![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
11th ICITST 2016: Barcelona, Spain
- 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016. IEEE 2016, ISBN 978-1-908320-73-5
- Steven Furnell, Charles A. Shoniregun:
Welcome message. 3 - Martin Visser:
Keynote speaker 1: Critical Infrastructures SMART ready? 15 - Jorge Lopez Hernandez-Ardieta:
Keynote speaker 2: Cyber ranges: The (r)evolution in cybersecurity training. 16-17 - Óscar Corcho:
Keynote speaker 3: Open Data city portals: Working towards their homogeneisation. 18 - Sandra Stincic Clarke:
Keynote speaker 4: Data silos of the IoT kind. 19 - Carles Antón-Haro:
Invited speaker (IEEE Spain section professional activities): Scientific resumes and job interviews - how to make (a positive) impact. 20
Special Session: Chaos-Data Protection and Hiding in Multimedia Communications (C-DPH-MC)
- Ons Jallouli, Safwan El Assad, Maryline Chetto
:
Robust chaos-based stream-cipher for secure public communication channels. 23-26 - Cynthia Lizbeth Guzman-Candelario, Jose Juan Garcia-Hernandez, Loreto Gonzalez-Hernandez:
A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack. 27-32 - Oleg Garasym, Ina Taralova, René Lozi:
Key requirements for the design of robust chaotic PRNG. 33-38 - Gerard Vidal, Rabei Bechikh, Rhouma Rhouma
, Safya Belghith
:
A commercial application of a chaos-based-stream cipher: Performance and Security analysis. 39-44
Workshops
Workshop 1: Cloud Applications and Security (CAS'16)
- Amina Djellalbia, Nadjib Badache, Souad Benmeziane, Sihem Bensimessaoud:
Anonymous authentication scheme in e-Health Cloud environment. 47-52 - S. Srinivasan:
Data privacy concerns involving cloud. 53-56 - Yi Hu, Dustin Sulek, Anthony Carella, Joshua Cox, Allyson Frame, Karen Cipriano:
Employing miniaturized computers for distributed vulnerability assessment. 57-61
Workshop 2: 4th International workshop on Big Data and Social Networking Management and Security
- Mohamed A. Nassar, Layla A. A. El-Sayed, Yousry Taha:
Efficient parallel Stochastic Gradient Descent for matrix factorization using GPU. 63-68 - Aasim Rafique, Shoaib Azam
, Moongu Jeon, Sangwook Lee:
Face-deidentification in images using Restricted Boltzmann Machines. 69-73 - Hlib Mykhailenko, Giovanni Neglia, Fabrice Huet:
Which metrics for vertex-cut partitioning? 74-79 - Sihem Bensimessaoud, Nadjib Badache, Souad Benmeziane, Amina Djellalbia:
An enhanced approach to preserving privacy in social network data publishing. 80-85
Workshop 2: 4th International workshop on Big Data and Social Networking Management and Security 86 (BDSN-2016), Part II
- Lo'ai Ali Tawalbeh
, Turki F. Al-Somani, Hilal Houssain:
Towards secure communications: Review of side channel attacks and countermeasures on ECC. 87-91 - Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Mohammed A. Shehab, Yaser Jararweh
, Bernard J. Jansen
:
Using the Panama Papers to explore the financial networks of the Middle East. 92-97 - Mohammad Al-Smadi
, Omar Qawasmeh, Bashar Talafha
, Mahmoud Al-Ayyoub, Yaser Jararweh
, Elhadj Benkhelifa
:
An enhanced framework for aspect-based sentiment analysis of Hotels' reviews: Arabic reviews case study. 98-103 - Leandro Ordoñez-Ante, Thomas Vanhove
, Gregory van Seghbroeck
, Tim Wauters, Filip De Turck:
Interactive querying and data visualization for abuse detection in social network sites. 104-109
Sessions
Session 1: Information Security
- Robin Fay, Christoph Ruland:
Compressive Sensing encryption modes and their security. 119-126 - Neyire Deniz Sarier
:
Efficient biometric-based Encryption for fingerprints. 127-132 - Prathap Siddavaatam, Reza Sedaghat, Min Hsuan Cheng:
An adaptive security framework with extensible computational complexity for cipher systems. 133-140
Session 2: Cyber Security
- Roberto Nardone
, Ricardo J. Rodríguez, Stefano Marrone
:
Formal security assessment of Modbus protocol. 142-147 - Alex M. S. Orozco, Charles V. Neu, Regio A. Michelin, Avelino F. Zorzo:
Security analysis of forwarding strategies in network time measurements using Openflow. 148-153 - Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki
:
A survey of cyber-security awareness in Saudi Arabia. 154-158 - Alessandro Greco, Alberto Caponi, Giuseppe Bianchi:
Facing lateral movements using widespread behavioral probes. 159-160
Session 3: Cloud Security
- Louis Tajan, Dirk Westhoff, Christian A. Reuter, Frederik Armknecht:
Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing. 162-169 - Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo
, Antonino Nocera
:
Range query integrity in the cloud: the case of video surveillance. 170-175 - Kheng Kok Mar, ZhengQing Hu, Chee Yong Law, Meifen Wang:
Secure cloud distributed file system. 176-181 - Antonis Michalas
:
Sharing in the rain: Secure and efficient data sharing for the Cloud. 182-187
Session 4: Information Security
- Neamah Al-Naffakh, Nathan L. Clarke
, Paul Dowland
, Fudong Li:
Activity Recognition using wearable computing. 189-195 - Zakia El Uahhabi, Hanan El Bakkali:
An approach for evaluating trust in X.509 certificates. 196-203 - Asad Masood Khattak, Farkhund Iqbal
, Patrick C. K. Hung, Jwo-Shiun Sun, Guan-Pu Pan, Jing-Jie Lin:
Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD). 204-209 - Charles V. Neu, Avelino F. Zorzo, Alex M. S. Orozco, Regio A. Michelin:
An approach for detecting encrypted insider attacks on OpenFlow SDN Networks. 210-215
Session 5: Internet Application and Technology
- Murizah Kassim, Nor Azura Ayop:
Adaptive Policing Algorithms on inbound internet traffic using Generalized Pareto model. 217-222 - Dennis M. Lupiana, Fredrick Mtenzi:
KiCM: A knowledge-intensive context model. 223-229 - Aspen Olmsted
:
Modeling cloud applications for partition contingency. 230-234 - Gozde Ozcan, Sule Gündüz Ögüdücü:
Applying different classification techniques in reciprocal job recommender system for considering job candidate preferences. 235-240
Session 6: Cyber Security
- Sanjay Kumar, Ari Viinikainen
, Timo Hämäläinen
:
Machine learning classification model for Network based Intrusion Detection System. 242-249 - Moses Moyo, Marianne Loock:
South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review. 250-254 - Tiago Vieira, Carlos Serrão
:
Web security in the finance sector. 255-259 - Jarkko Kuusijärvi, Reijo Savola, Pekka Savolainen
, Antti Evesti:
Mitigating IoT security threats with a trusted Network element. 260-265
Session 7: Digital Forensics
- Khawla Alghafli
, Thomas Martin
:
Identification and recovery of video fragments for forensics file carving. 267-272 - Tomas Marques-Arpa, Jordi Serra-Ruiz
:
PRS signal in acquiring evidence of Digital Chain of Custody. 273-278 - Gaseb Alotibi
, Nathan L. Clarke
, Fudong Li, Steven Furnell:
User profiling from network traffic via novel application-level interactions. 279-285
Session 8: Multimedia and Web Services
- Radu Velea, Noel Gordon:
Comparison of color profile gamut coverage for computer monitors. 287-290 - Emad Al-Mohammed, Nigel Linge:
A generic, personalized electronic program guide system for accessing multiple online TV providers. 291-296 - Madeline Little, Aspen Olmsted
:
Temporal resource scheduling equity. 297-299
Session 9: Wireless and Sensor Networks
- Aymen J. Salman
, Adil Al-Yasiri:
Developing Domain-Specific Language for Wireless Sensor Network application development. 301-308 - Nouredine Seddiki, Amel Douli:
Maximizing the wireless sensor networks lifetime. 309-312 - Adnan Ahmed
, Pardeep Kumar
, Ali Raza Bhangwar, Muhammad Ibrahim Channa:
A secure and QoS aware routing protocol for Wireless Sensor Network. 313-317 - Tasneem Salah, M. Jamal Zemerly
, Chan Yeob Yeun
, Mahmoud Al-Qutayri, Yousof Al-Hammadi
:
The evolution of distributed systems towards microservices architecture. 318-325 - Aiman Ghannami
, Chenxi Shao:
Experience-based learning for identifying sub-regions in Wireless Sensor Networks. 326-327
Session 10: Cyber Security
- Tiago Santos, Carlos Serrão
:
Secure Javascript Object Notation (SecJSON) Enabling granular confidentiality and integrity of JSON documents. 329-334 - Sophia Moganedi, Njabulo Mkhonto, Jabu Mtsweni:
Evaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing services. 335-339 - Aneesha Sethi
, Federica Paci
, Gary B. Wills
:
EEVi - framework for evaluating the effectiveness of visualization in cyber-security. 340-345
Session 11: Information Security
- Samaneh Rashidibajgan:
A trust structure for detection of sybil attacks in opportunistic networks. 347-351 - Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke
:
Information security policies: A review of challenges and influencing factors. 352-358 - Sean T. Miller, Curtis Busby-Earle:
The role of machine learning in botnet detection. 359-364 - Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features. 365-370
Session 12: Internet Application and Technology
- Aisha Suliaman Alazri:
Telecommunication traffic through submarine cables: Security and vulnerabilities. 372-375 - Pedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas, Thales Guimaraes Marques:
Virtualization technologies in web conferencing systems: A performance overview. 376-383 - Ilaria Torre, Frosina Koceva, Odnan Ref Sanchez, Giovanni Adorni:
A framework for personal data protection in the IoT. 384-391 - T. Nawrath, Daniel Fischer, Bernd Markscheffel:
Privacy-sensitive data in connected cars. 392-393
Session 13: Internet Application and Technology
- Andres Paz Sampedro, Shantanu Srivastava:
Cost to serve of large scale online systems. 395-398 - Chung Kwan Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan
, Daniel Wai Kei Kwong:
System and Protocols for secure Intercloud Communications. 399-404 - Regio A. Michelin, Avelino F. Zorzo, Marcia B. Campos, Charles V. Neu, Alex M. S. Orozco:
Smartphone as a biometric service for web authentication. 405-408 - Mohammad Kamel Alomari:
Digital divide impact on e-voting adoption in middle eastern country. 409-412 - Norah Ahmed Almubairik, Gary B. Wills:
Automated penetration testing based on a threat model. 413-414
Session 14: Big Data and Ubi/Cloud Computing
- Seyed Mahdi Jameii
, Mohsen Maadani
:
Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks. 416-420 - Lotfi Hajjem, Salah Benabdallah
:
An MMAS-GA for resource allocation in multi-cloud systems. 421-426 - Ibrahim Almarashdeh
, Mutasem Alsmadi
:
Heuristic evaluation of mobile government portal services: An experts' review. 427-431 - Aiman Ghannami
, Chenxi Shao:
Efficient fast recovery mechanism in Software-Defined Networks: Multipath routing approach. 432-435
Session 15: RFID Security and Cryptography
- Benfilali Mostefa
, Sofiane Boukli Hacene
:
Adaptive image compression in wireless sensor networks. 437-441 - Isil Karabey, Gamze Akman:
A cryptographic approach for secure client - server chat application using public key infrastructure (PKI). 442-446 - Yousuf Alsalami
, Chan Yeob Yeun
, Thomas Martin
, Majid Khonji
:
Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes. 447-454 - Belghachi Mohamed, Feham Mohamed:
Experimental evaluation of RPL protocol. 455-458 - Michal Kvet
, Monika Vajsová:
Performance study of the index structures in audited environment. 459-464 - Gabriele Spenger, Jörg Keller:
Structural improvements of chaotic PRNG implementations. 465-470
Posters
- Takashi Amano, Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:
Gaze network extraction from bookmarks in accordance with search intentions. 472-473 - Daisuke Arakawa, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:
Dynamically visualizing the relationships between Web pages depending on user's search viewpoints. 474-475 - Hiroki Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, Hiroaki Kaminaga, Youzou Miyadera:
Learning History Transition Graphs for understanding the programming learning situations. 476-477 - Niranjan Sivakumar, Maxime Crepel, Dominique Boullier:
Risk management in payment system architectures. 478
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.