default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 35 matches
- 2010
- Jemal H. Abawajy, Tai-Hoon Kim:
Performance Analysis of Cyber Security Awareness Delivery Methods. FGIT-SecTech/DRBC 2010: 142-148 - Mushtaq Ahmad:
Wireless Network Security Vulnerabilities and Concerns. FGIT-SecTech/DRBC 2010: 207-219 - Abdullah Sharaf Alghamdi, Syed Amanullah Quadri, Iftikhar Ahmad, Khalid Al-Nafjan:
A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems. FGIT-SecTech/DRBC 2010: 244-249 - Raed Alosaimy, Khaled Alghathbar, Alaaeldin M. Hafez, Mohamed Hamdy Eldefrawy:
NMACA Approach Used to Build a Secure Message Authentication Code. FGIT-SecTech/DRBC 2010: 290-298 - Nagaraj Ambika, G. T. Raju:
Figment Authentication Scheme in Wireless Sensor Network. FGIT-SecTech/DRBC 2010: 220-223 - Maricel O. Balitanas, Tai-Hoon Kim:
Insecure Information System's Solution Using Isolation Method. FGIT-SecTech/DRBC 2010: 276-281 - Bo-heung Chung, Jung-nye Kim:
Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device. FGIT-SecTech/DRBC 2010: 68-73 - A. J. Clark, Patton Holliday, Robyn Chau, Harris Eisenberg, Melinda Chau:
Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010. FGIT-SecTech/DRBC 2010: 250-258 - Pranab Kumar Dhar, Cheol Hong Kim, Jong-Myon Kim:
Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model. FGIT-SecTech/DRBC 2010: 114-125 - Pranab Kumar Dhar, Mohammad Ibrahim Khan, Cheol Hong Kim, Jong-Myon Kim:
An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection. FGIT-SecTech/DRBC 2010: 104-113 - Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar:
One-Time Password System with Infinite Nested Hash Chains. FGIT-SecTech/DRBC 2010: 161-170 - Davrondzhon Gafurov:
Emerging Biometric Modalities: Challenges and Opportunities. FGIT-SecTech/DRBC 2010: 29-38 - Davrondzhon Gafurov, Patrick Bours:
Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor. FGIT-SecTech/DRBC 2010: 179-186 - Davrondzhon Gafurov, Patrick Bours, Bian Yang, Christoph Busch:
Impact of Finger Type in Fingerprint Authentication. FGIT-SecTech/DRBC 2010: 1-7 - Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
Human Authentication Based on ECG Waves Using Radon Transform. FGIT-SecTech/DRBC 2010: 197-206 - Wei Huang, Arthur Mynnet:
Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model. FGIT-SecTech/DRBC 2010: 259-268 - Hsiang-Cheh Huang, Ting-Hsuan Wang, Wai-Chi Fang:
Histogram-Based Reversible Data Hiding with Quadtree Concepts. FGIT-SecTech/DRBC 2010: 126-133 - Ju-Sung Kang, Okyeon Yi:
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP. FGIT-SecTech/DRBC 2010: 39-46 - Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji:
Using Arabic CAPTCHA for Cyber Security. FGIT-SecTech/DRBC 2010: 8-17 - Zeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid:
Issues of Security and Network Load in Presence - A Survey. FGIT-SecTech/DRBC 2010: 224-230 - Taehyoung Kim, Inhyuk Kim, Changwoo Min, Young Ik Eom:
MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology. FGIT-SecTech/DRBC 2010: 134-141 - Intae Kim, Keewook Rim, Junghyun Lee:
Secure OSGi Platform against Service Injection. FGIT-SecTech/DRBC 2010: 74-83 - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Fusion of Moving and Static Facial Features for Robust Face Recognition. FGIT-SecTech/DRBC 2010: 187-196 - Hoon Ko, Zita A. Vale:
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence. FGIT-SecTech/DRBC 2010: 171-178 - Syed Irfan Nabi, Abdulrahman A. Mirza, Khaled Alghathbar:
Information Assurance in Saudi Organizations - An Empirical Study. FGIT-SecTech/DRBC 2010: 18-28 - Syed Irfan Nabi, Syed Waqar Nabi, Syed Awais Ahmed Tipu, Bushra Haqqi, Zahra Abid, Khaled Alghathbar:
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan. FGIT-SecTech/DRBC 2010: 47-56 - Aneel Rahim, Fahad Bin Muhaya:
Discovering the Botnet Detection Techniques. FGIT-SecTech/DRBC 2010: 231-235 - Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar:
Contactless Biometrics in Wireless Sensor Network: A Survey. FGIT-SecTech/DRBC 2010: 236-243 - Rosslin John Robles, Tai-Hoon Kim:
Communication Security for Control Systems in Smart Grid. FGIT-SecTech/DRBC 2010: 282-289 - Rosslin John Robles, Haeng-Kon Kim, Tai-Hoon Kim:
Internet SCADA Utilizing API's as Data Source. FGIT-SecTech/DRBC 2010: 269-275
skipping 5 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-30 13:01 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint