Search dblp for Publications

export results for "toc:db/conf/icitst/icitst2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icitst/AbdounATADK15,
  author       = {Nabil Abdoun and
                  Safwan El Assad and
                  Mohammad AbuTaha and
                  Rima Assaf and
                  Olivier D{\'{e}}forges and
                  Mohamad Khalil},
  title        = {Hash function based on efficient Chaotic Neural Network},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {32--37},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412051},
  doi          = {10.1109/ICITST.2015.7412051},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdounATADK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbuTahaAFQD15,
  author       = {Mohammed AbuTaha and
                  Safwan El Assad and
                  Mousa Farajallah and
                  Audrey Queudet and
                  Olivier D{\'{e}}forges},
  title        = {Chaos-based cryptosystems using dependent diffusion: An overview},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {44--49},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412053},
  doi          = {10.1109/ICITST.2015.7412053},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbuTahaAFQD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-Fedaghi15,
  author       = {Sabah Al{-}Fedaghi},
  title        = {Conceptual maps for physical security},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {343--348},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412118},
  doi          = {10.1109/ICITST.2015.7412118},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-Fedaghi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-Khasawneh15,
  author       = {Ahmad Al{-}Khasawneh},
  title        = {Toward power consumption in partitioned Wireless Sensors Networks
                  routing technique},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {238--241},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412097},
  doi          = {10.1109/ICITST.2015.7412097},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-Khasawneh15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-khomsanAAA15,
  author       = {Mashail N. Alkhomsan and
                  Alaa Al{-}Arjan and
                  Abrar Al{-}Amro and
                  Khalid Al{-}Nafjan},
  title        = {Usability evaluation of Twitter on Android platform for elderly Arab
                  users using morae evaluation tool},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {446--447},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412139},
  doi          = {10.1109/ICITST.2015.7412139},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-khomsanAAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Alazri15,
  author       = {Aisha Suliaman Alazri},
  title        = {The awareness of social engineering in information revolution: Techniques
                  and challenges},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {198--201},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412088},
  doi          = {10.1109/ICITST.2015.7412088},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Alazri15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AldawsariBE15,
  author       = {Bandar Aldawsari and
                  Thar Baker and
                  David England},
  title        = {Towards a holistic brokerage system for multi-cloud environment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {249--255},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412100},
  doi          = {10.1109/ICITST.2015.7412100},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AldawsariBE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlkeemYZ15,
  author       = {Ebrahim Al Alkeem and
                  Chan Yeob Yeun and
                  M. Jamal Zemerly},
  title        = {Security and privacy framework for ubiquitous healthcare IoT devices},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {70--75},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412059},
  doi          = {10.1109/ICITST.2015.7412059},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlkeemYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlmutairiPF15,
  author       = {Abdulrazaq Almutairi and
                  David J. Parish and
                  James A. Flint},
  title        = {Predicting multi-stage attacks based on {IP} information},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {384--390},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412127},
  doi          = {10.1109/ICITST.2015.7412127},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlmutairiPF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiFC15,
  author       = {Saud Alotaibi and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {Transparent authentication systems for mobile device security: {A}
                  review},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {406--413},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412131},
  doi          = {10.1109/ICITST.2015.7412131},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiFC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlthebyanMYJ15,
  author       = {Qutaibah Althebyan and
                  Rami Mohawesh and
                  Qussai Yaseen and
                  Yaser Jararweh},
  title        = {Mitigating insider threats in a cloud using a knowledgebase approach
                  while maintaining data availability},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {226--231},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412094},
  doi          = {10.1109/ICITST.2015.7412094},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlthebyanMYJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlthobaitiM15,
  author       = {Maha Althobaiti and
                  Pam J. Mayhew},
  title        = {Usable security of authentication process: New approach and practical
                  assessment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {179--180},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412083},
  doi          = {10.1109/ICITST.2015.7412083},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlthobaitiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmanS15,
  author       = {Waqas Aman and
                  Einar Snekkenes},
  title        = {Managing security trade-offs in the Internet of Things using adaptive
                  security},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {362--368},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412122},
  doi          = {10.1109/ICITST.2015.7412122},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AouamiSRO15,
  author       = {Rachid Aouami and
                  Essaid Sabir and
                  Mounir Rifi and
                  Mohamed Ouzzif},
  title        = {Fountain-code-enabled {DCF} for optimazing throughput in wireless
                  sensors},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {431--436},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412136},
  doi          = {10.1109/ICITST.2015.7412136},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AouamiSRO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AyoungSA15,
  author       = {Azerikatoa D. Ayoung and
                  Boyce Sigweni and
                  Pamela Abbott},
  title        = {Case-based reasoning system for predicting the sustainability of a
                  telecentre},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {125--130},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412072},
  doi          = {10.1109/ICITST.2015.7412072},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AyoungSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BaekKA15,
  author       = {Gui{-}hyun Baek and
                  Su{-}kyoung Kim and
                  Ki{-}hong Ahn},
  title        = {Framework for automatically construct ontology knowledge base from
                  semi-structured datasets},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {152--157},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412077},
  doi          = {10.1109/ICITST.2015.7412077},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BaekKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BeniwalZL15,
  author       = {Rohit Beniwal and
                  Pavol Zavarsky and
                  Dale Lindskog},
  title        = {Study of compliance of Apple's location based APIs with recommendations
                  of the {IETF} Geopriv},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {214--219},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412092},
  doi          = {10.1109/ICITST.2015.7412092},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BeniwalZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CampbellPM15,
  author       = {Ronald M. Campbell and
                  Keshnee Padayachee and
                  Themba Masombuka},
  title        = {A survey of honeypot research: Trends and opportunities},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {208--212},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412090},
  doi          = {10.1109/ICITST.2015.7412090},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CampbellPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Chetto15,
  author       = {Maryline Chetto},
  title        = {Keynote speaker 5: Issues in energy harvesting cyber-physical systems},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {21},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412046},
  doi          = {10.1109/ICITST.2015.7412046},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Chetto15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DasMN15,
  author       = {Batsayan Das and
                  Lakshmipadmaja Maddali and
                  Harshita Vani Nallagonda},
  title        = {Role-based privilege isolation: {A} novel authorization model for
                  Android smart devices},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {220--225},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412093},
  doi          = {10.1109/ICITST.2015.7412093},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DasMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DelailY15,
  author       = {Buti Al Delail and
                  Chan Yeob Yeun},
  title        = {Recent advances of smart glass application security and privacy},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {65--69},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412058},
  doi          = {10.1109/ICITST.2015.7412058},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/DelailY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DennisO15,
  author       = {Richard Dennis and
                  Gareth Owen},
  title        = {Rep on the block: {A} next generation reputation system based on the
                  blockchain},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {131--138},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412073},
  doi          = {10.1109/ICITST.2015.7412073},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DennisO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FallahpourM15,
  author       = {Mehdi Fallahpour and
                  David Meg{\'{\i}}as},
  title        = {Transparent high capacity audio watermarking in wavelet domain},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {242--247},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412098},
  doi          = {10.1109/ICITST.2015.7412098},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FallahpourM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FarooqKVI15,
  author       = {Ali Farooq and
                  Syed Rameez Ullah Kakakhel and
                  Seppo Virtanen and
                  Jouni Isoaho},
  title        = {A taxonomy of perceived information security and privacy threats among
                  {IT} security students},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {280--286},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412106},
  doi          = {10.1109/ICITST.2015.7412106},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/FarooqKVI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FengTM15,
  author       = {Guanyuan Feng and
                  Xuezhi Tan and
                  Lin Ma},
  title        = {Visual location recognition using smartphone sensors for indoor environment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {426--430},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412135},
  doi          = {10.1109/ICITST.2015.7412135},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FengTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Frein15,
  author       = {Ruair{\'{\i}} de Fr{\'{e}}in},
  title        = {Load-adjusted video quality prediction methods for missing data},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {314--319},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412111},
  doi          = {10.1109/ICITST.2015.7412111},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Frein15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Geels15,
  author       = {Frank W. Geels},
  title        = {Keynote speaker 4: Socio-technical transitions towards sustainability},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {20},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412045},
  doi          = {10.1109/ICITST.2015.7412045},
  timestamp    = {Sat, 28 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Geels15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GhauriHI15,
  author       = {Sajjad Ahmed Ghauri and
                  Hasan Humayun and
                  Mobeen Iqbal},
  title        = {Low complexity linear equalization of doubly selective channel},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {400--405},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412130},
  doi          = {10.1109/ICITST.2015.7412130},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GhauriHI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HentabliM15,
  author       = {Wahiba Hentabli and
                  Fatiha Merazka},
  title        = {An extension of RSA{\_}512 to RSA{\_}1024 core under hardware platform
                  based on montgomery powering},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {448--453},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412140},
  doi          = {10.1109/ICITST.2015.7412140},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HentabliM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HillmannSRR15,
  author       = {Peter Hillmann and
                  Lars Stiemert and
                  Gabi Dreo Rodosek and
                  Oliver Rose},
  title        = {Dragoon: Advanced modelling of {IP} geolocation by use of latency
                  measurements},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {438--445},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412138},
  doi          = {10.1109/ICITST.2015.7412138},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HillmannSRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HlyneZB15,
  author       = {Chit Nyi Nyi Hlyne and
                  Pavol Zavarsky and
                  Sergey Butakov},
  title        = {{SCAP} benchmark for Cisco router security configuration compliance},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {270--276},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412104},
  doi          = {10.1109/ICITST.2015.7412104},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/HlyneZB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Hurley-SmithWA15,
  author       = {Darren Hurley{-}Smith and
                  Jodie Wetherall and
                  Andrew A. Adekunle},
  title        = {Virtual closed networks: {A} secure approach to autonomous mobile
                  ad hoc networks},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {391--398},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412128},
  doi          = {10.1109/ICITST.2015.7412128},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Hurley-SmithWA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JallouliACLC15,
  author       = {Ons Jallouli and
                  Safwan El Assad and
                  Maryline Chetto and
                  Ren{\'{e}} Lozi and
                  Daniel Caragata},
  title        = {A novel chaotic generator based on weakly-coupled discrete skewtent
                  maps},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {38--43},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412052},
  doi          = {10.1109/ICITST.2015.7412052},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JallouliACLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JilnaDJ15,
  author       = {Payingat Jilna and
                  P. P. Deepthi and
                  U. K. Jayaraj},
  title        = {Optimized hardware design and implementation of {EC} based key management
                  scheme for {WSN}},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {164--169},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412079},
  doi          = {10.1109/ICITST.2015.7412079},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JilnaDJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Kim15,
  author       = {Mincheol Kim},
  title        = {Application of theory of reasoned action in u-health system},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {177--178},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412082},
  doi          = {10.1109/ICITST.2015.7412082},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Kim15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimP15,
  author       = {Min{-}Gu Kim and
                  Sung Bum Pan},
  title        = {A study on the flame detection and object classification technique
                  using the color information},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {120--123},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412070},
  doi          = {10.1109/ICITST.2015.7412070},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimakE15,
  author       = {Stefan Kimak and
                  Jeremy Ellman},
  title        = {The role of {HTML5} IndexedDB, the past, present and future},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {379--383},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412126},
  doi          = {10.1109/ICITST.2015.7412126},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimakE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KoscinaC15,
  author       = {Mirko Koscina and
                  Daniel Caragata},
  title        = {Bench-marking of traditional cryptographic algorithms and chaos-based
                  algorithms with {DNA} operations},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {26--31},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412050},
  doi          = {10.1109/ICITST.2015.7412050},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KoscinaC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KuzeIYCM15,
  author       = {Naomi Kuze and
                  Shu Ishikura and
                  Takeshi Yagi and
                  Daiki Chiba and
                  Masayuki Murata},
  title        = {Crawler classification using ant-based clustering scheme},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {84--89},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412063},
  doi          = {10.1109/ICITST.2015.7412063},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/KuzeIYCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LahmerZ15,
  author       = {Ibrahim Lahmer and
                  Ning Zhang},
  title        = {MapReduce: {A} critical analysis of existing authentication methods},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {302--313},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412110},
  doi          = {10.1109/ICITST.2015.7412110},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/LahmerZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LebronSL15,
  author       = {David Lebron and
                  Hossain Shahriar and
                  Rubana Yasmin Lupu},
  title        = {Security concerns and mitigation approaches for MOOC-based applications},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {145--150},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412075},
  doi          = {10.1109/ICITST.2015.7412075},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LebronSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MahmoudYAZ15,
  author       = {Rwan Mahmoud and
                  Tasneem Yousuf and
                  Fadi A. Aloul and
                  Imran A. Zualkernan},
  title        = {Internet of things (IoT) security: Current status, challenges and
                  prospective measures},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {336--341},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412116},
  doi          = {10.1109/ICITST.2015.7412116},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MahmoudYAZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MakitlaM15,
  author       = {Ishmael Makitla and
                  Jabu Mtsweni},
  title        = {A generalized web service response time metric to support collaborative
                  and corroborative web service monitoring},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {373--377},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412124},
  doi          = {10.1109/ICITST.2015.7412124},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MakitlaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MansooriY15,
  author       = {Fatema Al Mansoori and
                  Chan Yeob Yeun},
  title        = {Emerging new trends of location based systems security},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {158--163},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412078},
  doi          = {10.1109/ICITST.2015.7412078},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MansooriY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MarLC15,
  author       = {Kheng Kok Mar and
                  Chee Yong Law and
                  Victoria Chin},
  title        = {Secure personal cloud storage},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {108--113},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412068},
  doi          = {10.1109/ICITST.2015.7412068},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MarLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MedberyO15,
  author       = {Clinton Medbery and
                  Aspen Olmsted},
  title        = {HeartSync: Mobile pacemaker failure detector},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {277--279},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412105},
  doi          = {10.1109/ICITST.2015.7412105},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MedberyO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MerazkaB15,
  author       = {Fatiha Merazka and
                  Fulvio Babich},
  title        = {Dynamic forward error correction algorithm over {IP} network services
                  for {ITU-T} {G.722.2} codec},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {369--372},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412123},
  doi          = {10.1109/ICITST.2015.7412123},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MerazkaB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NtrigkogiasP15,
  author       = {Christos Ntrigkogias and
                  Nineta Polemi},
  title        = {Assessment of research efforts in surveillance systems},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {288--294},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412108},
  doi          = {10.1109/ICITST.2015.7412108},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NtrigkogiasP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Olmsted15,
  author       = {Aspen Olmsted},
  title        = {Keynote speaker 3: Secure software engineering in the cloud},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {19},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412044},
  doi          = {10.1109/ICITST.2015.7412044},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Olmsted15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Olmsted15a,
  author       = {Aspen Olmsted},
  title        = {Long running, consistent, web service transactions},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {139--144},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412074},
  doi          = {10.1109/ICITST.2015.7412074},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Olmsted15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ParvezZK15,
  author       = {Muhammad Parvez and
                  Pavol Zavarsky and
                  Nidal Khoury},
  title        = {Analysis of effectiveness of black-box web application scanners in
                  detection of stored {SQL} injection and stored {XSS} vulnerabilities},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {186--191},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412085},
  doi          = {10.1109/ICITST.2015.7412085},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ParvezZK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PetersideZB15,
  author       = {Gabriel Biedima Peterside and
                  Pavol Zavarsky and
                  Sergey Butakov},
  title        = {Automated security configuration checklist for a cisco IPsec {VPN}
                  router using {SCAP} 1.2},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {355--360},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412120},
  doi          = {10.1109/ICITST.2015.7412120},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/PetersideZB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PleteaSVP15,
  author       = {Daniel Pletea and
                  Saeed Sedghi and
                  Meilof Veeningen and
                  Milan Petkovic},
  title        = {Secure distributed key generation in attribute based encryption systems},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {103--107},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412067},
  doi          = {10.1109/ICITST.2015.7412067},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PleteaSVP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PolemiP15,
  author       = {Nineta Polemi and
                  Spyros Papastergiou},
  title        = {Current efforts in ports and supply chains risk assessment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {349--354},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412119},
  doi          = {10.1109/ICITST.2015.7412119},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PolemiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RahmanA15,
  author       = {Md. Rahatur Rahman and
                  Shamim Akhter},
  title        = {Bi-directional traffic management support system with decision tree
                  based dynamic routing},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {170--175},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412080},
  doi          = {10.1109/ICITST.2015.7412080},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/RahmanA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Rehman15,
  author       = {Shafiq ur R{\'{e}}hman},
  title        = {iBook: An interactive book system},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {233--237},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412096},
  doi          = {10.1109/ICITST.2015.7412096},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Rehman15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ReshmiR15,
  author       = {G. Reshmi and
                  C. S. Rakshmy},
  title        = {A survey of authentication methods in mobile cloud computing},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {58--63},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412056},
  doi          = {10.1109/ICITST.2015.7412056},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ReshmiR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SathiyaBalanZLB15,
  author       = {Vimal Kumar SathiyaBalan and
                  Pavol Zavarsky and
                  Dale Lindskog and
                  Sergey Butakov},
  title        = {Study of applicability of Chinese remainder theorem based group key
                  management for cloud environment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {114--119},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412069},
  doi          = {10.1109/ICITST.2015.7412069},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SathiyaBalanZLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SherifFC15,
  author       = {Emad Sherif and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {Awareness, behaviour and culture: The {ABC} in cultivating security
                  compliance},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {90--94},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412064},
  doi          = {10.1109/ICITST.2015.7412064},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SherifFC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SieweA15,
  author       = {Fran{\c{c}}ois Siewe and
                  Ahmed Al{-}alshuhai},
  title        = {From use case diagrams to executable context-aware ambients},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {263--268},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412102},
  doi          = {10.1109/ICITST.2015.7412102},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SieweA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SinghMS15,
  author       = {Shirish Kumar Singh and
                  Bharavi Mishra and
                  Saket Singh},
  title        = {Detecting intelligent malware on dynamic Android analysis environments},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {414--419},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412132},
  doi          = {10.1109/ICITST.2015.7412132},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SinghMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SoupionisB15,
  author       = {Yannis Soupionis and
                  Thierry Benoist},
  title        = {Cyber-physical testbed - The impact of cyber attacks and the human
                  factor},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {326--331},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412114},
  doi          = {10.1109/ICITST.2015.7412114},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SoupionisB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SpengerK15,
  author       = {Gabriele Spenger and
                  J{\"{o}}rg Keller},
  title        = {Security aspects of PRNGs with large state spaces},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {181--185},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412084},
  doi          = {10.1109/ICITST.2015.7412084},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SpengerK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TerziTS15,
  author       = {Duygu Sinanc Terzi and
                  Ramazan Terzi and
                  Seref Sagiroglu},
  title        = {A survey on security and privacy issues in big data},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {202--207},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412089},
  doi          = {10.1109/ICITST.2015.7412089},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TerziTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Torkura0M15,
  author       = {Kennedy A. Torkura and
                  Feng Cheng and
                  Christoph Meinel},
  title        = {A proposed framework for proactive vulnerability assessments in cloud
                  deployments},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {51--57},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412055},
  doi          = {10.1109/ICITST.2015.7412055},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Torkura0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Torkura0M15a,
  author       = {Kennedy A. Torkura and
                  Feng Cheng and
                  Christoph Meinel},
  title        = {Application of quantitative security metrics in cloud computing},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {256--262},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412101},
  doi          = {10.1109/ICITST.2015.7412101},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Torkura0M15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Valluri15,
  author       = {Abhijit Kiran Valluri},
  title        = {Equilibrium properties of rate control protocols},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {295--301},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412109},
  doi          = {10.1109/ICITST.2015.7412109},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Valluri15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VatsRA15,
  author       = {Himanshu Vats and
                  Ron Ruhl and
                  Shaun Aghili},
  title        = {Fingerprint security for protecting {EMV} payment cards},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {95--101},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412065},
  doi          = {10.1109/ICITST.2015.7412065},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VatsRA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Visser15,
  author       = {Martin Visser},
  title        = {Keynote speaker 2: Swimming against the current - Dealing with {ICS}
                  cyber threats in the Water Sector},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {17--18},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412043},
  doi          = {10.1109/ICITST.2015.7412043},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Visser15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Wang15,
  author       = {Frank Zhigang Wang},
  title        = {Keynote speaker 1: Computer Evolution over the next decade: Fact or
                  fiction?},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {16},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412042},
  doi          = {10.1109/ICITST.2015.7412042},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Wang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Warwick15,
  author       = {Kevin Warwick},
  title        = {{ICITST} honorary chair and distinguished keynote speaker: The cyborg
                  experiments},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {15},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412041},
  doi          = {10.1109/ICITST.2015.7412041},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Warwick15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YamadaMUTT15,
  author       = {Masahiro Yamada and
                  Masanobu Morinaga and
                  Yuki Unno and
                  Satoru Torii and
                  Masahiko Takenaka},
  title        = {RAT-based malicious activities detection on enterprise internal networks},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {321--325},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412113},
  doi          = {10.1109/ICITST.2015.7412113},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YamadaMUTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YoonJK15,
  author       = {Soojin Yoon and
                  JongHun Jung and
                  Hwan{-}Kuk Kim},
  title        = {Attacks on Web browsers with {HTML5}},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {193--197},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412087},
  doi          = {10.1109/ICITST.2015.7412087},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YoonJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YueW15,
  author       = {Wong Seng Yue and
                  Wong Lai Wan},
  title        = {The effectiveness of digital game for introductory programming concepts},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {421--425},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412134},
  doi          = {10.1109/ICITST.2015.7412134},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YueW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZainudinRZHI15,
  author       = {Norulzahrah Mohd. Zainudin and
                  Suzaimah Ramli and
                  Tuan Khalisah Tan Zizi and
                  Nor Asiakin Hasbullah and
                  Norazlin Ibrahim},
  title        = {Facial expression change detection algorithm using optical flow technique},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {332--335},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412115},
  doi          = {10.1109/ICITST.2015.7412115},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZainudinRZHI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhanZ15,
  author       = {Lifei Zhan and
                  Yuesheng Zhu},
  title        = {Passive forensics for image splicing based on {PCA} noise estimation},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {78--83},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412062},
  doi          = {10.1109/ICITST.2015.7412062},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhanZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2015,
  title        = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7400833/proceeding},
  isbn         = {978-1-9083-2052-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}