


default search action
ICITCS 2015: Kuala Lumpur, Malaysia
- 5th International Conference on IT Convergence and Security, ICITCS 2015, Kuala Lumpur, Malaysia, August 24-27, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-6537-6

- Syh-Yuan Tan, Ji-Jian Chin

, Geong Sen Poh, Yvonne H. S. Kam, Wei-Chuen Yau:
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications. 1-5 - Michel Toulouse, Quang Minh Bui

, Philip Curtis:
A Consensus Based Network Intrusion Detection System. 1-6 - Maleerat Sodanil, Chalermpong Intarat:

A Development of Image Enhancement for CCTV Images. 1-4 - Yuta Urushiyama, Yoshifumi Manabe:

A Double-Private epsilon-Fuzzy Matching Protocol. 1-4 - Seung-Ho Kang:

A Feature Selection Algorithm to Find Optimal Feature Subsets for Detecting DoS Attacks. 1-3 - Idris Abubakar Umar

, Zurina Mohd Hanapi
, Aduwati Sali
, Zuriati Ahmad Zukarnain
:
A Forwarding Strategy for DWSIGF Routing Protocol. 1-4 - AHyeon-Ju Park, Hye-Young Kim, Jong-In Lim:

A Framework of Device Authentication Management in IoT Environments. 1-3 - Yew Kwang Hooi

, Mohd Fadzil Hassan, Ahmad Izuddin B. Zainal Abidin, Noreen Izza Bt. Arshad, Azmi M. Shariff
:
A Generic Ontology Methodology and Factors to Address Design Consistency. 1-5 - Rashmi Agrawal

, Babu Ram:
A Modified K-Nearest Neighbor Algorithm to Handle Uncertain Data. 1-4 - So Yeon Kim, Sungdo Gu, Hyun-hwan Jeong

, Kyung-Ah Sohn
:
A Network Clustering Based Software Attribute Selection for Identifying Fault-Prone Modules. 1-5 - Abdulmawla M. A. Najih

, Syed Abdul Rahman Al-Haddad, Abd. Rahman Ramli, Shaiful Jahari Hashim:
A New Colour Image Watermarking Technique Using Special Domain. 1-5 - Soowoong Eo, Wooyeon Jo, Seokjun Lee, Taeshik Shon:

A Phase of Deleted File Recovery for Digital Forensics Research in Tizen. 1-3 - Md. Zaigham Zaheer, Jin Young Kim, Hyoung-Gook Kim, Seung You Na:

A Preliminary Study on Deep-Learning Based Screaming Sound Detection. 1-4 - Shirish Kumar Singh, Bharavi Mishra, Poonam Gera:

A Privacy Enhanced Security Framework for Android Users. 1-6 - Dang Hai Van, Nguyen Dinh Thuc:

A Privacy Preserving Message Authentication Code. 1-4 - Thong-Yun Teh, Yik-Shu Lee, Zi-Yik Cheah, Ji-Jian Chin

:
A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices. 1-5 - Yili Wang, Byung Jun Lee, Jung June Lee, Hee Yong Youn:

A PSO-Based Buffer Management Scheme for Improving Hit Ratio of Solid State Drive. 1-5 - K. Sangeeth, Preeja Pradeep

, P. L. Divya, P. Rekha, R. D. Arya Devi
, Sheeja L., Maneesha Vinodini Ramesh
:
A Remote Code Editing Framework for AMRITA Remote Triggered WSN Laboratory. 1-5 - Ali I. Adnan, Zurina Mohd Hanapi

, Mohamed Othman, Zuriati Ahmad Zukarnain
, Abubakar Sadiq:
A Reputation-Based Routing Protocol for Wireless Sensor Networks. 1-4 - Samaneh Rastegari, Chiou Peng Lam, Philip Hingston:

A Statistical Rule Learning Approach to Network Intrusion Detection. 1-5 - Komchan Chaitien, Chayaphon Tanwongvarl, Soamsiri Chantaraskul:

Adaptive Multichannel Approach for Congestion Control in Vehicular Safety Communications. 1-5 - Nakhoon Baek

:
Adding Advanced Debug Output Features to an Existing OpenGL ES 1.1 Implementation. 1-3 - Hye-Young Kim:

An Effective Load Balancing Scheme Maximizes the Lifetime in Wireless Sensor Networks. 1-3 - Song Yi Kim, Hyoseung Kim, Dong Hoon Lee:

An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack. 1-4 - Jisu Kim, Gemoh T., Sanghyun Park, Jinsul Kim, Sunghyun Yoon, HoYong Ryu:

An Efficient Multimedia Transmission Control Methodology Based on NFV. 1-4 - Hitham Alhussian, Nordin Zakaria:

An Efficient Zero-Laxity Based Real-Time Multiprocessor Scheduling Algorithm. 1-4 - Preeja Pradeep

, P. L. Divya, R. D. Arya Devi
, P. Rekha, K. Sangeeth, Tinu Vinod, Maneesha Vinodini Ramesh
:
An Energy Aware Schedule Based Remote Triggered Wireless Sensor Network Laboratory. 1-5 - Kanokwan Atchariyachanvanich

, Rungsiman Nararatwong, Nagul Cooharojananone:
An Exploratory Study on Users' Intention to Purchase Items from Mobile Applications in Thailand. 1-5 - Jong Pil Yun, Hyoseung Kim, Dong Hoon Lee:

An Improved Fuzzy Attribute-Based Authentication. 1-5 - Jihyeon Choi, Byung Jun Lee, DongYoung Jung, Hee Yong Youn:

An SSD-Based Accelerator Using Partitioned Bloom Filter for Directory Parsing. 1-5 - Dong-Hyun Kim, Jun-Hwan Huh, Jong-Deok Kim:

Analysis of Broadcast Packet Loss for Unequal Loss Protection in Wi-Fi Broadcasting System. 1-4 - Alemu Molla Kebede, Kaleab Getaneh Tefrie, Kyung-Ah Sohn

:
Anonymous Author Similarity Identification. 1-5 - Seungae Kang, Kyungock Yi, Soojung Park, Bonsup Park:

Applications of u-Fitness in Sports Field. 1-3 - Laula Zhumabayeva, Tamara Zhukabayeva

, Gairatzhan Mavlankulov, Mohamed Othman:
Arbitrary Petri Nets Controlled Grammars Under Parallel Firing Strategy. 1-3 - Jiyoung Yoon, Nakhoon Baek

, Hwanyong Lee:
ARINC661 Graphics Rendering Based on OpenVG. 1-4 - Shuichiro Yamamoto:

Assuring Security through Attribute GSN. 1-5 - Ekarat Prompila, Yachai Limpiyakorn

:
Automating Documentation of HTML Prototype. 1-5 - Jongseon Park, Do-Sik An, Gi-Hwan Cho:

Available Bandwidth Estimation Method Adaptive to Network Traffic Load Considering Fairness with UDT Flows. 1-4 - Boonyakorn Jantaranuson, Nagul Cooharojananone:

Background Subtraction from Auto-Exposure Surveillance Camera in Restaurant. 1-5 - Semin Kang, Sung-Soo Kim, Jongho Won, Young-Min Kang:

Bidirectional Constructive Crossover for Evolutionary Approach to Travelling Salesman Problem. 1-4 - Sang Hyun Yoo, Yonjoong Ryou, Kyung Tae Kim, Hee Yong Youn:

Block Replacement Based on Access Locality with Solid State Drive. 1-5 - Ye Tang, Huiyun Li, Guoqing Xu:

Cache Side-Channel Attack to Recover Plaintext against Datagram TLS. 1-6 - Vijay Maurya, Suresh C. Gupta:

Comparative Analysis of Processors Performance Using ANN. 1-5 - Munwar Ali, Low Tang Jung:

Confidentiality Based File Attributes and Data Classification Using TsF-KNN. 1-5 - Sungdo Gu, So Yeon Kim, Hyun-hwan Jeong

, Kyung-Ah Sohn
:
Constructing and Exploiting Software Metrics Networks for Software Quality Assessment. 1-5 - Seunghoe Gu, Jong-Hwan Kim, Younghoon Kim

, Cheoleun Moon, Ikjun Yeom:
Controlled Queue Management in Software-Defined Networks. 1-3 - Anna Epishkina

, Konstantin Kogos
:
Covert Channels Parameters Evaluation Using the Information Theory Statements. 1-5 - Seungwook Oh, Dae-Won Park, Youngjin Kim, Suhyun Park:

Design and Implementation of Display Module for Feature Symbol Verification Based on S-100. 1-4 - Wonhyuk Lee, Minki Noh, Buseung Cho, TaeYeon Kim, Hyuncheol Kim:

Designing of Healthcare Information Network Using IPv6 Cloud Networks. 1-3 - Wonhyuk Lee, Seunghae Kim, Hongseok Jeon, Hyuncheol Kim:

Detecting an Abnormal Traffic on Healthcare Network. 1-4 - Fumiko Nagoya, Shaoying Liu, Kyousuke Hamada:

Developing a Web Dictionary System Using the SOFL Three-Step Specification Approach. 1-5 - Kenji Ohmori:

Development of Functional Reactive Programming Using an Incrementally Modular Abstraction Hierarchy. 1-5 - H. S. Sheshadri, S. R. Bhagya Shree

, Murali Krishna:
Diagnosis of Alzheimer's Disease Employing Neuropsychological and Classification Techniques. 1-6 - Shamimi A. Halim, Muthukkaruppan Annamalai, Mohd Sharifuddin Ahmad, Rashidi Ahmad:

Domain Expert Maintainable Inference Knowledge of Assessment Task. 1-5 - Seung Wan Kim, Young Gyo Jung, Dong Ryeol Shin, Hee Yong Youn:

Dynamic Queue Management Approach for Data Integrity and Delay Differentiated Service in WSN. 1-5 - Ki-sung Hong, Chulung Lee

, Kyungchul Lee:
Dynamic Toll Pricing Model for an Intelligent Transportation System with Individual High Occupancy Toll Lanes. 1-6 - Muhammad Najam Dar, M. Usman Akram, Arslan Shaukat, Muazzam Ali Khan:

ECG Based Biometric Identification for Population with Normal and Cardiac Anomalies Using Hybrid HRV and DWT Features. 1-5 - Dongjun Suh

, Hyunyoung Kim, Jinsul Kim:
Estimation of Water Demand in Residential Building Using Machine Learning Approach. 1-2 - Pisal Setthawong

, Nattaworn Tancharoen:
Extending a Standard Tablet into an Ocarina Playing Gaming Platform with Projected Parallax Layers. 1-5 - Arslan Shaukat, Mansoor Aziz, M. Usman Akram:

Facial Expression Recognition Using Multiple Feature Sets. 1-5 - Hon-Sang Cheong, Wai-Kong Lee

:
Fast Implementation of Block Ciphers and PRNGs for Kepler GPU Architecture. 1-5 - K. Prasanna Lakshmi, C. R. K. Reddy:

Fast Rule-Based Prediction of Data Streams Using Associative Classification Mining. 1-5 - Young Kyung Lee, Dong Hoon Lee:

Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation. 1-4 - Piyaporn Samsuwan, Yachai Limpiyakorn

:
Generation of Data Warehouse Design Test Cases. 1-4 - Hardeep Singh, Bikram Pal Singh:

HR Challenges & Issues in Insurance Industry: An Empirical Study. 1-5 - Amit P. Ganatra

:
Information Fusion (Ensemble System) in Data Warehousing & Data Mining. 1-6 - Lukas Cegan

:
Intelligent Preloading of Websites Resources Based on Clustering Web User Sessions. 1-4 - Robin Tommy

, Ullas Ravi, Deen Mohan, Jobin Luke, Aswathy S. Krishna, Girija Subramaniam:
Internet of Things (IoT) Expanding the Horizons of Mainframes. 1-4 - Yuangang Yao, Xing Wang, Xiangjie Meng, Xiaofei Zhang, Bin Li:

ISEK: An Information Security Knowledge Graph for CISP Knowledge System. 1-4 - Tee Wee Jing

, Wong Seng Yue
, Raja Kumar Murugesan
:
Learning Outcome Enhancement via Serious Game: Implementing Game-Based Learning Framework in Blended Learning Environment. 1-3 - Kamsiah Mohamed

, Mohd Nazran Mohammed Pauzi, Fakariah Hani Hj Mohd Ali
, Suriyani Ariffin:
Linearity Test Framework for S-Box in Block Cipher. 1-5 - Erwin Adi

, Zubair A. Baig
, Chiou Peng Lam, Philip Hingston:
Low-Rate Denial-of-Service Attacks against HTTP/2 Services. 1-5 - Daseul Oh, Dae-Won Park, Yongmin Lim, Suhyun Park:

Methods of GML-Based Representation of S-101 ENC Vector Data. 1-3 - Do Van Thanh, Boning Feng, Clark Swafford, Do van Thuan, Loc H. Khuong:

Mobile Identity as a Tool to Develop Society. 1-6 - Kriengkri Pongpanjanthra, Yachai Limpiyakorn

:
Model-Based Approach to Generating Web Portals. 1-5 - Mohammed Salem Atoum

:
New MP3 Steganography Data Set. 1-7 - Hwa-Jin Park:

Occlusion Handling Based on Projective Depth in Object Tracking. 1-2 - Thu N. A. Nguyen, Van H. Dang, Thuc Dinh Nguyen:

On the Public Key-Based Auditing Methods. 1-6 - Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng

:
On the Security of Two Pairing-Based Signature Schemes. 1-4 - A.-yong Li, Li-rong Wei:

Optimization Model of Information Flow in Power Grid Engineering Construction Projects Based on Improved DSM. 1-4 - Tanveer A. Zia

:
Organisations Capability and Aptitude towards IT Security Governance. 1-4 - Vitruvius John D. Barayuga, William Emmanuel S. Yu:

Packet Level TCP Performance of NAT44, NAT64 and IPv6 Using Iperf in the Context of IPv6 Migration. 1-3 - Khush Naseeb Fatima, M. Usman Akram, Shafaat A. Bazaz:

Papilledema Detection in Fundus Images Using Hybrid Feature Set. 1-4 - Kang Chian Le, Rosni Abdullah:

Parallel Strategies for Harmony Search on CUDA to Solve Traveling Salesman Problem. 1-7 - Md. Nazrul Islam, Jaime Gallardo-Alvarado

, Othman bin Hj Ahmad, Mazlina Binti Mamat, Bablu K. Ghosh
:
Path Planning Algorithm for Manipulators Based on an Improved Backtracking Search Algorithm. 1-5 - Tamara Zhukabayeva

, Zhanar O. Oralbekova
, Makpal Zhartybayeva
, Ainur Zhumadillayeva
, Aigul Adamova
:
Prospects of Development of Technologies in the Field of Robotics and the Stages of Design of Mobile Robotic Complex. 1-4 - Nakhoon Baek

, Byeonguk Im:
Providing Preliminary Profiling Information for OpenGL ES 1.1 Application Programs. 1-3 - Nor Awani Che Hassan, Kamaludin Mohamad Yusof, Sharifah Kamilah Syed Yusof:

Ranging Estimation Using Dual-Frequency Doppler Technique. 1-5 - Hyunjin Kim, Seokcheol Lee, SungJin Kim, Taeshik Shon:

Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard. 1-4 - Firas Najjar

, Mohammad M. Kadhum:
Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol Investigation. 1-5 - Preeja Pradeep

:
Research Domains for Cognitive Radio: A Survey. 1-5 - Trinh Tan Dat

, Jin Young Kim, Hyoung-Gook Kim, Kyong-Rok Lee:
Robust Speaker Verification Using Low-Rank Recovery under Total Variability Space. 1-4 - Muhammad Zubair

, Changwoo Yoon, Hyunyoung Kim, Jisu Kim, Jinsul Kim:
Smart Wearable Band for Stress Detection. 1-4 - Malek Ahmad Theeb Almomani, Shuib Basri, Ahmad Kamil Bin Mahmood, Amos Orenyi Bajeh

:
Software Development Practices and Problems in Malaysian Small and Medium Software Enterprises: A Pilot Study. 1-5 - Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:

Software Implementation of a Pairing Function for Public Key Cryptosystems. 1-5 - Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:

Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability. 1-4 - Shoaib Hassan, Usman Qamar

, Taimoor Hassan, Muhammad Waqas:
Software Reverse Engineering to Requirement Engineering for Evolution of Legacy System. 1-4 - Wong Seng Yue

, Tee Wee Jing
:
Survey Analysis: The Effectiveness of Game-Based Learning (GBL) in Tertiary Education Environment. 1-4 - Shaik Shabana Anjum

, Rafidah Md Noor
, Mohammad Hossein Anisi
:
Survey on MANET Based Communication Scenarios for Search and Rescue Operations. 1-5 - Muhammad Sami, Yasar Ayaz, Mohsin Jamil

, Syed Omer Gilani
, Muhammad Naveed
:
Text Detection and Recognition for Semantic Mapping in Indoor Navigation. 1-4 - Sunyoung Kang:

The Application of Healthcare Device for Exercise Prescription. 1-4 - Hwai-Tsu Hu, Ling-Yuan Hsu, Sheng-Yu Lai, Yu-Jung Chang:

The Use of Spectral Shaping to Extend the Capacity for DWT-Based Blind Audio Watermarking. 1-5 - Mifrah Ahmad

, Lukman Ab. Rahim
, Noreen Izza Arshad:
Towards an Effective Modelling and Development of Educational Games with Subject-Matter: A Multi-Domain Framework. 1-5 - Majda A. Wazzan, Mohammad Hamza Awedh

:
Towards Improving Web Attack Detection: Highlighting the Significant Factors. 1-5 - Youngho Suh, Kyung Tae Kim, Dong Ryeol Shin, Hee Yong Youn:

Traffic-Aware Energy Efficient Routing (TEER) Using Multi-Criteria Decision Making for Wireless Sensor Network. 1-5 - Seungae Kang:

Trend of the Sports Convergence Technology for Health Promotion. 1-3 - Hyoung-Gook Kim, Hye-Seung Cho, Jin Young Kim:

TV Advertisement Search Based on Audio Peak-Pair Hashing in Real Environments. 1-4 - Mustapha Yusuf Abubakar

, Low Tang Jung, Oi Mean Foong:
Two Channel Quantum Security Modelling Focusing on Quantum Key Distribution Technique. 1-5 - Mifrah Ahmad

, Lukman Ab. Rahim
, Noreen Izza Arshad:
Understanding Game Play Domain: An Interpretive Approach towards Modelling Educational Games with Multi-Domain Framework. 1-5 - Geetanjali Sahi:

User Satisfaction and Website Usability: Exploring the Linkages in B2C E-Commerce Context. 1-4 - Narungsun Wilaisakoolyong:

Using Cloud Computing Systems to Create Virtual Classroom Model for Thai-Nichi's Students. 1-4 - Ru Ko, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei:

Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking. 1-7 - Norzaidi Baharudin, Fakariah Hani Mohd Ali

, Mohamad Yusof Darus, Norkhushaini Awang
:
Wireless Intruder Detection System (WIDS) in Detecting De-Authentication and Disassociation Attacks in IEEE 802.11. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














