callback( { "result":{ "query":":facetid:toc:\"db/conf/inc/inc2012.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"189.89" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"21", "@dc":"21", "@oc":"21", "@id":"43394347", "text":":facetid:toc:db/conf/inc/inc2012.bht" } }, "hits":{ "@total":"21", "@computed":"21", "@sent":"21", "@first":"0", "hit":[{ "@score":"1", "@id":"4449192", "info":{"authors":{"author":[{"@pid":"21/8965","text":"Sebastian Abt"},{"@pid":"20/151","text":"Harald Baier"}]},"title":"Towards Efficient and Privacy-Preserving Network-Based Botnet Detection Using Netflow Data.","venue":"INC","pages":"37-50","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/AbtB12","ee":"http://www.cscan.org/?page=openaccess&id=151","url":"https://dblp.org/rec/conf/inc/AbtB12"}, "url":"URL#4449192" }, { "@score":"1", "@id":"4449193", "info":{"authors":{"author":[{"@pid":"19/2671","text":"André P. Calitz"},{"@pid":"152/9676","text":"Sherwin Barlow"}]},"title":"The Use of Customer Profiles for the Personalisation of User Interfaces .","venue":"INC","pages":"125-138","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/CalitzB12","ee":"http://www.cscan.org/?page=openaccess&id=153","url":"https://dblp.org/rec/conf/inc/CalitzB12"}, "url":"URL#4449193" }, { "@score":"1", "@id":"4449194", "info":{"authors":{"author":[{"@pid":"152/9732","text":"Matthew Dagnell"},{"@pid":"77/1987","text":"Nathan Luke Clarke"}]},"title":"A Feasibility Study into Tracking Wi-Fi Enabled Mobile Devices .","venue":"INC","pages":"85-92","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/DagnellC12","ee":"http://www.cscan.org/?page=openaccess&id=145","url":"https://dblp.org/rec/conf/inc/DagnellC12"}, "url":"URL#4449194" }, { "@score":"1", "@id":"4449195", "info":{"authors":{"author":[{"@pid":"132/5311","text":"John N. Davies"},{"@pid":"63/2387","text":"Mike Payne"},{"@pid":"152/9830","text":"Phil Evans"},{"@pid":"152/9791","text":"Graham Sparey-Taylor"},{"@pid":"152/9642","text":"Natalia Rvachova"},{"@pid":"152/9669","text":"Oleh Korkh"},{"@pid":"95/6147","text":"Vic Grout"}]},"title":"Communications system for a solar car.","venue":"INC","pages":"93-102","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/DaviesPESRKG12","ee":"http://www.cscan.org/?page=openaccess&id=146","url":"https://dblp.org/rec/conf/inc/DaviesPESRKG12"}, "url":"URL#4449195" }, { "@score":"1", "@id":"4449196", "info":{"authors":{"author":[{"@pid":"152/9654","text":"Estelle Ehmann"},{"@pid":"152/9607","text":"Nigel Houlden"},{"@pid":"95/6147","text":"Vic Grout"}]},"title":"Using complex adaptive systems and technology to analyse the strength of processes and cultural indicators: A Method to Improve Sustained Competitive Advantage.","venue":"INC","pages":"139-147","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/EhmannHG12","ee":"http://www.cscan.org/?page=openaccess&id=148","url":"https://dblp.org/rec/conf/inc/EhmannHG12"}, "url":"URL#4449196" }, { "@score":"1", "@id":"4449197", "info":{"authors":{"author":{"@pid":"99/2447","text":"Gholamreza Farahani"}},"title":"Design and Implementation of Lower Layers of Q3 Interface in Telecommunication Management Network.","venue":"INC","pages":"3-13","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/Farahani12","ee":"http://www.cscan.org/?page=openaccess&id=142","url":"https://dblp.org/rec/conf/inc/Farahani12"}, "url":"URL#4449197" }, { "@score":"1", "@id":"4449198", "info":{"authors":{"author":[{"@pid":"17/11103","text":"Ruediger Gad"},{"@pid":"152/9745","text":"Daniel Baulig"},{"@pid":"10/4683","text":"Martin Kappes"},{"@pid":"96/11102","text":"Robin Mueller-Bady"}]},"title":"Performance Evaluation of On-Demand IP Address Assignment for Layer-2 Devices.","venue":"INC","pages":"15-24","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/GadBKM12","ee":"http://www.cscan.org/?page=openaccess&id=156","url":"https://dblp.org/rec/conf/inc/GadBKM12"}, "url":"URL#4449198" }, { "@score":"1", "@id":"4449199", "info":{"authors":{"author":[{"@pid":"58/10872","text":"Ryan G. Goss"},{"@pid":"37/4366","text":"Reinhardt A. Botha"}]},"title":"Establishing discernible flow characteristics for accurate, real-time network protocol identification.","venue":"INC","pages":"25-34","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/GossB12","ee":"http://www.cscan.org/?page=openaccess&id=140","url":"https://dblp.org/rec/conf/inc/GossB12"}, "url":"URL#4449199" }, { "@score":"1", "@id":"4449200", "info":{"authors":{"author":[{"@pid":"37/10499","text":"Salah Kabanda"},{"@pid":"152/9750","text":"Andrea Downes"},{"@pid":"152/9614","text":"Steven Baltazar dos Ramos"}]},"title":"Mobile Banking Services in South Africa: The case of M-Pesa.","venue":"INC","pages":"149-158","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/KabandaDR12","ee":"http://www.cscan.org/?page=openaccess&id=147","url":"https://dblp.org/rec/conf/inc/KabandaDR12"}, "url":"URL#4449200" }, { "@score":"1", "@id":"4449201", "info":{"authors":{"author":[{"@pid":"23/7102","text":"George Magklaras"},{"@pid":"83/2392","text":"Steven Furnell"}]},"title":"The Insider Threat Prediction and Specification Language.","venue":"INC","pages":"51-61","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/MagklarasF12","ee":"http://www.cscan.org/?page=openaccess&id=157","url":"https://dblp.org/rec/conf/inc/MagklarasF12"}, "url":"URL#4449201" }, { "@score":"1", "@id":"4449202", "info":{"authors":{"author":[{"@pid":"152/9658","text":"Matthias Minich"},{"@pid":"01/991","text":"Bettina Harriehausen-Mühlbauer"},{"@pid":"85/1363","text":"Christoph Wentzel"}]},"title":"Model Driven Engineering in Systems Integration.","venue":"INC","pages":"159-173","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/MinichHW12","ee":"http://www.cscan.org/?page=openaccess&id=144","url":"https://dblp.org/rec/conf/inc/MinichHW12"}, "url":"URL#4449202" }, { "@score":"1", "@id":"4449203", "info":{"authors":{"author":[{"@pid":"64/556","text":"Jabu Mtsweni"},{"@pid":"89/2532","text":"Elmarie Biermann"},{"@pid":"36/5258","text":"Laurette Pretorius"}]},"title":"iSemServ: Facilitating the Implementation of Intelligent Semantic Services.","venue":"INC","pages":"175-184","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/MtsweniBP12","ee":"http://www.cscan.org/?page=openaccess&id=155","url":"https://dblp.org/rec/conf/inc/MtsweniBP12"}, "url":"URL#4449203" }, { "@score":"1", "@id":"4449204", "info":{"authors":{"author":[{"@pid":"76/5076","text":"Kennedy Njenga"},{"@pid":"152/9689","text":"Nsovo Manganyi"}]},"title":"Extending cognitive fit theory towards understanding wireless network security management in small organisations.","venue":"INC","pages":"103-112","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/NjengaM12","ee":"http://www.cscan.org/?page=openaccess&id=150","url":"https://dblp.org/rec/conf/inc/NjengaM12"}, "url":"URL#4449204" }, { "@score":"1", "@id":"4449205", "info":{"authors":{"author":[{"@pid":"43/10872","text":"Elisha Oketch Ochola"},{"@pid":"95/6309","text":"Mariki M. Eloff"},{"@pid":"12/1670","text":"John A. van der Poll"}]},"title":"Mobile Ad-hoc Network Security Challenges Under AODV Routing Protocol.","venue":"INC","pages":"113-122","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/OcholaEP12","ee":"http://www.cscan.org/?page=openaccess&id=149","url":"https://dblp.org/rec/conf/inc/OcholaEP12"}, "url":"URL#4449205" }, { "@score":"1", "@id":"4449206", "info":{"authors":{"author":[{"@pid":"152/9619","text":"Samantha Rule"},{"@pid":"36/9028","text":"Adrie Stander"},{"@pid":"118/8800","text":"Jacques Ophoff"}]},"title":"How the Certified Information Systems Security Professional certification supports Digital Forensic processes.","venue":"INC","pages":"63-72","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/RuleSO12","ee":"http://www.cscan.org/?page=openaccess&id=158","url":"https://dblp.org/rec/conf/inc/RuleSO12"}, "url":"URL#4449206" }, { "@score":"1", "@id":"4449207", "info":{"authors":{"author":[{"@pid":"41/7019","text":"Apkar Salatian"},{"@pid":"02/5780","text":"Francis Adepoju"},{"@pid":"19/5109","text":"Bruce Taylor"},{"@pid":"152/9688","text":"Lawrence Oborkhale"}]},"title":"Data Compression for Tele-Monitoring of Buildings .","venue":"INC","pages":"185-190","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/SalatianATO12","ee":"http://www.cscan.org/?page=openaccess&id=139","url":"https://dblp.org/rec/conf/inc/SalatianATO12"}, "url":"URL#4449207" }, { "@score":"1", "@id":"4449208", "info":{"authors":{"author":[{"@pid":"152/9627","text":"Emile Senga"},{"@pid":"19/2671","text":"André P. Calitz"},{"@pid":"73/6068","text":"Jéan H. Greyling"}]},"title":"A Service-Oriented Approach to Implementing an Adaptive User Interface.","venue":"INC","pages":"191-205","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/SengaCG12","ee":"http://www.cscan.org/?page=openaccess&id=154","url":"https://dblp.org/rec/conf/inc/SengaCG12"}, "url":"URL#4449208" }, { "@score":"1", "@id":"4449209", "info":{"authors":{"author":{"@pid":"126/3448","text":"Richard Ssembatya"}},"title":"An Access Control Framework for Protecting Mobile Health Records: The Case Study of Developing Countries.","venue":"INC","pages":"73-82","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/Ssembatya12","ee":"http://www.cscan.org/?page=openaccess&id=152","url":"https://dblp.org/rec/conf/inc/Ssembatya12"}, "url":"URL#4449209" }, { "@score":"1", "@id":"4449210", "info":{"authors":{"author":[{"@pid":"77/1944","text":"Constantin Timm"},{"@pid":"53/6854","text":"Frank Weichert"},{"@pid":"68/9451","text":"Christian Prasse"},{"@pid":"m/HeinrichMuller","text":"Heinrich Müller"},{"@pid":"t/MichaeltenHompel","text":"Michael ten Hompel"},{"@pid":"m/PeterMarwedel","text":"Peter Marwedel"}]},"title":"Efficient Resource Management based on Non-Functional Requirements for Sensor/Actuator Networks.","venue":"INC","pages":"207-216","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/TimmWPMHM12","ee":"http://www.cscan.org/?page=openaccess&id=141","url":"https://dblp.org/rec/conf/inc/TimmWPMHM12"}, "url":"URL#4449210" }, { "@score":"1", "@id":"4449211", "info":{"authors":{"author":[{"@pid":"94/6503","text":"Tong Zhao"},{"@pid":"69/1535","text":"Chunping Li"},{"@pid":"130/8146","text":"Mengya Li"}]},"title":"Wikipedia-Based Efficient Sampling Approach for Topic Model.","venue":"INC","pages":"217-227","year":"2012","type":"Conference and Workshop Papers","access":"unavailable","key":"conf/inc/ZhaoLL12","ee":"http://www.cscan.org/?page=openaccess&id=143","url":"https://dblp.org/rec/conf/inc/ZhaoLL12"}, "url":"URL#4449211" }, { "@score":"1", "@id":"4514073", "info":{"authors":{"author":[{"@pid":"37/4366","text":"Reinhardt A. Botha"},{"@pid":"24/409","text":"Paul Dowland 0001"},{"@pid":"83/2392","text":"Steven Furnell"}]},"title":"Ninth International Network Conference (INC 2012), Port Elizabeth, South Africa, July 11-12, 2012. Proceedings","venue":"INC","publisher":"University of Plymouth","year":"2012","type":"Editorship","access":"unavailable","key":"conf/inc/2012","ee":"http://www.cscan.org/?page=openaccess&eid=1","url":"https://dblp.org/rec/conf/inc/2012"}, "url":"URL#4514073" } ] } } } )