted15a, author = {Aspen Olmsted}, title = {Long running, consistent, web service transactions}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {139--144}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412074}, doi = {10.1109/ICITST.2015.7412074}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Olmsted15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ParvezZK15, author = {Muhammad Parvez and Pavol Zavarsky and Nidal Khoury}, title = {Analysis of effectiveness of black-box web application scanners in detection of stored {SQL} injection and stored {XSS} vulnerabilities}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {186--191}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412085}, doi = {10.1109/ICITST.2015.7412085}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ParvezZK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PetersideZB15, author = {Gabriel Biedima Peterside and Pavol Zavarsky and Sergey Butakov}, title = {Automated security configuration checklist for a cisco IPsec {VPN} router using {SCAP} 1.2}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {355--360}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412120}, doi = {10.1109/ICITST.2015.7412120}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/PetersideZB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PleteaSVP15, author = {Daniel Pletea and Saeed Sedghi and Meilof Veeningen and Milan Petkovic}, title = {Secure distributed key generation in attribute based encryption systems}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {103--107}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412067}, doi = {10.1109/ICITST.2015.7412067}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PleteaSVP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PolemiP15, author = {Nineta Polemi and Spyros Papastergiou}, title = {Current efforts in ports and supply chains risk assessment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {349--354}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412119}, doi = {10.1109/ICITST.2015.7412119}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PolemiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RahmanA15, author = {Md. Rahatur Rahman and Shamim Akhter}, title = {Bi-directional traffic management support system with decision tree based dynamic routing}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {170--175}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412080}, doi = {10.1109/ICITST.2015.7412080}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/RahmanA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Rehman15, author = {Shafiq ur R{\'{e}}hman}, title = {iBook: An interactive book system}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {233--237}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412096}, doi = {10.1109/ICITST.2015.7412096}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Rehman15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ReshmiR15, author = {G. Reshmi and C. S. Rakshmy}, title = {A survey of authentication methods in mobile cloud computing}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {58--63}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412056}, doi = {10.1109/ICITST.2015.7412056}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ReshmiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SathiyaBalanZLB15, author = {Vimal Kumar SathiyaBalan and Pavol Zavarsky and Dale Lindskog and Sergey Butakov}, title = {Study of applicability of Chinese remainder theorem based group key management for cloud environment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {114--119}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412069}, doi = {10.1109/ICITST.2015.7412069}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SathiyaBalanZLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SherifFC15, author = {Emad Sherif and Steven Furnell and Nathan L. Clarke}, title = {Awareness, behaviour and culture: The {ABC} in cultivating security compliance}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {90--94}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412064}, doi = {10.1109/ICITST.2015.7412064}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SherifFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SieweA15, author = {Fran{\c{c}}ois Siewe and Ahmed Al{-}alshuhai}, title = {From use case diagrams to executable context-aware ambients}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {263--268}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412102}, doi = {10.1109/ICITST.2015.7412102}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SieweA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SinghMS15, author = {Shirish Kumar Singh and Bharavi Mishra and Saket Singh}, title = {Detecting intelligent malware on dynamic Android analysis environments}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {414--419}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412132}, doi = {10.1109/ICITST.2015.7412132}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SinghMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SoupionisB15, author = {Yannis Soupionis and Thierry Benoist}, title = {Cyber-physical testbed - The impact of cyber attacks and the human factor}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {326--331}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412114}, doi = {10.1109/ICITST.2015.7412114}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SoupionisB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SpengerK15, author = {Gabriele Spenger and J{\"{o}}rg Keller}, title = {Security aspects of PRNGs with large state spaces}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {181--185}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412084}, doi = {10.1109/ICITST.2015.7412084}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SpengerK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TerziTS15, author = {Duygu Sinanc Terzi and Ramazan Terzi and Seref Sagiroglu}, title = {A survey on security and privacy issues in big data}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {202--207}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412089}, doi = {10.1109/ICITST.2015.7412089}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TerziTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Torkura0M15, author = {Kennedy A. Torkura and Feng Cheng and Christoph Meinel}, title = {A proposed framework for proactive vulnerability assessments in cloud deployments}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {51--57}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412055}, doi = {10.1109/ICITST.2015.7412055}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Torkura0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Torkura0M15a, author = {Kennedy A. Torkura and Feng Cheng and Christoph Meinel}, title = {Application of quantitative security metrics in cloud computing}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {256--262}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412101}, doi = {10.1109/ICITST.2015.7412101}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Torkura0M15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Valluri15, author = {Abhijit Kiran Valluri}, title = {Equilibrium properties of rate control protocols}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {295--301}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412109}, doi = {10.1109/ICITST.2015.7412109}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Valluri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VatsRA15, author = {Himanshu Vats and Ron Ruhl and Shaun Aghili}, title = {Fingerprint security for protecting {EMV} payment cards}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {95--101}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412065}, doi = {10.1109/ICITST.2015.7412065}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VatsRA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Visser15, author = {Martin Visser}, title = {Keynote speaker 2: Swimming against the current - Dealing with {ICS} cyber threats in the Water Sector}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {17--18}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412043}, doi = {10.1109/ICITST.2015.7412043}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Visser15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Wang15, author = {Frank Zhigang Wang}, title = {Keynote speaker 1: Computer Evolution over the next decade: Fact or fiction?}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {16}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412042}, doi = {10.1109/ICITST.2015.7412042}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Wang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Warwick15, author = {Kevin Warwick}, title = {{ICITST} honorary chair and distinguished keynote speaker: The cyborg experiments}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {15}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412041}, doi = {10.1109/ICITST.2015.7412041}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Warwick15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YamadaMUTT15, author = {Masahiro Yamada and Masanobu Morinaga and Yuki Unno and Satoru Torii and Masahiko Takenaka}, title = {RAT-based malicious activities detection on enterprise internal networks}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {321--325}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412113}, doi = {10.1109/ICITST.2015.7412113}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YamadaMUTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YoonJK15, author = {Soojin Yoon and JongHun Jung and Hwan{-}Kuk Kim}, title = {Attacks on Web browsers with {HTML5}}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {193--197}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412087}, doi = {10.1109/ICITST.2015.7412087}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YoonJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YueW15, author = {Wong Seng Yue and Wong Lai Wan}, title = {The effectiveness of digital game for introductory programming concepts}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {421--425}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412134}, doi = {10.1109/ICITST.2015.7412134}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YueW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZainudinRZHI15, author = {Norulzahrah Mohd. Zainudin and Suzaimah Ramli and Tuan Khalisah Tan Zizi and Nor Asiakin Hasbullah and Norazlin Ibrahim}, title = {Facial expression change detection algorithm using optical flow technique}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {332--335}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412115}, doi = {10.1109/ICITST.2015.7412115}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZainudinRZHI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhanZ15, author = {Lifei Zhan and Yuesheng Zhu}, title = {Passive forensics for image splicing based on {PCA} noise estimation}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {78--83}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412062}, doi = {10.1109/ICITST.2015.7412062}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhanZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2015, title = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7400833/proceeding}, isbn = {978-1-9083-2052-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.