Search dblp for Publications

export results for "stream:conf/icitst:"

 download as .bib file

@inproceedings{DBLP:conf/icitst/Al-AhmariRO20,
  author       = {Saad Al{-}Ahmari and
                  Karen Renaud and
                  Inah Omoronyia},
  title        = {Implement a Model for Describing and Maximising Security Knowledge
                  Sharing},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351318},
  doi          = {10.23919/ICITST51030.2020.9351318},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-AhmariRO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-FawarehSJE20,
  author       = {Mohammad Al{-}Fawa'reh and
                  Amal Saif and
                  Mousa Tayseer Jafar and
                  Ammar Elhassan},
  title        = {Malware Detection by Eating a Whole {APK}},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351333},
  doi          = {10.23919/ICITST51030.2020.9351333},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-FawarehSJE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AnthonioK20,
  author       = {Harris Anthonio and
                  Yvonne Hwei{-}Syn Kam},
  title        = {A Shoulder-Surfing Resistant Colour Image-based Authentication Method
                  Using Human Vision Perception with Spatial Frequency},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351349},
  doi          = {10.23919/ICITST51030.2020.9351349},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AnthonioK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AryehA20,
  author       = {Felix Larbi Aryeh and
                  Boniface Kayode Alese},
  title        = {A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection
                  System's Prediction Accuracy},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351316},
  doi          = {10.23919/ICITST51030.2020.9351316},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AryehA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AshiAAQ20,
  author       = {Zein Ashi and
                  Laila Aburashed and
                  Mohammad Al{-}Fawa'reh and
                  Malik Qasaimeh},
  title        = {Fast and Reliable DDoS Detection using Dimensionality Reduction and
                  Machine Learning},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351347},
  doi          = {10.23919/ICITST51030.2020.9351347},
  timestamp    = {Wed, 08 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AshiAAQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BermudezS20,
  author       = {Esau Bermudez and
                  Djamel Fawzi Hadj Sadok},
  title        = {Energy Consumption of a LoRaWAN Network using Jarvis Algorithm},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351345},
  doi          = {10.23919/ICITST51030.2020.9351345},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/BermudezS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChanCG20,
  author       = {Wai Kok Chan and
                  Ji{-}Jian Chin and
                  Vik Tor Goh},
  title        = {Evolution of Bitcoin Addresses from Security Perspectives},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351346},
  doi          = {10.23919/ICITST51030.2020.9351346},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChanCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DeriS20,
  author       = {Luca Deri and
                  Daniele Sartiano},
  title        = {Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical
                  Analysis},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351330},
  doi          = {10.23919/ICITST51030.2020.9351330},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/DeriS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DridiAAYM20,
  author       = {Fethi Dridi and
                  Safwan El Assad and
                  Carinelle Atamech and
                  Wajih El Hadj Youssef and
                  Mohsen Machhout},
  title        = {Design and Implementation on {FPGA} Board of a Chaos-based Stream
                  Cipher},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351328},
  doi          = {10.23919/ICITST51030.2020.9351328},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DridiAAYM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HueSIC20,
  author       = {Sook{-}Yan Hue and
                  Nor Haniza Sarmin and
                  Eddie Shahril Ismail and
                  Ji{-}Jian Chin},
  title        = {Easy Simple Factoring-based Digital Signature Scheme},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351341},
  doi          = {10.23919/ICITST51030.2020.9351341},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HueSIC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Hunusekattte20,
  author       = {Dhruva Hunusekattte},
  title        = {Smart Parking With Automated Billing System},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351312},
  doi          = {10.23919/ICITST51030.2020.9351312},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Hunusekattte20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KannanJG20,
  author       = {Raadhesh Kannan and
                  Ji{-}Jian Chin and
                  Xiaoning Guo},
  title        = {Adversarial Evasion Noise Attacks Against TensorFlow Object Detection
                  {API}},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351331},
  doi          = {10.23919/ICITST51030.2020.9351331},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/KannanJG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Kim20,
  author       = {Song{-}Kyoo Amang Kim},
  title        = {Toward Compact Data from Big Data},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351315},
  doi          = {10.23919/ICITST51030.2020.9351315},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Kim20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimLL20,
  author       = {Jong{-}Jin Kim and
                  Sang{-}Gil Lee and
                  Cheol{-}Hoon Lee},
  title        = {Real-Time supports on Tablet {PC} Platforms},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351322},
  doi          = {10.23919/ICITST51030.2020.9351322},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KioskliP20,
  author       = {Kitty Kioskli and
                  Nineta Polemi},
  title        = {Measuring Psychosocial and Behavioural Factors Improves Attack Potential
                  Estimates},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351343},
  doi          = {10.23919/ICITST51030.2020.9351343},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KioskliP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KosakataniUT20,
  author       = {Satoshi Kosakatani and
                  Tetsutaro Uehara and
                  Songpon Teerakanok},
  title        = {Japan's Act on Wiretapping for Criminal Investigation: How the system
                  is implemented and how it should be},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351320},
  doi          = {10.23919/ICITST51030.2020.9351320},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/KosakataniUT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LiuZC20,
  author       = {Huangxiaolie Liu and
                  Dong Zhang and
                  Huijun Chen},
  title        = {Towards robust classification detection for adversarial examples},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351309},
  doi          = {10.23919/ICITST51030.2020.9351309},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/LiuZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MahmoudP20,
  author       = {Loreen Mahmoud and
                  Raja Praveen},
  title        = {Network Security Evaluation Using Deep Neural Network},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351326},
  doi          = {10.23919/ICITST51030.2020.9351326},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MahmoudP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MasumS20,
  author       = {Mohammad Masum and
                  Hossain Shahriar},
  title        = {{TL-NID:} Deep Neural Network with Transfer Learning for Network Intrusion
                  Detection},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351317},
  doi          = {10.23919/ICITST51030.2020.9351317},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MasumS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MedhatEFS20,
  author       = {May Medhat and
                  Menna Essa and
                  Hend Faisal and
                  Samir G. Sayed},
  title        = {{YARAMON:} {A} Memory-based Detection Framework for Ransomware Families},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351319},
  doi          = {10.23919/ICITST51030.2020.9351319},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MedhatEFS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MohamedAAK20,
  author       = {Khalid Mohamed and
                  Suleiman Ali and
                  Soilahoudini Ali and
                  Ilyas Kassim},
  title        = {Performance Evaluation of {RPL} and {DODAG} Formations for IoTs Applications},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351340},
  doi          = {10.23919/ICITST51030.2020.9351340},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MohamedAAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NcubukeziMR20,
  author       = {Tabisa Ncubukezi and
                  Laban Mwansa and
                  Fran{\c{c}}ois Rocaries},
  title        = {A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351339},
  doi          = {10.23919/ICITST51030.2020.9351339},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/NcubukeziMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OkikeM20,
  author       = {Ezekiel Uzor Okike and
                  Gofaone Mogapi},
  title        = {A Pedagogic Analysis of Information Systems Security Measures in Online
                  Services},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351325},
  doi          = {10.23919/ICITST51030.2020.9351325},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/OkikeM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/QiaoTA20,
  author       = {Zongchao Qiao and
                  Ina Taralova and
                  Safwan El Assad},
  title        = {A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using
                  a Key Space Expandable Strategy},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351314},
  doi          = {10.23919/ICITST51030.2020.9351314},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/QiaoTA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RayaM20,
  author       = {Ali Raya and
                  K. Mariyappn},
  title        = {Security and Performance of Elliptic Curve Cryptography in Resource-limited
                  Environments: {A} Comparative Study},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351327},
  doi          = {10.23919/ICITST51030.2020.9351327},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RayaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SchillingerS20,
  author       = {Fabian Schillinger and
                  Christian Schindelhauer},
  title        = {Partitioned Private User Storages in End-to-End Encrypted Online Social
                  Networks},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351335},
  doi          = {10.23919/ICITST51030.2020.9351335},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SchillingerS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YangTLA20,
  author       = {Chunxiao Yang and
                  Ina Taralova and
                  Jean{-}Jacques Loiseau and
                  Safwan El Assad},
  title        = {A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator},
  booktitle    = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020.9351350},
  doi          = {10.23919/ICITST51030.2020.9351350},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/YangTLA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2020,
  title        = {15th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2020, London, United Kingdom, December 8-10,
                  2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.23919/ICITST51030.2020},
  doi          = {10.23919/ICITST51030.2020},
  isbn         = {978-1-913572-21-1},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbatanM17,
  author       = {Omotayo Kayode Abatan and
                  Manoj S. Maharaj},
  title        = {Change management and the integration of information technology: Research
                  notes from selected African universities},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {167--172},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356370},
  doi          = {10.23919/ICITST.2017.8356370},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbatanM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdounAHAKD17,
  author       = {Nabil Abdoun and
                  Safwan El Assad and
                  Khodor Hammoud and
                  Rima Assaf and
                  Mohamad Khalil and
                  Olivier D{\'{e}}forges},
  title        = {New keyed chaotic neural network hash function based on sponge construction},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {35--38},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356341},
  doi          = {10.23919/ICITST.2017.8356341},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdounAHAKD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AhmedBR17,
  author       = {Md. Tomig Uddin Ahmed and
                  Nazrul Islam Bhuiya and
                  Md. Mahbubur Rahman},
  title        = {A secure enterprise architecture focused on security and technology-transformation
                  {(SEAST)}},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {215--220},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356386},
  doi          = {10.23919/ICITST.2017.8356386},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AhmedBR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlShehyariYD17,
  author       = {Shaikha AlShehyari and
                  Chan Yeob Yeun and
                  Ernesto Damiani},
  title        = {Monitoring darknet activities by using network telescope},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {123--128},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356360},
  doi          = {10.23919/ICITST.2017.8356360},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlShehyariYD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlkhwaldiKQ17,
  author       = {Abeer F. Alkhwaldi and
                  Mumtaz M. Kamala and
                  Rami Qahwaji},
  title        = {From e-govemment to cloud-government: Challenges of Jordanian citizens'
                  acceptance for public services},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {298--304},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356405},
  doi          = {10.23919/ICITST.2017.8356405},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlkhwaldiKQ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlmalkiA17,
  author       = {Faris A. Almalki and
                  Marios C. Angelides},
  title        = {Propagation modelling and performance assessment of aerial platforms
                  deployed during emergencies},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {238--243},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356391},
  doi          = {10.23919/ICITST.2017.8356391},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlmalkiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiA17,
  author       = {Abdullah Alhumaidi Alotaibi and
                  Marios C. Angelides},
  title        = {A hybrid approach for femtocell co-tier interference mitigation},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {148--153},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356366},
  doi          = {10.23919/ICITST.2017.8356366},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiCF17,
  author       = {Fayez Alotaibi and
                  Nathan L. Clarke and
                  Steven Furnell},
  title        = {An analysis of home user security awareness {\&} education},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {116--122},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356359},
  doi          = {10.23919/ICITST.2017.8356359},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiCF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiFSP17,
  author       = {Faisal Alotaibi and
                  Steven Furnell and
                  Ingo Stengel and
                  Maria Papadaki},
  title        = {Enhancing cyber security awareness with mobile games},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {129--134},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356361},
  doi          = {10.23919/ICITST.2017.8356361},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiFSP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlothmanR17,
  author       = {Basil Alothman and
                  Prapa Rattadilok},
  title        = {Android botnet detection: An integrated source code mining approach},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {111--115},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356358},
  doi          = {10.23919/ICITST.2017.8356358},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlothmanR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlothmanR17a,
  author       = {Basil Alothman and
                  Prapa Rattadilok},
  title        = {Towards using transfer learning for Botnet Detection},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {281--282},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356400},
  doi          = {10.23919/ICITST.2017.8356400},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlothmanR17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlqaydiYD17,
  author       = {Lamya Alqaydi and
                  Chan Yeob Yeun and
                  Ernesto Damiani},
  title        = {Security enhancements to {TLS} for improved national control},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {274--279},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356398},
  doi          = {10.23919/ICITST.2017.8356398},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlqaydiYD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlqurashiB17,
  author       = {Saja Alqurashi and
                  Omar Batarfi},
  title        = {A comparison between {API} call sequences and opcode sequences as
                  reflectors of malware behavior},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {105--110},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356357},
  doi          = {10.23919/ICITST.2017.8356357},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlqurashiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlshehriM17,
  author       = {Haya Alshehri and
                  Farid Meziane},
  title        = {The influence of advanced and secure e-commerce environments on customers
                  behaviour: The case of Saudis in the {UK}},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {332--337},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356411},
  doi          = {10.23919/ICITST.2017.8356411},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlshehriM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AltorbaqBS17,
  author       = {Alaa Altorbaq and
                  Fredrik Blix and
                  Stina Sorman},
  title        = {Data subject rights in the cloud: {A} grounded study on data protection
                  assurance in the light of {GDPR}},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {305--310},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356406},
  doi          = {10.23919/ICITST.2017.8356406},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AltorbaqBS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlviSDMB17,
  author       = {Ashik Mostafa Alvi and
                  Md. Faqrul Islam Shaon and
                  Prithvi Ranjan Das and
                  Manazir Mustafa and
                  Mohammad Rezaul Bari},
  title        = {Automated course management system},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356369},
  doi          = {10.23919/ICITST.2017.8356369},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlviSDMB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AndreevPT17,
  author       = {Desislav Andreev and
                  Simona Petrakieva and
                  Ina Taralova},
  title        = {Reveal false names of accounts as a result of hackers attacks: Security
                  systems with heightened safety of information},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {39--42},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356342},
  doi          = {10.23919/ICITST.2017.8356342},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AndreevPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AvilaMSS17,
  author       = {Anderson Holguin Avila and
                  Brigitte Rodriguez Mendoza and
                  Maria Bohorquez Sotelo and
                  Delgadillo Loaiza Juan Sebastian},
  title        = {Work in Progress: Nobody knows who you really are online/on the world
                  wide web - Amazon-recognition-service based 'Virtualnet' supported
                  authentication: How certain are you it is indeed you in front of a
                  screen?},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {342--345},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356414},
  doi          = {10.23919/ICITST.2017.8356414},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AvilaMSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BaddersO17,
  author       = {Blake Badders and
                  Aspen Olmsted},
  title        = {Improve {CRUD} performance on hierarchical data: Nested interval model
                  vs. nested set model},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {370--371},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356423},
  doi          = {10.23919/ICITST.2017.8356423},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BaddersO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BauerSMBHITW17,
  author       = {Elisabeth Bauer and
                  Oliver Schluga and
                  Silia Maksuti and
                  Ani Bicaku and
                  David Hofbauer and
                  Igor Ivkic and
                  Markus Gerhard Tauber and
                  Alexander W{\"{o}}hrer},
  title        = {Towards a security baseline for IaaS-cloud back-ends in Industry 4.0},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {427--432},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356438},
  doi          = {10.23919/ICITST.2017.8356438},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BauerSMBHITW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BennakhiJ17,
  author       = {Ahmad Bennakhi and
                  Mohamed A. Jeragh},
  title        = {Applying dynamic verification tagging to the k-anonymity model},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {439--443},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356442},
  doi          = {10.23919/ICITST.2017.8356442},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BennakhiJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BertolissiBU17,
  author       = {Clara Bertolissi and
                  Omar Boucelma and
                  Worachet Uttha},
  title        = {Enhancing security in the cloud: When traceability meets access control},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {365--366},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356420},
  doi          = {10.23919/ICITST.2017.8356420},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BertolissiBU17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BissadaO17,
  author       = {Andrew Bissada and
                  Aspen Olmsted},
  title        = {Mobile multi-factor authentication},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {210--211},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356383},
  doi          = {10.23919/ICITST.2017.8356383},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BissadaO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BlairOA17,
  author       = {Walter Blair and
                  Aspen Olmsted and
                  Paul Anderson},
  title        = {Docker vs. {KVM:} Apache spark application performance and ease of
                  use},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {199--201},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356378},
  doi          = {10.23919/ICITST.2017.8356378},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BlairOA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BlairOA17a,
  author       = {Walter Blair and
                  Aspen Olmsted and
                  Paul Anderson},
  title        = {Spark framework for transcriptomic trimming algorithm reduces cost
                  of reading multiple input files},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {469--471},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356451},
  doi          = {10.23919/ICITST.2017.8356451},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BlairOA17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BlixEL17,
  author       = {Fredrik Blix and
                  Salah Addin Elshekeil and
                  Saran Laoyookhong},
  title        = {Data protection by design in systems development: From legal requirements
                  to technical solutions},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {98--103},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356355},
  doi          = {10.23919/ICITST.2017.8356355},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BlixEL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BoumarafM17,
  author       = {Messaouda Boumaraf and
                  Fatiha Merazka},
  title        = {Speech encryption based on hybrid chaotic key generator for {AMR-WB}
                  {G.722.2} codec},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {87--91},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356353},
  doi          = {10.23919/ICITST.2017.8356353},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BoumarafM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BriggsO17,
  author       = {Thomas Briggs and
                  Aspen Olmsted},
  title        = {Client side calculation of 'bacon number'},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {356--358},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356418},
  doi          = {10.23919/ICITST.2017.8356418},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BriggsO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BrillN17,
  author       = {Callum Brill and
                  Thomas Nash},
  title        = {A comparative analysis of {MANET} routing protocols through simulation},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {244--247},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356392},
  doi          = {10.23919/ICITST.2017.8356392},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BrillN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BuYJ17,
  author       = {Shuaiyi Bu and
                  Shuxin Yang and
                  Haoming Ji},
  title        = {Distributed computing framework in security: Case study of encryption
                  method},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {311--318},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356407},
  doi          = {10.23919/ICITST.2017.8356407},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BuYJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CacaisS17,
  author       = {Michelle G. Cacais and
                  Gilvandenys Leite Sales},
  title        = {A collaborative system for corporate performance evaluation using
                  gamification and the learning vectors model},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {484--489},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356455},
  doi          = {10.23919/ICITST.2017.8356455},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/CacaisS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChanO17,
  author       = {Wren Chan and
                  Aspen Olmsted},
  title        = {Ethereum transaction graph analysis},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {498--500},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356459},
  doi          = {10.23919/ICITST.2017.8356459},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChanO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChenO17,
  author       = {Wayne Chen and
                  Aspen Olmsted},
  title        = {Considerations for OS\({}^{\mbox{V}}\) over Linux-based virtual machines},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {346--348},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356415},
  doi          = {10.23919/ICITST.2017.8356415},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChenO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ClincyS17,
  author       = {Victor Clincy and
                  Hossain Shahriar},
  title        = {Web service injection attack detection},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {173--178},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356371},
  doi          = {10.23919/ICITST.2017.8356371},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ClincyS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Cooharojananone17,
  author       = {Nagul Cooharojananone and
                  Krittika Akasarakul and
                  Thipsuda Wongkhamdi and
                  Phonkornkrit Pruetthiwongwanich and
                  Kanokwan Atchariyachanvanich},
  title        = {The study of the local community products {(OTOP)} website characteristics
                  toward buyer decision using eye tracking},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {411--416},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356434},
  doi          = {10.23919/ICITST.2017.8356434},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Cooharojananone17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DowlingSM17,
  author       = {Seamus Dowling and
                  Michael Schukat and
                  Hugh Melvin},
  title        = {Using analysis of temporal variances within a honeypot dataset to
                  better predict attack type probability},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {349--354},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356416},
  doi          = {10.23919/ICITST.2017.8356416},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DowlingSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DugganMDHB17,
  author       = {Martin Duggan and
                  Karl Mason and
                  Jim Duggan and
                  Enda Howley and
                  Enda Barrett},
  title        = {Predicting host {CPU} utilization in cloud computing using recurrent
                  neural networks},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356348},
  doi          = {10.23919/ICITST.2017.8356348},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/DugganMDHB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EnamamuCHL17,
  author       = {Timibloudi S. Enamamu and
                  Nathan L. Clarke and
                  Paul S. Haskell{-}Dowland and
                  Fudong Li},
  title        = {Transparent authentication: Utilising heart rate for user authentication},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {283--289},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356401},
  doi          = {10.23919/ICITST.2017.8356401},
  timestamp    = {Fri, 19 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/EnamamuCHL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ErnawanKM17,
  author       = {Ferda Ernawan and
                  Muhammad Nomani Kabir and
                  Zuriani Mustaffa},
  title        = {A blind watermarking technique based on {DCT} psychovisual threshold
                  for a robust copyright protection},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {92--97},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356354},
  doi          = {10.23919/ICITST.2017.8356354},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ErnawanKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Farooqi17,
  author       = {Norah S. Farooqi},
  title        = {Intelligent safety management system for crowds using sensors},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {144--147},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356365},
  doi          = {10.23919/ICITST.2017.8356365},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Farooqi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FeltusP17,
  author       = {Christophe Feltus and
                  Erik H. A. Proper},
  title        = {Towards a security and privacy co-creation method},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {75--80},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356351},
  doi          = {10.23919/ICITST.2017.8356351},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FeltusP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FischerMS17,
  author       = {Daniel Fischer and
                  Bernd Markscheffel and
                  K. Scherr},
  title        = {Secure e-mail communication - Comparison and selection of encryption
                  solutions using an utility value analysis approach},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {433--435},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356439},
  doi          = {10.23919/ICITST.2017.8356439},
  timestamp    = {Fri, 22 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/FischerMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Furnell17,
  author       = {Steven Furnell},
  title        = {Keynote speaker 5: Taming security technology},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {19},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356335},
  doi          = {10.23919/ICITST.2017.8356335},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Furnell17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GiubiloSSCFL17,
  author       = {Fabio Giubilo and
                  Ali Sajjad and
                  Mark Shackleton and
                  David W. Chadwick and
                  Wenjun Fan and
                  Rog{\'{e}}rio de Lemos},
  title        = {An architecture for privacy-preserving sharing of {CTI} with 3\({}^{\mbox{rd}}\)
                  party analysis services},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {293--297},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356404},
  doi          = {10.23919/ICITST.2017.8356404},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GiubiloSSCFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GoeddelSO17,
  author       = {Stephen Goeddel and
                  Pasha Sadeghian and
                  Aspen Olmsted},
  title        = {Weighing the shopping benefits of a smarter refrigerator},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {377--378},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356425},
  doi          = {10.23919/ICITST.2017.8356425},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GoeddelSO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GrafK17,
  author       = {Roman Graf and
                  Ross King},
  title        = {Secured transactions technique based on smart contracts for situational
                  awareness tools},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {81--86},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356352},
  doi          = {10.23919/ICITST.2017.8356352},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GrafK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HamiltonO17,
  author       = {Cameron Hamilton and
                  Aspen Olmsted},
  title        = {Database multi-factor authentication via pluggable authentication
                  modules},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {367--368},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356421},
  doi          = {10.23919/ICITST.2017.8356421},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HamiltonO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HealySO17,
  author       = {Elizabeth Healy and
                  Husna Siddiqui and
                  Aspen Olmsted},
  title        = {Classifying influenza outbreaks by analyzing and filtering Twitter
                  data},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {205--207},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356381},
  doi          = {10.23919/ICITST.2017.8356381},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HealySO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HellingRO17,
  author       = {Paul Helling and
                  Ahana Roy and
                  Aspen Olmsted},
  title        = {Effects of lexicon size on solving bananagrams},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {339--341},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356413},
  doi          = {10.23919/ICITST.2017.8356413},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HellingRO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HueHB17,
  author       = {Ta Thi Kim Hue and
                  Thang Manh Hoang and
                  An Braeken},
  title        = {Lightweight signcryption scheme based on discrete Chebyshev maps},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {43--47},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356343},
  doi          = {10.23919/ICITST.2017.8356343},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HueHB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IvkicTW17,
  author       = {Igor Ivkic and
                  Markus Gerhard Tauber and
                  Alexander W{\"{o}}hrer},
  title        = {Towards comparing programming paradigms},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {436--437},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356440},
  doi          = {10.23919/ICITST.2017.8356440},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IvkicTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IvkicWOT17,
  author       = {Igor Ivkic and
                  Stephan Wolfauer and
                  Thomas Oberhofer and
                  Markus Gerhard Tauber},
  title        = {On the cost of cyber security in smart business},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {255--260},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356395},
  doi          = {10.23919/ICITST.2017.8356395},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IvkicWOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/James17,
  author       = {Anne E. James},
  title        = {Keynote speaker 4: Cloud forensics},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {18},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356334},
  doi          = {10.23919/ICITST.2017.8356334},
  timestamp    = {Fri, 11 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/James17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JanardhananB17,
  author       = {Deepak Janardhanan and
                  Enda Barrett},
  title        = {{CPU} workload forecasting of machines in data centers using {LSTM}
                  recurrent neural networks and {ARIMA} models},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356346},
  doi          = {10.23919/ICITST.2017.8356346},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JanardhananB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KennedyO17,
  author       = {William Kennedy and
                  Aspen Olmsted},
  title        = {Three factor authentication},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {212--213},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356384},
  doi          = {10.23919/ICITST.2017.8356384},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KennedyO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Kim17,
  author       = {Charles Kim},
  title        = {Keynote speaker 1: Cyber-resilient {ICS} through diversified redundancy
                  and intrusion detection},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {15},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356331},
  doi          = {10.23919/ICITST.2017.8356331},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Kim17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimL17,
  author       = {Ahyoung Kim and
                  Junwoo Lee},
  title        = {Mobile business performance metrics: Framework and case study},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {179--184},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356372},
  doi          = {10.23919/ICITST.2017.8356372},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimYK17,
  author       = {Daehee Kim and
                  Jaekeun Yun and
                  Sungjun Kim},
  title        = {Hybrid public key authentication for wireless sensor networks},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {142--143},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356364},
  doi          = {10.23919/ICITST.2017.8356364},
  timestamp    = {Fri, 19 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimYK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KiyomotoBRR17,
  author       = {Shinsaku Kiyomoto and
                  Anirban Basu and
                  Mohammad Shahriar Rahman and
                  Sushmita Ruj},
  title        = {On blockchain-based authorization architecture for beyond-5G mobile
                  services},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {136--141},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356363},
  doi          = {10.23919/ICITST.2017.8356363},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KiyomotoBRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Kongsoontornkijkul17,
  author       = {Kritika Kongsoontornkijkul and
                  Rath Pichyangkura and
                  Pakpachong Vadhanasindhu and
                  Kanlaya Vanichbuncha},
  title        = {A study of factors effecting Thailand talent mobility programme: Case
                  of university and food technology industry},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {444--449},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356443},
  doi          = {10.23919/ICITST.2017.8356443},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Kongsoontornkijkul17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KumarV017,
  author       = {Sanjay Kumar and
                  Ari Viinikainen and
                  Timo H{\"{a}}m{\"{a}}l{\"{a}}inen},
  title        = {Evaluation of ensemble machine learning methods in mobile threat detection},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {261--268},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356396},
  doi          = {10.23919/ICITST.2017.8356396},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KumarV017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Lee17,
  author       = {Yen{-}Mei Lee},
  title        = {Seeking academic information on the Internet: Doctoral students' Internet
                  self-efficacy and emotions},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {320--324},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356409},
  doi          = {10.23919/ICITST.2017.8356409},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Lee17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LileO17,
  author       = {Ryan Lile and
                  Aspen Olmsted},
  title        = {Meaningful sandbox data},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {203--204},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356380},
  doi          = {10.23919/ICITST.2017.8356380},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LileO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LiuL017,
  author       = {Juhua Liu and
                  Wei Li and
                  Guoqiang Bai},
  title        = {Efficient hardware implementation of ITUbee for lightweight application},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {372--376},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356424},
  doi          = {10.23919/ICITST.2017.8356424},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LiuL017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LoiO17,
  author       = {Huicong Loi and
                  Aspen Olmsted},
  title        = {Low-cost detection of backdoor malware},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {197--198},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356377},
  doi          = {10.23919/ICITST.2017.8356377},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LoiO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MaWW17,
  author       = {Yichen Ma and
                  Fuyao Wang and
                  Zhuozheng Wang},
  title        = {Intelligent laboratory management system based on Internet of Things},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {464--467},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356449},
  doi          = {10.23919/ICITST.2017.8356449},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MaWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MahmoodNM17,
  author       = {Khurram Mahmood and
                  Zainab Nayyar and
                  Hafiz Mushtaq},
  title        = {Role of transformational leadership on e-govemment switching: Multi-channel
                  and digital divide},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {475--478},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356453},
  doi          = {10.23919/ICITST.2017.8356453},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MahmoodNM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Malfa17,
  author       = {Enrico Malfa},
  title        = {Keynote speaker 6: Steel made in Europe: The backbone of sustainability},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {20},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356336},
  doi          = {10.23919/ICITST.2017.8356336},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Malfa17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MashhadaniACFL17,
  author       = {Shahlaa Mashhadani and
                  Hiba Al{-}Kawaz and
                  Nathan L. Clarke and
                  Steven Furnell and
                  Fudong Li},
  title        = {A novel multimedia-forensic analysis tool {(M-FAT)}},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {388--395},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356429},
  doi          = {10.23919/ICITST.2017.8356429},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MashhadaniACFL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/McShaneS17,
  author       = {Philip McShane and
                  Darryl Stewart},
  title        = {Challenge based visual speech recognition using deep learning},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {405--410},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356433},
  doi          = {10.23919/ICITST.2017.8356433},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/McShaneS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Mejia-RicartHO17,
  author       = {Luis F. Mejia{-}Ricart and
                  Paul Helling and
                  Aspen Olmsted},
  title        = {Evaluate action primitives for human activity recognition using unsupervised
                  learning approach},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {186--188},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356374},
  doi          = {10.23919/ICITST.2017.8356374},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Mejia-RicartHO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Mejia-RicartO17,
  author       = {Luis F. Mejia{-}Ricart and
                  Aspen Olmsted},
  title        = {Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {472--474},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356452},
  doi          = {10.23919/ICITST.2017.8356452},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Mejia-RicartO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NashO17,
  author       = {Thomas Nash and
                  Aspen Olmsted},
  title        = {Performance vs. security: Implementing an immutable database in MySQL},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {290--291},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356402},
  doi          = {10.23919/ICITST.2017.8356402},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NashO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NashO17a,
  author       = {Thomas Nash and
                  Aspen Olmsted},
  title        = {shinySDM: Point and click species distribution modeling},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {450--451},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356444},
  doi          = {10.23919/ICITST.2017.8356444},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NashO17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NiazS17,
  author       = {Muhammad Saqib Niaz and
                  Gunter Saake},
  title        = {Forward secure searchable symmetric encryption},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {49--54},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356345},
  doi          = {10.23919/ICITST.2017.8356345},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NiazS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ObinnaPCT17,
  author       = {Omego Obinna and
                  Eckhard Pfluegel and
                  Charles A. Clarke and
                  Martin J. Tunnicliffe},
  title        = {A multi-channel steganographic protocol for secure {SMS} mobile banking},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {248--253},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356393},
  doi          = {10.23919/ICITST.2017.8356393},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ObinnaPCT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Olmsted17,
  author       = {Aspen Olmsted},
  title        = {Entity identity, performance, and storage},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {155--160},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356368},
  doi          = {10.23919/ICITST.2017.8356368},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Olmsted17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OmraniBMRB17,
  author       = {Tasnime Omrani and
                  Rabei Becheikh and
                  Olfa Mannai and
                  Rhouma Rhouma and
                  Safya Belghith},
  title        = {{RARE:} {A} robust algorithm for rapid encryption},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {23--28},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356339},
  doi          = {10.23919/ICITST.2017.8356339},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OmraniBMRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OwensO17,
  author       = {Preston T. Owens and
                  Aspen Olmsted},
  title        = {Optimizing synchronization of cloud storage services: Combining benchmark
                  monitoring and learning-based framework},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {379--380},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356426},
  doi          = {10.23919/ICITST.2017.8356426},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OwensO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PadayacheeW17,
  author       = {Keshnee Padayachee and
                  Elias Worku},
  title        = {Shared situational awareness in information security incident management},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {479--483},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356454},
  doi          = {10.23919/ICITST.2017.8356454},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PadayacheeW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PellegriniRS17,
  author       = {Roland Pellegrini and
                  Patrick Rottmann and
                  Georg Strieder},
  title        = {Preventing vendor lock-ins via an interoperable multi-cloud deployment
                  approach},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {382--387},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356428},
  doi          = {10.23919/ICITST.2017.8356428},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PellegriniRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Pournaras17,
  author       = {Evangelos Pournaras},
  title        = {Keynote speaker 2: Participatory self-management systems for resilient
                  smart cities},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {16},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356332},
  doi          = {10.23919/ICITST.2017.8356332},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Pournaras17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RoyMHO17,
  author       = {Ahana Roy and
                  Louis Mejia and
                  Paul Helling and
                  Aspen Olmsted},
  title        = {Automation of cyber-reconnaissance: {A} Java-based open source tool
                  for information gathering},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {424--426},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356437},
  doi          = {10.23919/ICITST.2017.8356437},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RoyMHO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RoyO17,
  author       = {Ahana Roy and
                  Aspen Olmsted},
  title        = {Distributed query processing and data sharing},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {221--224},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356387},
  doi          = {10.23919/ICITST.2017.8356387},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RoyO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SadeghianO17,
  author       = {Pasha Sadeghian and
                  Aspen Olmsted},
  title        = {Assessment of fuzzy min-max neural networks for classification tasks},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {193--196},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356376},
  doi          = {10.23919/ICITST.2017.8356376},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SadeghianO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SadeghianWGO17,
  author       = {Pasha Sadeghian and
                  Casey Wilson and
                  Stephen Goeddel and
                  Aspen Olmsted},
  title        = {Classification of music by composer using fuzzy min-max neural networks},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {189--192},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356375},
  doi          = {10.23919/ICITST.2017.8356375},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SadeghianWGO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaidiHRB17,
  author       = {Marwa Saidi and
                  Houcemeddine Hermassi and
                  Rhouma Rhouma and
                  Safya Belghith},
  title        = {LSB-hamming based chaotic steganography (LH-Steg)},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {29--34},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356340},
  doi          = {10.23919/ICITST.2017.8356340},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SaidiHRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SandiferWO17,
  author       = {Anna V. Sandifer and
                  Casey Wilson and
                  Aspen Olmsted},
  title        = {Detection of fake online hotel reviews},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {501--502},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356460},
  doi          = {10.23919/ICITST.2017.8356460},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SandiferWO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SelcukOB17,
  author       = {Ali Aydin Sel{\c{c}}uk and
                  Fatih Orhan and
                  Berker Batur},
  title        = {Undecidable problems in malware analysis},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {494--497},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356458},
  doi          = {10.23919/ICITST.2017.8356458},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SelcukOB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShawHB17,
  author       = {Rachael Shaw and
                  Enda Howley and
                  Enda Barrett},
  title        = {An advanced reinforcement learning approach for energy-aware virtual
                  machine consolidation in cloud data centers},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356347},
  doi          = {10.23919/ICITST.2017.8356347},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ShawHB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SiddavaatamSS17,
  author       = {Prathap Siddavaatam and
                  Reza Sedaghat and
                  Aakriti Tarun Sharma},
  title        = {intel-LEACH: An optimal framework for node selection using dynamic
                  clustering for wireless sensor networks},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {359--364},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356419},
  doi          = {10.23919/ICITST.2017.8356419},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SiddavaatamSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SiddiquiHO17,
  author       = {Husna Siddiqui and
                  Elizabeth Healy and
                  Aspen Olmsted},
  title        = {Bot or not},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {462--463},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356448},
  doi          = {10.23919/ICITST.2017.8356448},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SiddiquiHO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SiddiquiOK17,
  author       = {Husna Siddiqui and
                  Aspen Olmsted and
                  Brendan Keane},
  title        = {Venmo: Exposing a user's lifestyle},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {403--404},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356432},
  doi          = {10.23919/ICITST.2017.8356432},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SiddiquiOK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SrimuangCTCA17,
  author       = {Chatipot Srimuang and
                  Nagul Cooharojananone and
                  Uthai Tanlamai and
                  Achara Chandrachai and
                  Kanokwan Atchariyachanvanich},
  title        = {The study of public organization's intention to use an open government
                  data assessment application: Testing with an applicable {TAM}},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {231--236},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356389},
  doi          = {10.23919/ICITST.2017.8356389},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/SrimuangCTCA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/StoudenmierO17,
  author       = {Seth Stoudenmier and
                  Aspen Olmsted},
  title        = {Efficient retrieval of information from hierarchical {REST} requests},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {452--454},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356445},
  doi          = {10.23919/ICITST.2017.8356445},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/StoudenmierO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Tochikubo17,
  author       = {Kouya Tochikubo},
  title        = {Multiple assignment secret sharing scheme using hierarchical threshold
                  scheme},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {456--461},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356447},
  doi          = {10.23919/ICITST.2017.8356447},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Tochikubo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/UtomoWW17,
  author       = {Rio Guntur Utomo and
                  Robert John Walters and
                  Gary B. Wills},
  title        = {Factors affecting the implementation of information assurance for
                  eGovernment in Indonesia},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {225--230},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356388},
  doi          = {10.23919/ICITST.2017.8356388},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/UtomoWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Wanchai17,
  author       = {Paweena Wanchai},
  title        = {Customer churn analysis : {A} case study on the telecommunication
                  industry of Thailand},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {325--331},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356410},
  doi          = {10.23919/ICITST.2017.8356410},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Wanchai17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Wills17,
  author       = {Gary B. Wills},
  title        = {Keynote speaker 3: Looking after our {IP} in supply chain},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {17},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356333},
  doi          = {10.23919/ICITST.2017.8356333},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Wills17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WilsonO17,
  author       = {Casey Wilson and
                  Aspen Olmsted},
  title        = {Handling an organization's communication needs with a single web service},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {208--209},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356382},
  doi          = {10.23919/ICITST.2017.8356382},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WilsonO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WilsonSO17,
  author       = {Casey Wilson and
                  Anna V. Sandifer and
                  Aspen Olmsted},
  title        = {Designing an assembly language using {MIT} App inventor},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {491--493},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356457},
  doi          = {10.23919/ICITST.2017.8356457},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WilsonSO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YuenC17,
  author       = {W. P. Yuen and
                  K. B. Chuah},
  title        = {Data visibility and trust enhancement of enterprise customers in cloud
                  computing services},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {417--422},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356435},
  doi          = {10.23919/ICITST.2017.8356435},
  timestamp    = {Tue, 15 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YuenC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZarghoonADD17,
  author       = {Abidullah Zarghoon and
                  Irfan Awan and
                  Jules Pagna Disso and
                  Richard Dennis},
  title        = {Evaluation of {AV} systems against modern malware},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {269--273},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356397},
  doi          = {10.23919/ICITST.2017.8356397},
  timestamp    = {Tue, 19 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ZarghoonADD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZeffererZR17,
  author       = {Thomas Zefferer and
                  Dominik Ziegler and
                  Andreas Reiter},
  title        = {Best of two worlds: Secure cloud federations meet eIDAS},
  booktitle    = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  pages        = {396--401},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.23919/ICITST.2017.8356430},
  doi          = {10.23919/ICITST.2017.8356430},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZeffererZR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2017,
  title        = {12th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14,
                  2017},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8354335/proceeding},
  isbn         = {978-1-908320-93-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AhmedKBC16,
  author       = {Adnan Ahmed and
                  Pardeep Kumar and
                  Ali Raza Bhangwar and
                  Muhammad Ibrahim Channa},
  title        = {A secure and QoS aware routing protocol for Wireless Sensor Network},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {313--317},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856720},
  doi          = {10.1109/ICITST.2016.7856720},
  timestamp    = {Sat, 27 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AhmedKBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-MohammedL16,
  author       = {Emad Al{-}Mohammed and
                  Nigel Linge},
  title        = {A generic, personalized electronic program guide system for accessing
                  multiple online {TV} providers},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {291--296},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856715},
  doi          = {10.1109/ICITST.2016.7856715},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-MohammedL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-NaffakhCDL16,
  author       = {Neamah Al{-}Naffakh and
                  Nathan L. Clarke and
                  Paul Dowland and
                  Fudong Li},
  title        = {Activity Recognition using wearable computing},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {189--195},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856695},
  doi          = {10.1109/ICITST.2016.7856695},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-NaffakhCDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-SmadiQTAJB16,
  author       = {Mohammad Al{-}Smadi and
                  Omar Qawasmeh and
                  Bashar Talafha and
                  Mahmoud Al{-}Ayyoub and
                  Yaser Jararweh and
                  Elhadj Benkhelifa},
  title        = {An enhanced framework for aspect-based sentiment analysis of Hotels'
                  reviews: Arabic reviews case study},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {98--103},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856675},
  doi          = {10.1109/ICITST.2016.7856675},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-SmadiQTAJB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Alazri16,
  author       = {Aisha Suliaman Alazri},
  title        = {Telecommunication traffic through submarine cables: Security and vulnerabilities},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {372--375},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856733},
  doi          = {10.1109/ICITST.2016.7856733},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Alazri16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlghafliM16,
  author       = {Khawla Alghafli and
                  Thomas Martin},
  title        = {Identification and recovery of video fragments for forensics file
                  carving},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {267--272},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856710},
  doi          = {10.1109/ICITST.2016.7856710},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlghafliM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlmarashdehA16,
  author       = {Ibrahim Almarashdeh and
                  Mutasem Alsmadi},
  title        = {Heuristic evaluation of mobile government portal services: An experts'
                  review},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {427--431},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856746},
  doi          = {10.1109/ICITST.2016.7856746},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlmarashdehA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlmubairikW16,
  author       = {Norah Ahmed Almubairik and
                  Gary B. Wills},
  title        = {Automated penetration testing based on a threat model},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {413--414},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856742},
  doi          = {10.1109/ICITST.2016.7856742},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlmubairikW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Alomari16,
  author       = {Mohammad Kamel Alomari},
  title        = {Digital divide impact on e-voting adoption in middle eastern country},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {409--412},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856741},
  doi          = {10.1109/ICITST.2016.7856741},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Alomari16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiFC16,
  author       = {Mutlaq Jalimid Alotaibi and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {Information security policies: {A} review of challenges and influencing
                  factors},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {352--358},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856729},
  doi          = {10.1109/ICITST.2016.7856729},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiFC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiFSP16,
  author       = {Faisal Alotaibi and
                  Steven Furnell and
                  Ingo Stengel and
                  Maria Papadaki},
  title        = {A survey of cyber-security awareness in Saudi Arabia},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {154--158},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856687},
  doi          = {10.1109/ICITST.2016.7856687},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiFSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotibiCLF16,
  author       = {Gaseb Alotibi and
                  Nathan L. Clarke and
                  Fudong Li and
                  Steven Furnell},
  title        = {User profiling from network traffic via novel application-level interactions},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {279--285},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856712},
  doi          = {10.1109/ICITST.2016.7856712},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotibiCLF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlsalamiYMK16,
  author       = {Yousuf Alsalami and
                  Chan Yeob Yeun and
                  Thomas Martin and
                  Majid Khonji},
  title        = {Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {447--454},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856751},
  doi          = {10.1109/ICITST.2016.7856751},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlsalamiYMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmanoONKMN16,
  author       = {Takashi Amano and
                  Ryo Onuma and
                  Hiroki Nakayama and
                  Hiroaki Kaminaga and
                  Youzou Miyadera and
                  Shoichi Nakamura},
  title        = {Gaze network extraction from bookmarks in accordance with search intentions},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {472--473},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856756},
  doi          = {10.1109/ICITST.2016.7856756},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmanoONKMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Anton-Haro16,
  author       = {Carles Ant{\'{o}}n{-}Haro},
  title        = {Invited speaker {(IEEE} Spain section professional activities): Scientific
                  resumes and job interviews - how to make (a positive) impact},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {20},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856656},
  doi          = {10.1109/ICITST.2016.7856656},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Anton-Haro16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArakawaNOKMN16,
  author       = {Daisuke Arakawa and
                  Hiroki Nakayama and
                  Ryo Onuma and
                  Hiroaki Kaminaga and
                  Youzou Miyadera and
                  Shoichi Nakamura},
  title        = {Dynamically visualizing the relationships between Web pages depending
                  on user's search viewpoints},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {474--475},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856757},
  doi          = {10.1109/ICITST.2016.7856757},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ArakawaNOKMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BensimessaoudBB16,
  author       = {Sihem Bensimessaoud and
                  Nadjib Badache and
                  Souad Benmeziane and
                  Amina Djellalbia},
  title        = {An enhanced approach to preserving privacy in social network data
                  publishing},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {80--85},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856671},
  doi          = {10.1109/ICITST.2016.7856671},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BensimessaoudBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BuccafurriLNN16,
  author       = {Francesco Buccafurri and
                  Gianluca Lax and
                  Serena Nicolazzo and
                  Antonino Nocera},
  title        = {Range query integrity in the cloud: the case of video surveillance},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {170--175},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856691},
  doi          = {10.1109/ICITST.2016.7856691},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BuccafurriLNN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Clarke16,
  author       = {Sandra Stincic Clarke},
  title        = {Keynote speaker 4: Data silos of the IoT kind},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {19},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856655},
  doi          = {10.1109/ICITST.2016.7856655},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Clarke16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Corcho16,
  author       = {{\'{O}}scar Corcho},
  title        = {Keynote speaker 3: Open Data city portals: Working towards their homogeneisation},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {18},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856654},
  doi          = {10.1109/ICITST.2016.7856654},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Corcho16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DjellalbiaBBB16,
  author       = {Amina Djellalbia and
                  Nadjib Badache and
                  Souad Benmeziane and
                  Sihem Bensimessaoud},
  title        = {Anonymous authentication scheme in e-Health Cloud environment},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {47--52},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856664},
  doi          = {10.1109/ICITST.2016.7856664},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DjellalbiaBBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FayR16,
  author       = {Robin Fay and
                  Christoph Ruland},
  title        = {Compressive Sensing encryption modes and their security},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {119--126},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856681},
  doi          = {10.1109/ICITST.2016.7856681},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FayR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FurnellS16,
  author       = {Steven Furnell and
                  Charles A. Shoniregun},
  title        = {Welcome message},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {3},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856648},
  doi          = {10.1109/ICITST.2016.7856648},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FurnellS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GarasymTL16,
  author       = {Oleg Garasym and
                  Ina Taralova and
                  Ren{\'{e}} Lozi},
  title        = {Key requirements for the design of robust chaotic {PRNG}},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {33--38},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856660},
  doi          = {10.1109/ICITST.2016.7856660},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GarasymTL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GhannamiS16,
  author       = {Aiman Ghannami and
                  Chenxi Shao},
  title        = {Experience-based learning for identifying sub-regions in Wireless
                  Sensor Networks},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {326--327},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856722},
  doi          = {10.1109/ICITST.2016.7856722},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GhannamiS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GhannamiS16a,
  author       = {Aiman Ghannami and
                  Chenxi Shao},
  title        = {Efficient fast recovery mechanism in Software-Defined Networks: Multipath
                  routing approach},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {432--435},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856747},
  doi          = {10.1109/ICITST.2016.7856747},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GhannamiS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GrecoCB16,
  author       = {Alessandro Greco and
                  Alberto Caponi and
                  Giuseppe Bianchi},
  title        = {Facing lateral movements using widespread behavioral probes},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {159--160},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856688},
  doi          = {10.1109/ICITST.2016.7856688},
  timestamp    = {Mon, 26 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/GrecoCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Guzman-Candelario16,
  author       = {Cynthia Lizbeth Guzman{-}Candelario and
                  Jose Juan Garcia{-}Hernandez and
                  Loreto Gonzalez{-}Hernandez},
  title        = {A low-distortion {QR} Code watermarking scheme for digital color images
                  robust to gamma correction attack},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {27--32},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856659},
  doi          = {10.1109/ICITST.2016.7856659},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Guzman-Candelario16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HajjemB16,
  author       = {Lotfi Hajjem and
                  Salah Benabdallah},
  title        = {An {MMAS-GA} for resource allocation in multi-cloud systems},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {421--426},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856745},
  doi          = {10.1109/ICITST.2016.7856745},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HajjemB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Hernandez-Ardieta16,
  author       = {Jorge Lopez Hernandez{-}Ardieta},
  title        = {Keynote speaker 2: Cyber ranges: The (r)evolution in cybersecurity
                  training},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {16--17},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856653},
  doi          = {10.1109/ICITST.2016.7856653},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Hernandez-Ardieta16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HuSCCFC16,
  author       = {Yi Hu and
                  Dustin Sulek and
                  Anthony Carella and
                  Joshua Cox and
                  Allyson Frame and
                  Karen Cipriano},
  title        = {Employing miniaturized computers for distributed vulnerability assessment},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {57--61},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856666},
  doi          = {10.1109/ICITST.2016.7856666},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HuSCCFC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JallouliAC16,
  author       = {Ons Jallouli and
                  Safwan El Assad and
                  Maryline Chetto},
  title        = {Robust chaos-based stream-cipher for secure public communication channels},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {23--26},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856658},
  doi          = {10.1109/ICITST.2016.7856658},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/JallouliAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JameiiM16,
  author       = {Seyed Mahdi Jameii and
                  Mohsen Maadani},
  title        = {Intelligent dynamic Connectivity Control Algorithm for cluster-based
                  wireless sensor networks},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {416--420},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856744},
  doi          = {10.1109/ICITST.2016.7856744},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JameiiM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KarabeyA16,
  author       = {Isil Karabey and
                  Gamze Akman},
  title        = {A cryptographic approach for secure client - server chat application
                  using public key infrastructure {(PKI)}},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {442--446},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856750},
  doi          = {10.1109/ICITST.2016.7856750},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KarabeyA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KassimA16,
  author       = {Murizah Kassim and
                  Nor Azura Ayop},
  title        = {Adaptive Policing Algorithms on inbound internet traffic using Generalized
                  Pareto model},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {217--222},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856700},
  doi          = {10.1109/ICITST.2016.7856700},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KassimA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhattakIHSPL16,
  author       = {Asad Masood Khattak and
                  Farkhund Iqbal and
                  Patrick C. K. Hung and
                  Jwo{-}Shiun Sun and
                  Guan{-}Pu Pan and
                  Jing{-}Jie Lin},
  title        = {Privacy Requirements for mobile e-Service in the Health Authority
                  - Abu Dhabi {(HAAD)}},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {204--209},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856697},
  doi          = {10.1109/ICITST.2016.7856697},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/KhattakIHSPL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KumarV016,
  author       = {Sanjay Kumar and
                  Ari Viinikainen and
                  Timo H{\"{a}}m{\"{a}}l{\"{a}}inen},
  title        = {Machine learning classification model for Network based Intrusion
                  Detection System},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {242--249},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856705},
  doi          = {10.1109/ICITST.2016.7856705},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KumarV016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KuusijarviSSE16,
  author       = {Jarkko Kuusij{\"{a}}rvi and
                  Reijo Savola and
                  Pekka Savolainen and
                  Antti Evesti},
  title        = {Mitigating IoT security threats with a trusted Network element},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {260--265},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856708},
  doi          = {10.1109/ICITST.2016.7856708},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KuusijarviSSE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KvetV16,
  author       = {Michal Kvet and
                  Monika Vajsov{\'{a}}},
  title        = {Performance study of the index structures in audited environment},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {459--464},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856753},
  doi          = {10.1109/ICITST.2016.7856753},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KvetV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LawXXDYCK16,
  author       = {Chung Kwan Law and
                  Wen Xie and
                  Zheng Xu and
                  Yi Dou and
                  Chin Ting Yu and
                  Henry C. B. Chan and
                  Daniel Wai Kei Kwong},
  title        = {System and Protocols for secure Intercloud Communications},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {399--404},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856739},
  doi          = {10.1109/ICITST.2016.7856739},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/LawXXDYCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LittleO16,
  author       = {Madeline Little and
                  Aspen Olmsted},
  title        = {Temporal resource scheduling equity},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {297--299},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856716},
  doi          = {10.1109/ICITST.2016.7856716},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LittleO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LupianaM16,
  author       = {Dennis M. Lupiana and
                  Fredrick Mtenzi},
  title        = {KiCM: {A} knowledge-intensive context model},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {223--229},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856701},
  doi          = {10.1109/ICITST.2016.7856701},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/LupianaM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MarHLW16,
  author       = {Kheng Kok Mar and
                  ZhengQing Hu and
                  Chee Yong Law and
                  Meifen Wang},
  title        = {Secure cloud distributed file system},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {176--181},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856692},
  doi          = {10.1109/ICITST.2016.7856692},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MarHLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Marques-ArpaS16,
  author       = {Tomas Marques{-}Arpa and
                  Jordi Serra{-}Ruiz},
  title        = {{PRS} signal in acquiring evidence of Digital Chain of Custody},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {273--278},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856711},
  doi          = {10.1109/ICITST.2016.7856711},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Marques-ArpaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Michalas16,
  author       = {Antonis Michalas},
  title        = {Sharing in the rain: Secure and efficient data sharing for the Cloud},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {182--187},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856693},
  doi          = {10.1109/ICITST.2016.7856693},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Michalas16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MichelinZCNO16,
  author       = {Regio A. Michelin and
                  Avelino F. Zorzo and
                  Marcia B. Campos and
                  Charles V. Neu and
                  Alex M. S. Orozco},
  title        = {Smartphone as a biometric service for web authentication},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {405--408},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856740},
  doi          = {10.1109/ICITST.2016.7856740},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MichelinZCNO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MillerB16,
  author       = {Sean T. Miller and
                  Curtis Busby{-}Earle},
  title        = {The role of machine learning in botnet detection},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {359--364},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856730},
  doi          = {10.1109/ICITST.2016.7856730},
  timestamp    = {Mon, 08 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MillerB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MoganediMM16,
  author       = {Sophia Moganedi and
                  Njabulo Mkhonto and
                  Jabu Mtsweni},
  title        = {Evaluating the development and implementation of a profile-aware microtasking
                  platform for crowdsourcing services},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {335--339},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856725},
  doi          = {10.1109/ICITST.2016.7856725},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MoganediMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MohamedM16,
  author       = {Belghachi Mohamed and
                  Feham Mohamed},
  title        = {Experimental evaluation of {RPL} protocol},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {455--458},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856752},
  doi          = {10.1109/ICITST.2016.7856752},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MohamedM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MostefaS16,
  author       = {Benfilali Mostefa and
                  Sofiane Boukli Hacene},
  title        = {Adaptive image compression in wireless sensor networks},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {437--441},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856749},
  doi          = {10.1109/ICITST.2016.7856749},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MostefaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MoyoL16,
  author       = {Moses Moyo and
                  Marianne Loock},
  title        = {South African small and medium-sized enterprises' reluctance to adopt
                  and use cloud-based business intelligence systems: {A} literature
                  review},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {250--254},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856706},
  doi          = {10.1109/ICITST.2016.7856706},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MoyoL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MykhailenkoNH16,
  author       = {Hlib Mykhailenko and
                  Giovanni Neglia and
                  Fabrice Huet},
  title        = {Which metrics for vertex-cut partitioning?},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {74--79},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856670},
  doi          = {10.1109/ICITST.2016.7856670},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MykhailenkoNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NakayamaNNMKM16,
  author       = {Hiroki Nakayama and
                  Shoichi Nakamura and
                  Kaname Nozaki and
                  Yasuhiko Morimoto and
                  Hiroaki Kaminaga and
                  Youzou Miyadera},
  title        = {Learning History Transition Graphs for understanding the programming
                  learning situations},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {476--477},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856758},
  doi          = {10.1109/ICITST.2016.7856758},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NakayamaNNMKM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NardoneRM16,
  author       = {Roberto Nardone and
                  Ricardo J. Rodr{\'{\i}}guez and
                  Stefano Marrone},
  title        = {Formal security assessment of Modbus protocol},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {142--147},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856685},
  doi          = {10.1109/ICITST.2016.7856685},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/NardoneRM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NassarET16,
  author       = {Mohamed A. Nassar and
                  Layla A. A. El{-}Sayed and
                  Yousry Taha},
  title        = {Efficient parallel Stochastic Gradient Descent for matrix factorization
                  using {GPU}},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {63--68},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856668},
  doi          = {10.1109/ICITST.2016.7856668},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NassarET16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NawrathFM16,
  author       = {T. Nawrath and
                  Daniel Fischer and
                  Bernd Markscheffel},
  title        = {Privacy-sensitive data in connected cars},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {392--393},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856736},
  doi          = {10.1109/ICITST.2016.7856736},
  timestamp    = {Fri, 22 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/NawrathFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NeuZOM16,
  author       = {Charles V. Neu and
                  Avelino F. Zorzo and
                  Alex M. S. Orozco and
                  Regio A. Michelin},
  title        = {An approach for detecting encrypted insider attacks on OpenFlow {SDN}
                  Networks},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {210--215},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856698},
  doi          = {10.1109/ICITST.2016.7856698},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NeuZOM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NiranjanMD16,
  author       = {Niranjan Sivakumar and
                  Maxime Crepel and
                  Dominique Boullier},
  title        = {Risk management in payment system architectures},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {478},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856759},
  doi          = {10.1109/ICITST.2016.7856759},
  timestamp    = {Mon, 04 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NiranjanMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Olmsted16,
  author       = {Aspen Olmsted},
  title        = {Modeling cloud applications for partition contingency},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {230--234},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856702},
  doi          = {10.1109/ICITST.2016.7856702},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Olmsted16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Ordonez-AnteVSW16,
  author       = {Leandro Ordo{\~{n}}ez{-}Ante and
                  Thomas Vanhove and
                  Gregory van Seghbroeck and
                  Tim Wauters and
                  Filip De Turck},
  title        = {Interactive querying and data visualization for abuse detection in
                  social network sites},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {104--109},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856676},
  doi          = {10.1109/ICITST.2016.7856676},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Ordonez-AnteVSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OrozcoNMZ16,
  author       = {Alex M. S. Orozco and
                  Charles V. Neu and
                  Regio A. Michelin and
                  Avelino F. Zorzo},
  title        = {Security analysis of forwarding strategies in network time measurements
                  using Openflow},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {148--153},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856686},
  doi          = {10.1109/ICITST.2016.7856686},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OrozcoNMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OzcanO16,
  author       = {Gozde Ozcan and
                  Sule G{\"{u}}nd{\"{u}}z {\"{O}}g{\"{u}}d{\"{u}}c{\"{u}}},
  title        = {Applying different classification techniques in reciprocal job recommender
                  system for considering job candidate preferences},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {235--240},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856703},
  doi          = {10.1109/ICITST.2016.7856703},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OzcanO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RababahASJJ16,
  author       = {Abdullateef Rabab'ah and
                  Mahmoud Al{-}Ayyoub and
                  Mohammed A. Shehab and
                  Yaser Jararweh and
                  Bernard J. Jansen},
  title        = {Using the Panama Papers to explore the financial networks of the Middle
                  East},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {92--97},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856674},
  doi          = {10.1109/ICITST.2016.7856674},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RababahASJJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RafiqueAJL16,
  author       = {Aasim Rafique and
                  Shoaib Azam and
                  Moongu Jeon and
                  Sangwook Lee},
  title        = {Face-deidentification in images using Restricted Boltzmann Machines},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {69--73},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856669},
  doi          = {10.1109/ICITST.2016.7856669},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RafiqueAJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Rashidibajgan16,
  author       = {Samaneh Rashidibajgan},
  title        = {A trust structure for detection of sybil attacks in opportunistic
                  networks},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {347--351},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856728},
  doi          = {10.1109/ICITST.2016.7856728},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Rashidibajgan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SalahZYAA16,
  author       = {Tasneem Salah and
                  M. Jamal Zemerly and
                  Chan Yeob Yeun and
                  Mahmoud Al{-}Qutayri and
                  Yousof Al{-}Hammadi},
  title        = {The evolution of distributed systems towards microservices architecture},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {318--325},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856721},
  doi          = {10.1109/ICITST.2016.7856721},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SalahZYAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SalmanA16,
  author       = {Aymen J. Salman and
                  Adil Al{-}Yasiri},
  title        = {Developing Domain-Specific Language for Wireless Sensor Network application
                  development},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {301--308},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856718},
  doi          = {10.1109/ICITST.2016.7856718},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/SalmanA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SampedroS16,
  author       = {Andres Paz Sampedro and
                  Shantanu Srivastava},
  title        = {Cost to serve of large scale online systems},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {395--398},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856738},
  doi          = {10.1109/ICITST.2016.7856738},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SampedroS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SantosS16,
  author       = {Tiago Santos and
                  Carlos Serr{\~{a}}o},
  title        = {Secure Javascript Object Notation (SecJSON) Enabling granular confidentiality
                  and integrity of {JSON} documents},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {329--334},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856724},
  doi          = {10.1109/ICITST.2016.7856724},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SantosS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Sarier16,
  author       = {Neyire Deniz Sarier},
  title        = {Efficient biometric-based Encryption for fingerprints},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {127--132},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856682},
  doi          = {10.1109/ICITST.2016.7856682},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Sarier16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SeddikiD16,
  author       = {Nouredine Seddiki and
                  Amel Douli},
  title        = {Maximizing the wireless sensor networks lifetime},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {309--312},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856719},
  doi          = {10.1109/ICITST.2016.7856719},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SeddikiD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SethiPW16,
  author       = {Aneesha Sethi and
                  Federica Paci and
                  Gary B. Wills},
  title        = {EEVi - framework for evaluating the effectiveness of visualization
                  in cyber-security},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {340--345},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856726},
  doi          = {10.1109/ICITST.2016.7856726},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SethiPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SiddavaatamSC16,
  author       = {Prathap Siddavaatam and
                  Reza Sedaghat and
                  Min Hsuan Cheng},
  title        = {An adaptive security framework with extensible computational complexity
                  for cipher systems},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {133--140},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856683},
  doi          = {10.1109/ICITST.2016.7856683},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SiddavaatamSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Spenger016,
  author       = {Gabriele Spenger and
                  J{\"{o}}rg Keller},
  title        = {Structural improvements of chaotic {PRNG} implementations},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {465--470},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856754},
  doi          = {10.1109/ICITST.2016.7856754},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Spenger016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Srinivasan16,
  author       = {S. Srinivasan},
  title        = {Data privacy concerns involving cloud},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {53--56},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856665},
  doi          = {10.1109/ICITST.2016.7856665},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Srinivasan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TajanWRA16,
  author       = {Louis Tajan and
                  Dirk Westhoff and
                  Christian A. Reuter and
                  Frederik Armknecht},
  title        = {Private information retrieval and Searchable Encryption for privacy-preserving
                  multi-client cloud auditing},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {162--169},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856690},
  doi          = {10.1109/ICITST.2016.7856690},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TajanWRA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TawalbehAH16,
  author       = {Lo'ai Ali Tawalbeh and
                  Turki F. Al{-}Somani and
                  Hilal Houssain},
  title        = {Towards secure communications: Review of side channel attacks and
                  countermeasures on {ECC}},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {87--91},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856673},
  doi          = {10.1109/ICITST.2016.7856673},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TawalbehAH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TorreKSA16,
  author       = {Ilaria Torre and
                  Frosina Koceva and
                  Odnan Ref Sanchez and
                  Giovanni Adorni},
  title        = {A framework for personal data protection in the IoT},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {384--391},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856735},
  doi          = {10.1109/ICITST.2016.7856735},
  timestamp    = {Fri, 13 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TorreKSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/UahhabiB16,
  author       = {Zakia El Uahhabi and
                  Hanan El Bakkali},
  title        = {An approach for evaluating trust in {X.509} certificates},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {196--203},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856696},
  doi          = {10.1109/ICITST.2016.7856696},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/UahhabiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VarshneyMA16,
  author       = {Gaurav Varshney and
                  Manoj Misra and
                  Pradeep K. Atrey},
  title        = {Improving the accuracy of Search Engine based anti-phishing solutions
                  using lightweight features},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {365--370},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856731},
  doi          = {10.1109/ICITST.2016.7856731},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VarshneyMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VasconcelosFM16,
  author       = {Pedro Roger Magalh{\~{a}}es Vasconcelos and
                  Gisele Azevedo de Ara{\'{u}}jo Freitas and
                  Thales Guimaraes Marques},
  title        = {Virtualization technologies in web conferencing systems: {A} performance
                  overview},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {376--383},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856734},
  doi          = {10.1109/ICITST.2016.7856734},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VasconcelosFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VeleaG16,
  author       = {Radu Velea and
                  Noel Gordon},
  title        = {Comparison of color profile gamut coverage for computer monitors},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {287--290},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856714},
  doi          = {10.1109/ICITST.2016.7856714},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VeleaG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VidalBRB16,
  author       = {Gerard Vidal and
                  Rabei Bechikh and
                  Rhouma Rhouma and
                  Safya Belghith},
  title        = {A commercial application of a chaos-based-stream cipher: Performance
                  and Security analysis},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {39--44},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856661},
  doi          = {10.1109/ICITST.2016.7856661},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VidalBRB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VieiraS16,
  author       = {Tiago Vieira and
                  Carlos Serr{\~{a}}o},
  title        = {Web security in the finance sector},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {255--259},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856707},
  doi          = {10.1109/ICITST.2016.7856707},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VieiraS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Visser16,
  author       = {Martin Visser},
  title        = {Keynote speaker 1: Critical Infrastructures {SMART} ready?},
  booktitle    = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  pages        = {15},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICITST.2016.7856652},
  doi          = {10.1109/ICITST.2016.7856652},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Visser16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2016,
  title        = {11th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7847254/proceeding},
  isbn         = {978-1-908320-73-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdounATADK15,
  author       = {Nabil Abdoun and
                  Safwan El Assad and
                  Mohammad AbuTaha and
                  Rima Assaf and
                  Olivier D{\'{e}}forges and
                  Mohamad Khalil},
  title        = {Hash function based on efficient Chaotic Neural Network},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {32--37},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412051},
  doi          = {10.1109/ICITST.2015.7412051},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdounATADK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbuTahaAFQD15,
  author       = {Mohammed AbuTaha and
                  Safwan El Assad and
                  Mousa Farajallah and
                  Audrey Queudet and
                  Olivier D{\'{e}}forges},
  title        = {Chaos-based cryptosystems using dependent diffusion: An overview},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {44--49},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412053},
  doi          = {10.1109/ICITST.2015.7412053},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbuTahaAFQD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-Fedaghi15,
  author       = {Sabah Al{-}Fedaghi},
  title        = {Conceptual maps for physical security},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {343--348},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412118},
  doi          = {10.1109/ICITST.2015.7412118},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-Fedaghi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-Khasawneh15,
  author       = {Ahmad Al{-}Khasawneh},
  title        = {Toward power consumption in partitioned Wireless Sensors Networks
                  routing technique},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {238--241},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412097},
  doi          = {10.1109/ICITST.2015.7412097},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-Khasawneh15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-khomsanAAA15,
  author       = {Mashail N. Alkhomsan and
                  Alaa Al{-}Arjan and
                  Abrar Al{-}Amro and
                  Khalid Al{-}Nafjan},
  title        = {Usability evaluation of Twitter on Android platform for elderly Arab
                  users using morae evaluation tool},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {446--447},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412139},
  doi          = {10.1109/ICITST.2015.7412139},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-khomsanAAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Alazri15,
  author       = {Aisha Suliaman Alazri},
  title        = {The awareness of social engineering in information revolution: Techniques
                  and challenges},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {198--201},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412088},
  doi          = {10.1109/ICITST.2015.7412088},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Alazri15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AldawsariBE15,
  author       = {Bandar Aldawsari and
                  Thar Baker and
                  David England},
  title        = {Towards a holistic brokerage system for multi-cloud environment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {249--255},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412100},
  doi          = {10.1109/ICITST.2015.7412100},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AldawsariBE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlkeemYZ15,
  author       = {Ebrahim Al Alkeem and
                  Chan Yeob Yeun and
                  M. Jamal Zemerly},
  title        = {Security and privacy framework for ubiquitous healthcare IoT devices},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {70--75},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412059},
  doi          = {10.1109/ICITST.2015.7412059},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlkeemYZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlmutairiPF15,
  author       = {Abdulrazaq Almutairi and
                  David J. Parish and
                  James A. Flint},
  title        = {Predicting multi-stage attacks based on {IP} information},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {384--390},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412127},
  doi          = {10.1109/ICITST.2015.7412127},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlmutairiPF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiFC15,
  author       = {Saud Alotaibi and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {Transparent authentication systems for mobile device security: {A}
                  review},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {406--413},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412131},
  doi          = {10.1109/ICITST.2015.7412131},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiFC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlthebyanMYJ15,
  author       = {Qutaibah Althebyan and
                  Rami Mohawesh and
                  Qussai Yaseen and
                  Yaser Jararweh},
  title        = {Mitigating insider threats in a cloud using a knowledgebase approach
                  while maintaining data availability},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {226--231},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412094},
  doi          = {10.1109/ICITST.2015.7412094},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlthebyanMYJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlthobaitiM15,
  author       = {Maha Althobaiti and
                  Pam J. Mayhew},
  title        = {Usable security of authentication process: New approach and practical
                  assessment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {179--180},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412083},
  doi          = {10.1109/ICITST.2015.7412083},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlthobaitiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmanS15,
  author       = {Waqas Aman and
                  Einar Snekkenes},
  title        = {Managing security trade-offs in the Internet of Things using adaptive
                  security},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {362--368},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412122},
  doi          = {10.1109/ICITST.2015.7412122},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AouamiSRO15,
  author       = {Rachid Aouami and
                  Essaid Sabir and
                  Mounir Rifi and
                  Mohamed Ouzzif},
  title        = {Fountain-code-enabled {DCF} for optimazing throughput in wireless
                  sensors},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {431--436},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412136},
  doi          = {10.1109/ICITST.2015.7412136},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AouamiSRO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AyoungSA15,
  author       = {Azerikatoa D. Ayoung and
                  Boyce Sigweni and
                  Pamela Abbott},
  title        = {Case-based reasoning system for predicting the sustainability of a
                  telecentre},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {125--130},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412072},
  doi          = {10.1109/ICITST.2015.7412072},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AyoungSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BaekKA15,
  author       = {Gui{-}hyun Baek and
                  Su{-}kyoung Kim and
                  Ki{-}hong Ahn},
  title        = {Framework for automatically construct ontology knowledge base from
                  semi-structured datasets},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {152--157},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412077},
  doi          = {10.1109/ICITST.2015.7412077},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BaekKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BeniwalZL15,
  author       = {Rohit Beniwal and
                  Pavol Zavarsky and
                  Dale Lindskog},
  title        = {Study of compliance of Apple's location based APIs with recommendations
                  of the {IETF} Geopriv},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {214--219},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412092},
  doi          = {10.1109/ICITST.2015.7412092},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BeniwalZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CampbellPM15,
  author       = {Ronald M. Campbell and
                  Keshnee Padayachee and
                  Themba Masombuka},
  title        = {A survey of honeypot research: Trends and opportunities},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {208--212},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412090},
  doi          = {10.1109/ICITST.2015.7412090},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CampbellPM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Chetto15,
  author       = {Maryline Chetto},
  title        = {Keynote speaker 5: Issues in energy harvesting cyber-physical systems},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {21},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412046},
  doi          = {10.1109/ICITST.2015.7412046},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Chetto15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DasMN15,
  author       = {Batsayan Das and
                  Lakshmipadmaja Maddali and
                  Harshita Vani Nallagonda},
  title        = {Role-based privilege isolation: {A} novel authorization model for
                  Android smart devices},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {220--225},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412093},
  doi          = {10.1109/ICITST.2015.7412093},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DasMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DelailY15,
  author       = {Buti Al Delail and
                  Chan Yeob Yeun},
  title        = {Recent advances of smart glass application security and privacy},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {65--69},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412058},
  doi          = {10.1109/ICITST.2015.7412058},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/DelailY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DennisO15,
  author       = {Richard Dennis and
                  Gareth Owen},
  title        = {Rep on the block: {A} next generation reputation system based on the
                  blockchain},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {131--138},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412073},
  doi          = {10.1109/ICITST.2015.7412073},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DennisO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FallahpourM15,
  author       = {Mehdi Fallahpour and
                  David Meg{\'{\i}}as},
  title        = {Transparent high capacity audio watermarking in wavelet domain},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {242--247},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412098},
  doi          = {10.1109/ICITST.2015.7412098},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FallahpourM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FarooqKVI15,
  author       = {Ali Farooq and
                  Syed Rameez Ullah Kakakhel and
                  Seppo Virtanen and
                  Jouni Isoaho},
  title        = {A taxonomy of perceived information security and privacy threats among
                  {IT} security students},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {280--286},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412106},
  doi          = {10.1109/ICITST.2015.7412106},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/FarooqKVI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FengTM15,
  author       = {Guanyuan Feng and
                  Xuezhi Tan and
                  Lin Ma},
  title        = {Visual location recognition using smartphone sensors for indoor environment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {426--430},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412135},
  doi          = {10.1109/ICITST.2015.7412135},
  timestamp    = {Thu, 28 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FengTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Frein15,
  author       = {Ruair{\'{\i}} de Fr{\'{e}}in},
  title        = {Load-adjusted video quality prediction methods for missing data},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {314--319},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412111},
  doi          = {10.1109/ICITST.2015.7412111},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Frein15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Geels15,
  author       = {Frank W. Geels},
  title        = {Keynote speaker 4: Socio-technical transitions towards sustainability},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {20},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412045},
  doi          = {10.1109/ICITST.2015.7412045},
  timestamp    = {Sat, 28 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Geels15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GhauriHI15,
  author       = {Sajjad Ahmed Ghauri and
                  Hasan Humayun and
                  Mobeen Iqbal},
  title        = {Low complexity linear equalization of doubly selective channel},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {400--405},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412130},
  doi          = {10.1109/ICITST.2015.7412130},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GhauriHI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HentabliM15,
  author       = {Wahiba Hentabli and
                  Fatiha Merazka},
  title        = {An extension of RSA{\_}512 to RSA{\_}1024 core under hardware platform
                  based on montgomery powering},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {448--453},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412140},
  doi          = {10.1109/ICITST.2015.7412140},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HentabliM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HillmannSRR15,
  author       = {Peter Hillmann and
                  Lars Stiemert and
                  Gabi Dreo Rodosek and
                  Oliver Rose},
  title        = {Dragoon: Advanced modelling of {IP} geolocation by use of latency
                  measurements},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {438--445},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412138},
  doi          = {10.1109/ICITST.2015.7412138},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HillmannSRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HlyneZB15,
  author       = {Chit Nyi Nyi Hlyne and
                  Pavol Zavarsky and
                  Sergey Butakov},
  title        = {{SCAP} benchmark for Cisco router security configuration compliance},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {270--276},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412104},
  doi          = {10.1109/ICITST.2015.7412104},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/HlyneZB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Hurley-SmithWA15,
  author       = {Darren Hurley{-}Smith and
                  Jodie Wetherall and
                  Andrew A. Adekunle},
  title        = {Virtual closed networks: {A} secure approach to autonomous mobile
                  ad hoc networks},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {391--398},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412128},
  doi          = {10.1109/ICITST.2015.7412128},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Hurley-SmithWA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JallouliACLC15,
  author       = {Ons Jallouli and
                  Safwan El Assad and
                  Maryline Chetto and
                  Ren{\'{e}} Lozi and
                  Daniel Caragata},
  title        = {A novel chaotic generator based on weakly-coupled discrete skewtent
                  maps},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {38--43},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412052},
  doi          = {10.1109/ICITST.2015.7412052},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JallouliACLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JilnaDJ15,
  author       = {Payingat Jilna and
                  P. P. Deepthi and
                  U. K. Jayaraj},
  title        = {Optimized hardware design and implementation of {EC} based key management
                  scheme for {WSN}},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {164--169},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412079},
  doi          = {10.1109/ICITST.2015.7412079},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JilnaDJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Kim15,
  author       = {Mincheol Kim},
  title        = {Application of theory of reasoned action in u-health system},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {177--178},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412082},
  doi          = {10.1109/ICITST.2015.7412082},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Kim15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimP15,
  author       = {Min{-}Gu Kim and
                  Sung Bum Pan},
  title        = {A study on the flame detection and object classification technique
                  using the color information},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {120--123},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412070},
  doi          = {10.1109/ICITST.2015.7412070},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimakE15,
  author       = {Stefan Kimak and
                  Jeremy Ellman},
  title        = {The role of {HTML5} IndexedDB, the past, present and future},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {379--383},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412126},
  doi          = {10.1109/ICITST.2015.7412126},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimakE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KoscinaC15,
  author       = {Mirko Koscina and
                  Daniel Caragata},
  title        = {Bench-marking of traditional cryptographic algorithms and chaos-based
                  algorithms with {DNA} operations},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {26--31},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412050},
  doi          = {10.1109/ICITST.2015.7412050},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KoscinaC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KuzeIYCM15,
  author       = {Naomi Kuze and
                  Shu Ishikura and
                  Takeshi Yagi and
                  Daiki Chiba and
                  Masayuki Murata},
  title        = {Crawler classification using ant-based clustering scheme},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {84--89},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412063},
  doi          = {10.1109/ICITST.2015.7412063},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/KuzeIYCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LahmerZ15,
  author       = {Ibrahim Lahmer and
                  Ning Zhang},
  title        = {MapReduce: {A} critical analysis of existing authentication methods},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {302--313},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412110},
  doi          = {10.1109/ICITST.2015.7412110},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/LahmerZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LebronSL15,
  author       = {David Lebron and
                  Hossain Shahriar and
                  Rubana Yasmin Lupu},
  title        = {Security concerns and mitigation approaches for MOOC-based applications},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {145--150},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412075},
  doi          = {10.1109/ICITST.2015.7412075},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LebronSL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MahmoudYAZ15,
  author       = {Rwan Mahmoud and
                  Tasneem Yousuf and
                  Fadi A. Aloul and
                  Imran A. Zualkernan},
  title        = {Internet of things (IoT) security: Current status, challenges and
                  prospective measures},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {336--341},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412116},
  doi          = {10.1109/ICITST.2015.7412116},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MahmoudYAZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MakitlaM15,
  author       = {Ishmael Makitla and
                  Jabu Mtsweni},
  title        = {A generalized web service response time metric to support collaborative
                  and corroborative web service monitoring},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {373--377},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412124},
  doi          = {10.1109/ICITST.2015.7412124},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MakitlaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MansooriY15,
  author       = {Fatema Al Mansoori and
                  Chan Yeob Yeun},
  title        = {Emerging new trends of location based systems security},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {158--163},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412078},
  doi          = {10.1109/ICITST.2015.7412078},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MansooriY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MarLC15,
  author       = {Kheng Kok Mar and
                  Chee Yong Law and
                  Victoria Chin},
  title        = {Secure personal cloud storage},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {108--113},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412068},
  doi          = {10.1109/ICITST.2015.7412068},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MarLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MedberyO15,
  author       = {Clinton Medbery and
                  Aspen Olmsted},
  title        = {HeartSync: Mobile pacemaker failure detector},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {277--279},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412105},
  doi          = {10.1109/ICITST.2015.7412105},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MedberyO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MerazkaB15,
  author       = {Fatiha Merazka and
                  Fulvio Babich},
  title        = {Dynamic forward error correction algorithm over {IP} network services
                  for {ITU-T} {G.722.2} codec},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {369--372},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412123},
  doi          = {10.1109/ICITST.2015.7412123},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MerazkaB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NtrigkogiasP15,
  author       = {Christos Ntrigkogias and
                  Nineta Polemi},
  title        = {Assessment of research efforts in surveillance systems},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {288--294},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412108},
  doi          = {10.1109/ICITST.2015.7412108},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NtrigkogiasP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Olmsted15,
  author       = {Aspen Olmsted},
  title        = {Keynote speaker 3: Secure software engineering in the cloud},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {19},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412044},
  doi          = {10.1109/ICITST.2015.7412044},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Olmsted15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Olmsted15a,
  author       = {Aspen Olmsted},
  title        = {Long running, consistent, web service transactions},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {139--144},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412074},
  doi          = {10.1109/ICITST.2015.7412074},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Olmsted15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ParvezZK15,
  author       = {Muhammad Parvez and
                  Pavol Zavarsky and
                  Nidal Khoury},
  title        = {Analysis of effectiveness of black-box web application scanners in
                  detection of stored {SQL} injection and stored {XSS} vulnerabilities},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {186--191},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412085},
  doi          = {10.1109/ICITST.2015.7412085},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ParvezZK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PetersideZB15,
  author       = {Gabriel Biedima Peterside and
                  Pavol Zavarsky and
                  Sergey Butakov},
  title        = {Automated security configuration checklist for a cisco IPsec {VPN}
                  router using {SCAP} 1.2},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {355--360},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412120},
  doi          = {10.1109/ICITST.2015.7412120},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/PetersideZB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PleteaSVP15,
  author       = {Daniel Pletea and
                  Saeed Sedghi and
                  Meilof Veeningen and
                  Milan Petkovic},
  title        = {Secure distributed key generation in attribute based encryption systems},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {103--107},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412067},
  doi          = {10.1109/ICITST.2015.7412067},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PleteaSVP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PolemiP15,
  author       = {Nineta Polemi and
                  Spyros Papastergiou},
  title        = {Current efforts in ports and supply chains risk assessment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {349--354},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412119},
  doi          = {10.1109/ICITST.2015.7412119},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PolemiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RahmanA15,
  author       = {Md. Rahatur Rahman and
                  Shamim Akhter},
  title        = {Bi-directional traffic management support system with decision tree
                  based dynamic routing},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {170--175},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412080},
  doi          = {10.1109/ICITST.2015.7412080},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/RahmanA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Rehman15,
  author       = {Shafiq ur R{\'{e}}hman},
  title        = {iBook: An interactive book system},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {233--237},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412096},
  doi          = {10.1109/ICITST.2015.7412096},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Rehman15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ReshmiR15,
  author       = {G. Reshmi and
                  C. S. Rakshmy},
  title        = {A survey of authentication methods in mobile cloud computing},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {58--63},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412056},
  doi          = {10.1109/ICITST.2015.7412056},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ReshmiR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SathiyaBalanZLB15,
  author       = {Vimal Kumar SathiyaBalan and
                  Pavol Zavarsky and
                  Dale Lindskog and
                  Sergey Butakov},
  title        = {Study of applicability of Chinese remainder theorem based group key
                  management for cloud environment},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {114--119},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412069},
  doi          = {10.1109/ICITST.2015.7412069},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SathiyaBalanZLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SherifFC15,
  author       = {Emad Sherif and
                  Steven Furnell and
                  Nathan L. Clarke},
  title        = {Awareness, behaviour and culture: The {ABC} in cultivating security
                  compliance},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {90--94},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412064},
  doi          = {10.1109/ICITST.2015.7412064},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SherifFC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SieweA15,
  author       = {Fran{\c{c}}ois Siewe and
                  Ahmed Al{-}alshuhai},
  title        = {From use case diagrams to executable context-aware ambients},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {263--268},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412102},
  doi          = {10.1109/ICITST.2015.7412102},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SieweA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SinghMS15,
  author       = {Shirish Kumar Singh and
                  Bharavi Mishra and
                  Saket Singh},
  title        = {Detecting intelligent malware on dynamic Android analysis environments},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {414--419},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412132},
  doi          = {10.1109/ICITST.2015.7412132},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SinghMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SoupionisB15,
  author       = {Yannis Soupionis and
                  Thierry Benoist},
  title        = {Cyber-physical testbed - The impact of cyber attacks and the human
                  factor},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {326--331},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412114},
  doi          = {10.1109/ICITST.2015.7412114},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SoupionisB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SpengerK15,
  author       = {Gabriele Spenger and
                  J{\"{o}}rg Keller},
  title        = {Security aspects of PRNGs with large state spaces},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {181--185},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412084},
  doi          = {10.1109/ICITST.2015.7412084},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SpengerK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TerziTS15,
  author       = {Duygu Sinanc Terzi and
                  Ramazan Terzi and
                  Seref Sagiroglu},
  title        = {A survey on security and privacy issues in big data},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {202--207},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412089},
  doi          = {10.1109/ICITST.2015.7412089},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TerziTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Torkura0M15,
  author       = {Kennedy A. Torkura and
                  Feng Cheng and
                  Christoph Meinel},
  title        = {A proposed framework for proactive vulnerability assessments in cloud
                  deployments},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {51--57},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412055},
  doi          = {10.1109/ICITST.2015.7412055},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Torkura0M15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Torkura0M15a,
  author       = {Kennedy A. Torkura and
                  Feng Cheng and
                  Christoph Meinel},
  title        = {Application of quantitative security metrics in cloud computing},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {256--262},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412101},
  doi          = {10.1109/ICITST.2015.7412101},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Torkura0M15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Valluri15,
  author       = {Abhijit Kiran Valluri},
  title        = {Equilibrium properties of rate control protocols},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {295--301},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412109},
  doi          = {10.1109/ICITST.2015.7412109},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Valluri15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VatsRA15,
  author       = {Himanshu Vats and
                  Ron Ruhl and
                  Shaun Aghili},
  title        = {Fingerprint security for protecting {EMV} payment cards},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {95--101},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412065},
  doi          = {10.1109/ICITST.2015.7412065},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VatsRA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Visser15,
  author       = {Martin Visser},
  title        = {Keynote speaker 2: Swimming against the current - Dealing with {ICS}
                  cyber threats in the Water Sector},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {17--18},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412043},
  doi          = {10.1109/ICITST.2015.7412043},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Visser15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Wang15,
  author       = {Frank Zhigang Wang},
  title        = {Keynote speaker 1: Computer Evolution over the next decade: Fact or
                  fiction?},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {16},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412042},
  doi          = {10.1109/ICITST.2015.7412042},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Wang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Warwick15,
  author       = {Kevin Warwick},
  title        = {{ICITST} honorary chair and distinguished keynote speaker: The cyborg
                  experiments},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {15},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412041},
  doi          = {10.1109/ICITST.2015.7412041},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Warwick15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YamadaMUTT15,
  author       = {Masahiro Yamada and
                  Masanobu Morinaga and
                  Yuki Unno and
                  Satoru Torii and
                  Masahiko Takenaka},
  title        = {RAT-based malicious activities detection on enterprise internal networks},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {321--325},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412113},
  doi          = {10.1109/ICITST.2015.7412113},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YamadaMUTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YoonJK15,
  author       = {Soojin Yoon and
                  JongHun Jung and
                  Hwan{-}Kuk Kim},
  title        = {Attacks on Web browsers with {HTML5}},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {193--197},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412087},
  doi          = {10.1109/ICITST.2015.7412087},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YoonJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YueW15,
  author       = {Wong Seng Yue and
                  Wong Lai Wan},
  title        = {The effectiveness of digital game for introductory programming concepts},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {421--425},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412134},
  doi          = {10.1109/ICITST.2015.7412134},
  timestamp    = {Wed, 23 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YueW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZainudinRZHI15,
  author       = {Norulzahrah Mohd. Zainudin and
                  Suzaimah Ramli and
                  Tuan Khalisah Tan Zizi and
                  Nor Asiakin Hasbullah and
                  Norazlin Ibrahim},
  title        = {Facial expression change detection algorithm using optical flow technique},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {332--335},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412115},
  doi          = {10.1109/ICITST.2015.7412115},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZainudinRZHI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhanZ15,
  author       = {Lifei Zhan and
                  Yuesheng Zhu},
  title        = {Passive forensics for image splicing based on {PCA} noise estimation},
  booktitle    = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  pages        = {78--83},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITST.2015.7412062},
  doi          = {10.1109/ICITST.2015.7412062},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhanZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2015,
  title        = {10th International Conference for Internet Technology and Secured
                  Transactions, {ICITST} 2015, London, United Kingdom, December 14-16,
                  2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7400833/proceeding},
  isbn         = {978-1-9083-2052-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AdelolaDB14,
  author       = {Tiwalade Adelola and
                  Ray Dawson and
                  Firat Batmaz},
  title        = {Privacy and data protection in E-commerce: The effectiveness of a
                  government regulation approach in developing nations, using Nigeria
                  as a case},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {234--239},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038812},
  doi          = {10.1109/ICITST.2014.7038812},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AdelolaDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AdityaP0M14,
  author       = {Suresh Kumar Aditya and
                  Kavya Premkumar and
                  R. Anitha and
                  Saswati Mukherjee},
  title        = {Combined security framework for multi-cloud environment},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {100--105},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038786},
  doi          = {10.1109/ICITST.2014.7038786},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AdityaP0M14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AjiginiPK14,
  author       = {Olusegun Ademolu Ajigini and
                  John A. van der Poll and
                  Jan H. Kroeze},
  title        = {Towards a model on security challenges during closed source software
                  to {OSS} migrations},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {274--283},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038820},
  doi          = {10.1109/ICITST.2014.7038820},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AjiginiPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AkeelWG14,
  author       = {Fatimah Y. Akeel and
                  Gary B. Wills and
                  Andrew M. Gravell},
  title        = {Exposing data leakage in Data Integration Systems},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {420--425},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038849},
  doi          = {10.1109/ICITST.2014.7038849},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AkeelWG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-FedaghiM14,
  author       = {Sabah Al{-}Fedaghi and
                  Heba Al Meshari},
  title        = {Characterizing social networks based on interior processes of nodes},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {215--221},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038808},
  doi          = {10.1109/ICITST.2014.7038808},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-FedaghiM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlbahliM14,
  author       = {Saleh Albahli and
                  Austin Melton},
  title        = {ohStore: Ontology hierarchy solution to improve {RDF} data management},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {340--348},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038834},
  doi          = {10.1109/ICITST.2014.7038834},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlbahliM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AleseADAO14,
  author       = {Boniface Kayode Alese and
                  R. A. Akingbola and
                  Folasade Mojisola Dahunsi and
                  Olumide S. Adewale and
                  T. J. Ogundele},
  title        = {Improving deception in honeynet: Through data manipulation},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {198--204},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038805},
  doi          = {10.1109/ICITST.2014.7038805},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AleseADAO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AleseOFIT14,
  author       = {Boniface Kayode Alese and
                  O. Oyebade and
                  A. Osuolale Festus and
                  Otasowie Iyare and
                  Aderonke Favour{-}Bethy Thompson},
  title        = {Evaluation of information security risks using hybrid assessment model},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {387--395},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038843},
  doi          = {10.1109/ICITST.2014.7038843},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AleseOFIT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlharbiPD14,
  author       = {Nawaf Sulaiman Alharbi and
                  Maria Papadaki and
                  Paul Dowland},
  title        = {Security challenges of E-government adoption based on end users' perspective},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {78--82},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038781},
  doi          = {10.1109/ICITST.2014.7038781},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlharbiPD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlmutairiP14,
  author       = {Abdulrazaq Almutairi and
                  David J. Parish},
  title        = {Using classification techniques for creation of predictive intrusion
                  detection model},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {223--228},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038810},
  doi          = {10.1109/ICITST.2014.7038810},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlmutairiP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Alomari14,
  author       = {Mohammad Kamel Alomari},
  title        = {Towards E-democracy in the middle east: E-voting adoption},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {73--77},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038780},
  doi          = {10.1109/ICITST.2014.7038780},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Alomari14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Alotaibi14,
  author       = {Fahad M. Alotaibi},
  title        = {Architectural framework proposed of behavioural classroom simulation
                  based second life environment},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {466--470},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038857},
  doi          = {10.1109/ICITST.2014.7038857},
  timestamp    = {Mon, 08 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Alotaibi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmankwaLK14,
  author       = {Eric Amankwa and
                  Marianne Loock and
                  Elmarie Kritzinger},
  title        = {A conceptual analysis of information security education, information
                  security training and information security awareness definitions},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {248--252},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038814},
  doi          = {10.1109/ICITST.2014.7038814},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AmankwaLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmmarF14,
  author       = {Brika Ammar and
                  Fahima Nader},
  title        = {Creation of educative content on the web},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {119--124},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038790},
  doi          = {10.1109/ICITST.2014.7038790},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AmmarF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Aparicio-Navarro14,
  author       = {Francisco J. Aparicio{-}Navarro and
                  Konstantinos G. Kyriakopoulos and
                  David J. Parish},
  title        = {Empirical study of automatic dataset labelling},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {372--378},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038840},
  doi          = {10.1109/ICITST.2014.7038840},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Aparicio-Navarro14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Badidi14,
  author       = {Elarbi Badidi},
  title        = {A context broker federation for QoC-driven selection of cloud-based
                  context services},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {185--190},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038802},
  doi          = {10.1109/ICITST.2014.7038802},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Badidi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BetzW14,
  author       = {Johann Betz and
                  Dirk Westhoff},
  title        = {C\({}^{\mbox{3}}\)-Sched - {A} cache covert channel robust cloud computing
                  scheduler},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {54--60},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038775},
  doi          = {10.1109/ICITST.2014.7038775},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BetzW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BoubakriAB14,
  author       = {Wided Boubakri and
                  Walid Abdallah and
                  Noureddine Boudriga},
  title        = {A chaos-based authentication and key management scheme for {M2M} communication},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {366--371},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038839},
  doi          = {10.1109/ICITST.2014.7038839},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BoubakriAB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BurkhardtNRK14,
  author       = {Dirk Burkhardt and
                  Kawa Nazemi and
                  Wilhelm Retz and
                  J{\"{o}}rn Kohlhammer},
  title        = {Visual explanation of government-data for policy making through open-data
                  inclusion},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {83--89},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038782},
  doi          = {10.1109/ICITST.2014.7038782},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BurkhardtNRK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Caballero-GilMC14,
  author       = {Pino Caballero{-}Gil and
                  Francisco Mart{\'{\i}}n{-}Fern{\'{a}}ndez and
                  C{\'{a}}ndido Caballero{-}Gil},
  title        = {Using query frequencies in tree-based revocation for certificateless
                  authentication in VANETs},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {268--273},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038819},
  doi          = {10.1109/ICITST.2014.7038819},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Caballero-GilMC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CaragataAA14,
  author       = {Daniel Caragata and
                  Safwan El Assad and
                  Kassem Ahmad},
  title        = {Survey of network access security in {UMTS/LTE} networks},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {43--46},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038772},
  doi          = {10.1109/ICITST.2014.7038772},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CaragataAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChanWP14,
  author       = {Vincent Chan and
                  Tony Hao Wu and
                  Grantham Pang},
  title        = {Decision support and data mining for direct consumer-to-consumer trading},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {205--208},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038806},
  doi          = {10.1109/ICITST.2014.7038806},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChanWP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChouhanSCKJ14,
  author       = {Pushpinder{-}Kaur Chouhan and
                  Sakir Sezer and
                  Yangseo Choi and
                  Ikkyun Kim and
                  Chunghwan Jung},
  title        = {Secure virtualised environment},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {112--117},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038788},
  doi          = {10.1109/ICITST.2014.7038788},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChouhanSCKJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChristianahATOF14,
  author       = {Abikoye Oluwakemi Christianah and
                  Boniface Kayode Alese and
                  Aderonke Favour{-}Bethy Thompson and
                  D. Alowolodu Olufunso and
                  A. Osuolale Festus},
  title        = {A robust multicast authentication scheme based on asymmetric key signature},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {449--458},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038855},
  doi          = {10.1109/ICITST.2014.7038855},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ChristianahATOF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DantanarayanaJ14,
  author       = {Gilmini Dantanarayana and
                  Prasad M. Jayaweera},
  title        = {Value oriented service designing for successful e-Health},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {90--94},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038783},
  doi          = {10.1109/ICITST.2014.7038783},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/DantanarayanaJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DesnosAAPM14,
  author       = {Karol Desnos and
                  Safwan El Assad and
                  Aurore Arlicot and
                  Maxime Pelcat and
                  Daniel M{\'{e}}nard},
  title        = {Efficient multicore implementation of an advanced generator of discrete
                  chaotic sequences},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038770},
  doi          = {10.1109/ICITST.2014.7038770},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DesnosAAPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DjebbarA14,
  author       = {Fatiha Djebbar and
                  Beghdad Ayad},
  title        = {Image hiding in speech spectrum},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {285--287},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038822},
  doi          = {10.1109/ICITST.2014.7038822},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DjebbarA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DlaminiEE14,
  author       = {M. T. Dlamini and
                  Jan H. P. Eloff and
                  Mariki M. Eloff},
  title        = {{CBAC4C:} Conflict Based Allocation Control for Cloud},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {447--448},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038854},
  doi          = {10.1109/ICITST.2014.7038854},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/DlaminiEE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DresslerFM14,
  author       = {Patrick Dressler and
                  Daniel Fischer and
                  Bernd Markscheffel},
  title        = {Software solutions for high-security voice and data communication
                  for smartphones},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {327--332},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038830},
  doi          = {10.1109/ICITST.2014.7038830},
  timestamp    = {Fri, 22 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/DresslerFM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FaquihSF14,
  author       = {Loubna El Faquih and
                  Hanae Sba{\"{\i}} and
                  Mounia Fredj},
  title        = {Semantic variability modeling in business processes: {A} comparative
                  study},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {131--136},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038792},
  doi          = {10.1109/ICITST.2014.7038792},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FaquihSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FarooqiN14,
  author       = {Norah S. Farooqi and
                  Siobh{\'{a}}n North},
  title        = {Time cost evaluation of trust based access control for {XML} databases},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {324--326},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038829},
  doi          = {10.1109/ICITST.2014.7038829},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FarooqiN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Hatunic-Webster14,
  author       = {Edina Hatunic{-}Webster and
                  Fredrick Mtenzi and
                  Brendan O'Shea},
  title        = {Model for analysing Anti-Phishing Authentication Ceremonies},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {144--150},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038795},
  doi          = {10.1109/ICITST.2014.7038795},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Hatunic-Webster14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HomoliakOGH14,
  author       = {Ivan Homoliak and
                  Daniel Ovsonka and
                  Matej Gr{\'{e}}gr and
                  Petr Han{\'{a}}cek},
  title        = {{NBA} of obfuscated network vulnerabilities' exploitation hidden into
                  {HTTPS} traffic},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {310--317},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038827},
  doi          = {10.1109/ICITST.2014.7038827},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HomoliakOGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IyareTA14,
  author       = {Otasowie Iyare and
                  Aderonke Favour{-}Bethy Thompson and
                  Boniface Kayode Alese},
  title        = {A replication model for students' result processing},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {295--301},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038824},
  doi          = {10.1109/ICITST.2014.7038824},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IyareTA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JoukovST14,
  author       = {Nikolai Joukov and
                  Vladislav Shorokhov and
                  Dmytro Tantsuyev},
  title        = {Security audit of data flows across enterprise systems and networks},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {240--247},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038813},
  doi          = {10.1109/ICITST.2014.7038813},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JoukovST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KacicOHB14,
  author       = {Matej Kacic and
                  Daniel Ovsonka and
                  Petr Han{\'{a}}cek and
                  Maros Barabas},
  title        = {Traffic generator based on behavioral pattern},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {229--223},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038811},
  doi          = {10.1109/ICITST.2014.7038811},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KacicOHB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KasiarasZCK14,
  author       = {Dimitrios Kasiaras and
                  Thomas Zafeiropoulos and
                  Nathan L. Clarke and
                  Georgios Kambourakis},
  title        = {Android forensics: Correlation analysis},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {157--162},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038797},
  doi          = {10.1109/ICITST.2014.7038797},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KasiarasZCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KatoK14,
  author       = {Keisuke Kato and
                  Vitaly Klyuev},
  title        = {Large-scale network packet analysis for intelligent DDoS attack detection
                  development},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {360--365},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038838},
  doi          = {10.1109/ICITST.2014.7038838},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KatoK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KohliG14,
  author       = {Shruti Kohli and
                  Ankit Gupta},
  title        = {Modeling anonymous human behavior using social media},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {409--412},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038846},
  doi          = {10.1109/ICITST.2014.7038846},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/KohliG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KuboyeAA14,
  author       = {Bamidele Moses Kuboye and
                  Boniface Kayode Alese and
                  Olumide Sunday Adewale},
  title        = {Multi-level access priority channel allocation strategies in Global
                  System for Mobile communications {(GSM)} networks},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {288--294},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038823},
  doi          = {10.1109/ICITST.2014.7038823},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KuboyeAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KulkarniSH14,
  author       = {Saurabh Kulkarni and
                  Shayan Saha and
                  Ryler Hockenbury},
  title        = {Preserving privacy in sensor-fog networks},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {96--99},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038785},
  doi          = {10.1109/ICITST.2014.7038785},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KulkarniSH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KumarKG14,
  author       = {Rahul Kumar and
                  Indraveni K and
                  Aakash Kumar Goel},
  title        = {Automation of detection of security vulnerabilities in web services
                  using dynamic analysis},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {334--336},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038832},
  doi          = {10.1109/ICITST.2014.7038832},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KumarKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LesjakRBHB14,
  author       = {Christian M. Lesjak and
                  Thomas Ruprechter and
                  Holger Bock and
                  Josef Haid and
                  Eugen Brenner},
  title        = {{ESTADO} - Enabling smart services for industrial equipment through
                  a secured, transparent and ad-hoc data transmission online},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {171--177},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038800},
  doi          = {10.1109/ICITST.2014.7038800},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LesjakRBHB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LeszczynaW14,
  author       = {Rafal Leszczyna and
                  Michal R. Wr{\'{o}}bel},
  title        = {Security information sharing for smart grids: Developing the right
                  data model},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {163--169},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038798},
  doi          = {10.1109/ICITST.2014.7038798},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/LeszczynaW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LingY14,
  author       = {Mee Hong Ling and
                  Kok{-}Lim Alvin Yau},
  title        = {Reinforcement learning-based trust and reputation model for cluster
                  head selection in cognitive radio networks},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {256--261},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038817},
  doi          = {10.1109/ICITST.2014.7038817},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LingY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MichelinZR14,
  author       = {Regio A. Michelin and
                  Avelino F. Zorzo and
                  C{\'{e}}sar A. F. De Rose},
  title        = {Mitigating DoS to authenticated cloud {REST} APIs},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {106--111},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038787},
  doi          = {10.1109/ICITST.2014.7038787},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MichelinZR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MishskyGG14,
  author       = {Igor Mishsky and
                  Nurit Gal{-}Oz and
                  Ehud Gudes},
  title        = {Computing domains reputation using flow},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {426--431},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038850},
  doi          = {10.1109/ICITST.2014.7038850},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MishskyGG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MohammadAES14,
  author       = {Omer K. Jasim Mohammad and
                  Safia Abbas and
                  El{-}Sayed M. El{-}Horbaty and
                  Abdel{-}Badeeh M. Salem},
  title        = {Advanced encryption standard development based quantum key distribution},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {402--408},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038845},
  doi          = {10.1109/ICITST.2014.7038845},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MohammadAES14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MorrellRMT14,
  author       = {Christopher Morrell and
                  J. Scot Ransbottom and
                  Randy C. Marchany and
                  Joseph G. Tront},
  title        = {Scaling IPv6 address bindings in support of a moving target defense},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {440--445},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038852},
  doi          = {10.1109/ICITST.2014.7038852},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MorrellRMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MourSPRGP14,
  author       = {Surabhi Mour and
                  Priyansh Srivastava and
                  Payal Patel and
                  Hari Ram and
                  Bhavesh N. Gohil and
                  Dhiren R. Patel},
  title        = {Load management model for cloud computing},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {178--184},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038801},
  doi          = {10.1109/ICITST.2014.7038801},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MourSPRGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Munoz-Hernandez14,
  author       = {Mario Diego Munoz{-}Hernandez and
                  Jose Juan Garcia{-}Hernandez and
                  Miguel Morales{-}Sandoval},
  title        = {Study on the robustness to retyping attacks of fingerprinted digital
                  documents in the frequential domain},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {25--30},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038769},
  doi          = {10.1109/ICITST.2014.7038769},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Munoz-Hernandez14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NawazMF14,
  author       = {Omer Nawaz and
                  Tahir Nawaz Minhas and
                  Markus Fiedler},
  title        = {Optimal {MTU} for realtime video broadcast with packet loss - {A}
                  QoE perspective},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {396--401},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038844},
  doi          = {10.1109/ICITST.2014.7038844},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NawazMF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NwosuTAO14,
  author       = {L. A. Nwosu and
                  Aderonke Favour{-}Bethy Thompson and
                  Boniface Kayode Alese and
                  Olumide Olayinka Obe},
  title        = {An Attribute-Based Signature using rivest shamir adleman scheme},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {380--386},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038842},
  doi          = {10.1109/ICITST.2014.7038842},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NwosuTAO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OlmstedS14,
  author       = {Aspen Olmsted and
                  RoxAnn H. Stalvey},
  title        = {Highly available, consistent, business rule filters},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {125--130},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038791},
  doi          = {10.1109/ICITST.2014.7038791},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OlmstedS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OmranP14,
  author       = {Osama M. Ben Omran and
                  Brajendra Panda},
  title        = {A new technique to partition and manage data security in cloud databases},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {191--196},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038803},
  doi          = {10.1109/ICITST.2014.7038803},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OmranP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OsisanwoAA14,
  author       = {F. Y. Osisanwo and
                  Adebayo O. Adetunmbi and
                  Boniface Kayode Alese},
  title        = {Barefoot morphology: {A} person unique feature for forensic identification},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {356--359},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038837},
  doi          = {10.1109/ICITST.2014.7038837},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OsisanwoAA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OstiBU14,
  author       = {Andr{\'{e}} A. Osti and
                  Bruno Alves Pereira Botelho and
                  Nelson Uto},
  title        = {Implementation aspects of software guards: {A} case study},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {262--267},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038818},
  doi          = {10.1109/ICITST.2014.7038818},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OstiBU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Pakdeetrakulwong14,
  author       = {Udsanee Pakdeetrakulwong and
                  Pornpit Wongthongtham and
                  Waralak V. Siricharoen},
  title        = {Recommendation systems for software engineering: {A} survey from software
                  development life cycle phase perspective},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {137--142},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038793},
  doi          = {10.1109/ICITST.2014.7038793},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Pakdeetrakulwong14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PetrakievaGT14,
  author       = {Simona Petrakieva and
                  Oleg Garasym and
                  Ina Taralova},
  title        = {G-interval method for secure chaotic synchronization and information
                  transmission},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038771},
  doi          = {10.1109/ICITST.2014.7038771},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PetrakievaGT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PfaffR14,
  author       = {Oliver Pfaff and
                  Sebastian Ries},
  title        = {Avoiding security integration pitfalls in the cloud},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {67--70},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038777},
  doi          = {10.1109/ICITST.2014.7038777},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PfaffR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PolashAS14,
  author       = {Fahad Polash and
                  Abdullah Abuhussein and
                  Sajjan G. Shiva},
  title        = {A survey of cloud computing taxonomies: Rationale and overview},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {459--465},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038856},
  doi          = {10.1109/ICITST.2014.7038856},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/PolashAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PruksasriBHT14,
  author       = {Potchara Pruksasri and
                  Jan van den Berg and
                  Wout Hofman and
                  Yao{-}Hua Tan},
  title        = {Data concealing of supply chain transactions using the Distributed
                  Trust Backbone},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {151--156},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038796},
  doi          = {10.1109/ICITST.2014.7038796},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PruksasriBHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RanaC14,
  author       = {Antonia Rana and
                  Andrea Ciardulli},
  title        = {Enabling consumers to self-verify authenticity of products},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {254--255},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038816},
  doi          = {10.1109/ICITST.2014.7038816},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RanaC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RudolphSJ14,
  author       = {Manuel Rudolph and
                  Reinhard Schwarz and
                  Christian Jung},
  title        = {Security policy specification templates for critical infrastructure
                  services in the cloud},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {61--66},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038776},
  doi          = {10.1109/ICITST.2014.7038776},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RudolphSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SadkiB14,
  author       = {Souad Sadki and
                  Hanan El Bakkali},
  title        = {{PPAMH:} {A} novel privacy-preserving approach for mobile healthcare},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {209--214},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038807},
  doi          = {10.1109/ICITST.2014.7038807},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SadkiB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShahriarC14,
  author       = {Hossain Shahriar and
                  Victor Clincy},
  title        = {Detection of repackaged Android Malware},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {349--354},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038835},
  doi          = {10.1109/ICITST.2014.7038835},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShahriarC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/UllahXBL14,
  author       = {Abrar Ullah and
                  Hannan Xiao and
                  Trevor Barker and
                  Mariana Lilley},
  title        = {Graphical and text based challenge questions for secure and usable
                  authentication in online examinations},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {302--308},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038825},
  doi          = {10.1109/ICITST.2014.7038825},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/UllahXBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VasconcelosF14,
  author       = {Pedro Roger Magalh{\~{a}}es Vasconcelos and
                  Gisele Azevedo de Ara{\'{u}}jo Freitas},
  title        = {Performance analysis of Hadoop MapReduce on an OpenNebula cloud with
                  {KVM} and OpenVZ virtualizations},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {471--476},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038858},
  doi          = {10.1109/ICITST.2014.7038858},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VasconcelosF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Villalon-Fonseca14,
  author       = {Ricardo Villal{\'{o}}n{-}Fonseca and
                  Braulio J. Solano{-}Rojas and
                  Gabriela Mar{\'{\i}}n Ravent{\'{o}}s},
  title        = {An applied methodology for information security and assurance: {A}
                  study case for cloud computing},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {432--439},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038851},
  doi          = {10.1109/ICITST.2014.7038851},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Villalon-Fonseca14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VlajicS14,
  author       = {Natalija Vlajic and
                  Armin Slopek},
  title        = {Performance and economies of 'bot-less' application-layer DDoS attacks},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {318--323},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038828},
  doi          = {10.1109/ICITST.2014.7038828},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VlajicS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YangKC14,
  author       = {Seokhwan Yang and
                  Jaechun Kim and
                  Mokdong Chung},
  title        = {A prediction model based on Big Data analysis using hybrid {FCM} clustering},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {337--339},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038833},
  doi          = {10.1109/ICITST.2014.7038833},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YangKC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YousufAFW14,
  author       = {Muhammad Ali Yousuf and
                  Fatimah Y. Akeel and
                  Nawfal F. Fadhel and
                  Gary B. Wills},
  title        = {Resolving coreference and security issues of linked data by focusing
                  on {OWL:} Same As: {A} method for similarity matching score on linked
                  data},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {414--419},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038848},
  doi          = {10.1109/ICITST.2014.7038848},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YousufAFW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZavaletaUMG14,
  author       = {Zobeida Jezabel Guzman{-}Zavaleta and
                  Claudia Feregrino Uribe and
                  Alejandra Menendez{-}Ortiz and
                  Jose Juan Garcia{-}Hernandez},
  title        = {A robust audio fingerprinting method using spectrograms saliency maps},
  booktitle    = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  pages        = {47--52},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICITST.2014.7038773},
  doi          = {10.1109/ICITST.2014.7038773},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ZavaletaUMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2014,
  title        = {9th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2014, London, United Kingdom, December 8-10, 2014},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7018215/proceeding},
  isbn         = {978-1-908320-39-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdelshafyK13,
  author       = {Mohamed A. Abdelshafy and
                  Peter J. B. King},
  title        = {Analysis of security attacks on {AODV} routing},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {290--295},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750209},
  doi          = {10.1109/ICITST.2013.6750209},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdelshafyK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdoDCBP13,
  author       = {Jacques Bou Abdo and
                  Jacques Demerjian and
                  Hakima Chaouchi and
                  Kablan Barbar and
                  Guy Pujolle},
  title        = {Broker-based Cross-Cloud Federation Manager},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {244--251},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750199},
  doi          = {10.1109/ICITST.2013.6750199},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdoDCBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbughazalahMM13,
  author       = {Sarah Abughazalah and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  title        = {A mutual authentication protocol for low-cost {RFID} tags formally
                  verified using CasperFDR and {AVISPA}},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {44--51},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750160},
  doi          = {10.1109/ICITST.2013.6750160},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbughazalahMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AdedayoBRL13,
  author       = {Love Adedayo and
                  Sergey Butakov and
                  Ron Ruhl and
                  Dale Lindskog},
  title        = {E-Government web services and security of Personally Identifiable
                  Information in developing nations a case of some Nigerian embassies},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {623--629},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750278},
  doi          = {10.1109/ICITST.2013.6750278},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AdedayoBRL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AkeelWG13,
  author       = {Fatimah Y. Akeel and
                  Gary B. Wills and
                  Andrew M. Gravell},
  title        = {SecureDIS: {A} framework for secure Data Integration Systems},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {588--593},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750270},
  doi          = {10.1109/ICITST.2013.6750270},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AkeelWG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AkinbiPB13,
  author       = {Alex Akinbi and
                  Ella Pereira and
                  Chris Beaumont},
  title        = {Evaluating security mechanisms implemented on public Platform-as-a-Service
                  cloud environments case study: Windows Azure},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {162--167},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750183},
  doi          = {10.1109/ICITST.2013.6750183},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AkinbiPB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AkinsowonA13,
  author       = {O. A. Akinsowon and
                  Boniface Kayode Alese},
  title        = {Edge detection methods in palm-print identification},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {422--426},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750235},
  doi          = {10.1109/ICITST.2013.6750235},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AkinsowonA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AkinwonmiA13,
  author       = {Akintoba Emmanuel Akinwonmi and
                  Boniface Kayode Alese},
  title        = {A prosodic Text-to-Speech system for Yor{\`{u}}b{\'{a}} language},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {630--635},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750279},
  doi          = {10.1109/ICITST.2013.6750279},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AkinwonmiA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-AssamRJ13,
  author       = {Hisham Al{-}Assam and
                  Rasber Dh. Rashid and
                  Sabah Jassim},
  title        = {Combining steganography and biometric cryptosystems for secure mutual
                  authentication and key exchange},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {369--374},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750224},
  doi          = {10.1109/ICITST.2013.6750224},
  timestamp    = {Fri, 07 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-AssamRJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-KabiAA13,
  author       = {Mohammed Naji Al{-}Kabi and
                  Nawaf A. Abdulla and
                  Mahmoud Al{-}Ayyoub},
  title        = {An analytical study of Arabic sentiments: Maktoob case study},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {89--94},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750168},
  doi          = {10.1109/ICITST.2013.6750168},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-KabiAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-Shorafat13,
  author       = {Wafa Slaibi Al{-}Shorafat},
  title        = {Security in software engineering requirement},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {666--673},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750287},
  doi          = {10.1109/ICITST.2013.6750287},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-Shorafat13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlabdulatifMN13,
  author       = {Abdullah A. Alabdulatif and
                  Xiaoqi Ma and
                  Lars Nolle},
  title        = {Analysing and attacking the 4-way handshake of {IEEE} 802.11i standard},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {382--387},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750227},
  doi          = {10.1109/ICITST.2013.6750227},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlabdulatifMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlgarniXCT13,
  author       = {Abdullah Algarni and
                  Yue Xu and
                  Taizan Chan and
                  Yu{-}Chu Tian},
  title        = {Social engineering in social networking sites: Affect-based model},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {508--515},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750253},
  doi          = {10.1109/ICITST.2013.6750253},
  timestamp    = {Wed, 30 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlgarniXCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlhomidiR13,
  author       = {Mohammed A. Alhomidi and
                  Martin J. Reed},
  title        = {Security risk analysis as a service},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {156--161},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750182},
  doi          = {10.1109/ICITST.2013.6750182},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlhomidiR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiD13,
  author       = {Fahad M. Alotaibi and
                  Jordan Dimitrov},
  title        = {Implementation and evaluation of classroom simulation for trainee
                  teacher using second life environments},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {636--643},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750280},
  doi          = {10.1109/ICITST.2013.6750280},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiW13,
  author       = {Sara Jeza Alotaibi and
                  Mike Wald},
  title        = {Evaluation of the {UTAUT} model for acceptable user experiences in
                  Identity Access Management Systems},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {232--237},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750197},
  doi          = {10.1109/ICITST.2013.6750197},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlshehriS13,
  author       = {Abdullah Ali Alshehri and
                  Steve A. Schneider},
  title        = {Formally defining {NFC} M-coupon requirements, with a case study},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {52--58},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750161},
  doi          = {10.1109/ICITST.2013.6750161},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlshehriS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmmarF13,
  author       = {Brika Ammar and
                  Fahima Nader},
  title        = {Pedagogical hyperm{\'{e}}dias systems},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {332--337},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750217},
  doi          = {10.1109/ICITST.2013.6750217},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AmmarF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArachchilageNM13,
  author       = {Nalin Asanka Gamagedara Arachchilage and
                  Cornelius Namiluko and
                  Andrew P. Martin},
  title        = {A taxonomy for securely sharing information among others in a trust
                  domain},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {296--304},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750210},
  doi          = {10.1109/ICITST.2013.6750210},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ArachchilageNM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AtyaK13,
  author       = {Ahmed Osama Fathy Atya and
                  Jilong Kuang},
  title        = {{RUFC:} {A} flexible framework for reliable {UDP} with flow control},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {276--281},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750205},
  doi          = {10.1109/ICITST.2013.6750205},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AtyaK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AwadL13,
  author       = {Mohammed Awad and
                  Ernst L. Leiss},
  title        = {End-to-End cryptographic voting: Potentials and limitations},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {113--118},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750173},
  doi          = {10.1109/ICITST.2013.6750173},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AwadL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AydinJ13,
  author       = {Mustafa Aydin and
                  Jeremy Jacob},
  title        = {A comparison of major issues for the development of forensics in cloud
                  computing},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {77--82},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750166},
  doi          = {10.1109/ICITST.2013.6750166},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AydinJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BattikhABDK13,
  author       = {Dalia Battikh and
                  Safwan El Assad and
                  Bassem Bakhache and
                  Olivier D{\'{e}}forges and
                  Mohamad Khalil},
  title        = {Enhancement of two spatial steganography algorithms by using a chaotic
                  system: Comparative analysis},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {20--25},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750155},
  doi          = {10.1109/ICITST.2013.6750155},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BattikhABDK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BenkhelifaW13,
  author       = {Elhadj Benkhelifa and
                  Thomas Welsh},
  title        = {A Cloud Enabled Social Media Monitoring Platform for Events Detection
                  and Prediction},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {142--148},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750179},
  doi          = {10.1109/ICITST.2013.6750179},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BenkhelifaW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BertolissiR13,
  author       = {Clara Bertolissi and
                  Silvio Ranise},
  title        = {A methodology to build run-time monitors for security-aware workflows},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {501--502},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750251},
  doi          = {10.1109/ICITST.2013.6750251},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BertolissiR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BorchertG13,
  author       = {Bernd Borchert and
                  Max G{\"{u}}nther},
  title        = {Indirect NFC-login},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {204--209},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750192},
  doi          = {10.1109/ICITST.2013.6750192},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BorchertG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BoukhadraBB13,
  author       = {Adel Boukhadra and
                  Karima Benatchba and
                  Amar Balla},
  title        = {{DA5DCSWS:} {A} Distributed Architecture for semantic Web services
                  Discovery and Composition},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {182--187},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750188},
  doi          = {10.1109/ICITST.2013.6750188},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BoukhadraBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Brooks13,
  author       = {Tyson T. Brooks},
  title        = {{ICITST-2013:} Keynote speaker 3: Blurred nets: Disruption and the
                  risk to future 'Internet of Things' (IoT) architectures},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {15},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750150},
  doi          = {10.1109/ICITST.2013.6750150},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Brooks13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BrooksKCPM13,
  author       = {Tyson Brooks and
                  Michelle L. Kaarst{-}Brown and
                  Carlos Caicedo and
                  Joon Park and
                  Lee McKnight},
  title        = {A failure to communicate: Security vulnerabilities in the GridStreamX
                  Edgeware application},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {516--523},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750254},
  doi          = {10.1109/ICITST.2013.6750254},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BrooksKCPM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ByonJEB13,
  author       = {Young{-}Ji Byon and
                  Young{-}Seon Jeong and
                  Said M. Easa and
                  Joonsang Baek},
  title        = {Feasibility analysis of transportation applications based on APIs
                  of social network services},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {59--64},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750162},
  doi          = {10.1109/ICITST.2013.6750162},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ByonJEB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CaoSW13,
  author       = {Chongxiao Cao and
                  Fengguang Song and
                  Daniel G. Waddington},
  title        = {Implementing a high-performance recommendation system using Phoenix++},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {252--257},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750200},
  doi          = {10.1109/ICITST.2013.6750200},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CaoSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CaragataTL13,
  author       = {Daniel Caragata and
                  Karim Tabia and
                  Mauricio Luduena},
  title        = {Cryptanalysis of a chaos-based encryption algorithm for distributed
                  systems},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750157},
  doi          = {10.1109/ICITST.2013.6750157},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CaragataTL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CatuognoG13,
  author       = {Luigi Catuogno and
                  Clemente Galdi},
  title        = {Towards the design of a film-based graphical password scheme},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {388--393},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750228},
  doi          = {10.1109/ICITST.2013.6750228},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CatuognoG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Chang13,
  author       = {Yoon Seok Chang},
  title        = {RISC'13 Workshop: Keynote speaker 5},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {17},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750152},
  doi          = {10.1109/ICITST.2013.6750152},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Chang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChenCSK13,
  author       = {Xian Chen and
                  Meilian Chen and
                  Hyoseop Shin and
                  Eun Yi Kim},
  title        = {Mining salient images from a large-scale blogosphere},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {132--136},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750177},
  doi          = {10.1109/ICITST.2013.6750177},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChenCSK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChoiKAB13,
  author       = {Hyun{-}Hwa Choi and
                  Byoung{-}Seob Kim and
                  Shin{-}Young Ahn and
                  Seung{-}Jo Bae},
  title        = {A workflow for parallel and distributed computing of large-scale genomic
                  data},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {215--218},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750194},
  doi          = {10.1109/ICITST.2013.6750194},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChoiKAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChoiYCY13,
  author       = {Shiu Hong Choi and
                  Bo Yang and
                  H. H. Cheung and
                  Y. X. Yang},
  title        = {Data management of RFID-based track-and-trace anti-counterfeiting
                  in apparel supply chain},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {265--269},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750203},
  doi          = {10.1109/ICITST.2013.6750203},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChoiYCY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ClarkePT13,
  author       = {Charles A. Clarke and
                  Eckhard Pfluegel and
                  Dimitris Tsaptsinos},
  title        = {Enhanced Virtual Private Social Networks: Implementing user content
                  confidentiality},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {306--312},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750212},
  doi          = {10.1109/ICITST.2013.6750212},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ClarkePT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CostelloS13,
  author       = {Robert Costello and
                  Nigel Shaw},
  title        = {Assisted Learning Virtual Support {(ALVS)} for postgraduate students,
                  through the Graduate Virtual Research Environment {(GVRE)}},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {407--410},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750232},
  doi          = {10.1109/ICITST.2013.6750232},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CostelloS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DammakJB13,
  author       = {Sahar Maalej Dammak and
                  Anis Jedidi and
                  Rafik Bouaziz},
  title        = {Automation and evaluation of the semantic annotation of Web resources},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {443--448},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750239},
  doi          = {10.1109/ICITST.2013.6750239},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DammakJB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DzuganFM13,
  author       = {Nicholas Dzugan and
                  Lance Fannin and
                  S. Kami Makki},
  title        = {A recommendation scheme utilizing Collaborative Filtering},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {96--100},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750170},
  doi          = {10.1109/ICITST.2013.6750170},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DzuganFM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ElmogazyB13,
  author       = {Huda Elmogazy and
                  Omaima Bamasak},
  title        = {Towards healthcare data security in cloud computing},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {363--368},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750223},
  doi          = {10.1109/ICITST.2013.6750223},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ElmogazyB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ElzawiWKP13,
  author       = {Abdussalam Elzawi and
                  Stephen J. Wade and
                  Thuraya Kenan and
                  Crinela Pislaru},
  title        = {Exploratory study of the attitudes of academic staff in Libyan Universities
                  towards the role of the Internet},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {490--493},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750248},
  doi          = {10.1109/ICITST.2013.6750248},
  timestamp    = {Wed, 06 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ElzawiWKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EvestiSS13,
  author       = {Antti Evesti and
                  Jani Suomalainen and
                  Reijo Savola},
  title        = {Security risks in the short-range communication of ubiquitous application},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {612--617},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750275},
  doi          = {10.1109/ICITST.2013.6750275},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/EvestiSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FawazAFKLD13,
  author       = {Zeinab Fawaz and
                  Safwan El Assad and
                  M. Frajallah and
                  Ayman Khalil and
                  Ren{\'{e}} Lozi and
                  Olivier D{\'{e}}forges},
  title        = {Lightweight chaos-based cryptosystem for secure images},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {26--30},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750156},
  doi          = {10.1109/ICITST.2013.6750156},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FawazAFKLD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FischerMS13,
  author       = {Daniel Fischer and
                  Bernd Markscheffel and
                  T. Seyffarth},
  title        = {Smartphone security: Overview of security software solutions},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {288--289},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750208},
  doi          = {10.1109/ICITST.2013.6750208},
  timestamp    = {Fri, 22 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/FischerMS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FlorianPT13,
  author       = {Markus Florian and
                  Sarita Paudel and
                  Markus Tauber},
  title        = {Trustworthy evidence gathering mechanism for multilayer cloud compliance},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {529--530},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750257},
  doi          = {10.1109/ICITST.2013.6750257},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FlorianPT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FujiiT13,
  author       = {Haruhiko Fujii and
                  Yukio Tsuruoka},
  title        = {{SV-2FA:} Two-factor user authentication with {SMS} and voiceprint
                  challenge response},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {283--287},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750207},
  doi          = {10.1109/ICITST.2013.6750207},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FujiiT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GabrielAAA13,
  author       = {Arome Junior Gabriel and
                  Boniface Kayode Alese and
                  Adebayo O. Adetunmbi and
                  Olumide S. Adewale},
  title        = {Post-Quantum Crystography: {A} combination of Post-Quantum Cryptography
                  and Steganography},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {449--452},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750240},
  doi          = {10.1109/ICITST.2013.6750240},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GabrielAAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GarasymT13,
  author       = {Oleg Garasym and
                  Ina Taralova},
  title        = {High-speed encryption method based on switched chaotic model with
                  changeable parameters},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {37--42},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750158},
  doi          = {10.1109/ICITST.2013.6750158},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GarasymT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Geerdink13,
  author       = {Bas Geerdink},
  title        = {A reference architecture for big data solutions introducing a model
                  to perform predictive analytics using big data technology},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {71--76},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750165},
  doi          = {10.1109/ICITST.2013.6750165},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Geerdink13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HamdaneSF13,
  author       = {Balkis Hamdane and
                  Ahmed Serhrouchni and
                  Sihem Guemara El Fatmi},
  title        = {Access control enforcement in Named Data Networking},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {576--581},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750268},
  doi          = {10.1109/ICITST.2013.6750268},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HamdaneSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HamedAKK13,
  author       = {Asma Hamed and
                  Hella Kaffel{-}Ben Ayed and
                  Mohamed Ali K{\^{a}}afar and
                  Ahmed Kharraz},
  title        = {Evaluation of third party tracking on the web},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {471--477},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750244},
  doi          = {10.1109/ICITST.2013.6750244},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/HamedAKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HanXB13,
  author       = {Liangxiu Han and
                  Zheng Xie and
                  Richard A. Baldock},
  title        = {Automatic data reuse for accelerating data intensive applications
                  in the Cloud},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {596--600},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750272},
  doi          = {10.1109/ICITST.2013.6750272},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HanXB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IqbalSF13,
  author       = {Saeed Iqbal and
                  Muhammad Shaheen and
                  Fazl{-}e{-}Basit},
  title        = {A machine learning based method for optimal journal classification},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {259--264},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750202},
  doi          = {10.1109/ICITST.2013.6750202},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IqbalSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JangJC13,
  author       = {Miyoung Jang and
                  Ara Jo and
                  Jae{-}Woo Chang},
  title        = {A privacy-aware query authentication index for encrypted database
                  in cloud},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {126--131},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750176},
  doi          = {10.1109/ICITST.2013.6750176},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JangJC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KaboreSSP13,
  author       = {Kiswendsida K. Kabore and
                  Oumarou Sie and
                  Florence S{\`{e}}des and
                  Andr{\'{e}} P{\'{e}}ninou},
  title        = {Information Access Assistant Service {(IAAS)}},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {554--557},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750263},
  doi          = {10.1109/ICITST.2013.6750263},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KaboreSSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Kalman13,
  author       = {Mikl{\'{o}}s K{\'{a}}lm{\'{a}}n},
  title        = {ProtoML: {A} rule-based validation language for Google Protocol Buffers},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {188--193},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750189},
  doi          = {10.1109/ICITST.2013.6750189},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Kalman13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KandiraMP13,
  author       = {Muteveri Kandira and
                  Jabu Mtsweni and
                  Keshnee Padayachee},
  title        = {Cloud security and compliance concerns: Demystifying stakeholders'
                  roles and responsibilities},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {653--658},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750284},
  doi          = {10.1109/ICITST.2013.6750284},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KandiraMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KarimiH13,
  author       = {Kamyab Karimi and
                  Carl Hauser},
  title        = {Internet Unite-and-Conquer architecture},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {219--230},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750195},
  doi          = {10.1109/ICITST.2013.6750195},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KarimiH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KayodeBI13,
  author       = {Boniface Kayode Alese and
                  Iwasokun Gabriel Babatunde and
                  Haruna Danjuma Israel},
  title        = {{DGM} approach to network attacker and defender strategies},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {313--320},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750213},
  doi          = {10.1109/ICITST.2013.6750213},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KayodeBI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KedjarT13,
  author       = {Saadia Kedjar and
                  Abdelkamel Tari},
  title        = {The hybrid model for web services security access control and information
                  flow control},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {194--202},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750190},
  doi          = {10.1109/ICITST.2013.6750190},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KedjarT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KenanPER13,
  author       = {Thuraya Kenan and
                  Crinela Pislaru and
                  Abdussalam Elzawi and
                  Maysoun Restoum},
  title        = {Improving the effectiveness of collaborative learning processes in
                  Libyan Higher Education},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {411--416},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750233},
  doi          = {10.1109/ICITST.2013.6750233},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KenanPER13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhanOK13,
  author       = {Afnan Ullah Khan and
                  Manuel Oriol and
                  Mariam Kiran},
  title        = {Threat methodology for securing scalable video in the Cloud},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {428--436},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750237},
  doi          = {10.1109/ICITST.2013.6750237},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KhanOK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhasawnehWAA13,
  author       = {Rawan T. Khasawneh and
                  Heider Wahsheh and
                  Mohammed Al{-}Kabi and
                  Izzat Mahmoud Alsmadi},
  title        = {Sentiment analysis of arabic social media content: a comparative study},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {101--106},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750171},
  doi          = {10.1109/ICITST.2013.6750171},
  timestamp    = {Thu, 10 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/KhasawnehWAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimKA13,
  author       = {Daehee Kim and
                  Sangwook Kang and
                  Sunshin An},
  title        = {Energy efficient time synchronization for target tracking in heterogeneous
                  sensor networks},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {238--243},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750198},
  doi          = {10.1109/ICITST.2013.6750198},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimKA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LeeKKH13,
  author       = {Jong{-}Hoon Lee and
                  Jung{-}Tae Kim and
                  Ik{-}Kyun Kim and
                  Ki Jun Han},
  title        = {Design and implementation of the contents visualization system for
                  social networks},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {479--483},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750246},
  doi          = {10.1109/ICITST.2013.6750246},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LeeKKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MacDermottSMK13,
  author       = {{\'{A}}ine MacDermott and
                  Qi Shi and
                  Madjid Merabti and
                  Kashif Kifayat},
  title        = {Considering an elastic scaling model for cloud Security},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {150--155},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750181},
  doi          = {10.1109/ICITST.2013.6750181},
  timestamp    = {Mon, 09 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MacDermottSMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ManzoorZB13,
  author       = {Umar Manzoor and
                  Maria Zubair and
                  Kanwal Batool},
  title        = {Using multi-agent systems to solve food distribution problem in disaster
                  area},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {684--689},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750290},
  doi          = {10.1109/ICITST.2013.6750290},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ManzoorZB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MohammadAES13,
  author       = {Omer K. Jasim Mohammad and
                  Safia Abbas and
                  El{-}Sayed M. El{-}Horbaty and
                  Abdel{-}Badeeh M. Salem},
  title        = {A comparative study between modern encryption algorithms based on
                  cloud computing environment},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {531--535},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750258},
  doi          = {10.1109/ICITST.2013.6750258},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MohammadAES13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MsahliAS13,
  author       = {Mounira Msahli and
                  Rached Abdeljaoued and
                  Ahmed Serhrouchni},
  title        = {Access control in probative value Cloud},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {607--611},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750274},
  doi          = {10.1109/ICITST.2013.6750274},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MsahliAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MselleK13,
  author       = {Leonard James Mselle and
                  Tabu S. Kondo},
  title        = {Results on implementing personal learning environments in Tanzanian
                  secondary schools},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {417--421},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750234},
  doi          = {10.1109/ICITST.2013.6750234},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MselleK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MusaC13,
  author       = {Nadianatra Musa and
                  Bob Clift},
  title        = {A model of component interaction between Formal, Technical and Informal
                  components within {IS/IT} security governance},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {454--462},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750242},
  doi          = {10.1109/ICITST.2013.6750242},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MusaC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MusaW13,
  author       = {Ibrahim Kabiru Musa and
                  Stuart D. Walker},
  title        = {Adaptive market place for converged cloud computing model},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {601--606},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750273},
  doi          = {10.1109/ICITST.2013.6750273},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MusaW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NakagawaMO13,
  author       = {Yuri Nakagawa and
                  Yuuki Matsuda and
                  Tetsuro Ogi},
  title        = {Framework for handling personal data proposed system of the self-control
                  on buying information},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {107--112},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750172},
  doi          = {10.1109/ICITST.2013.6750172},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NakagawaMO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NakayamaOKMYN13,
  author       = {Hiroki Nakayama and
                  Ryo Onuma and
                  Hiroaki Kaminaga and
                  Youzou Miyadera and
                  Setsuo Yokoyama and
                  Shoichi Nakamura},
  title        = {Extraction methods of e-mail discussion processes considering diversity
                  of description granularity and their complicated relationships},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {563--568},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750265},
  doi          = {10.1109/ICITST.2013.6750265},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NakayamaOKMYN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NoorafizaMKU13,
  author       = {Matrazali Noorafiza and
                  Hiroshi Maeda and
                  Toshiyuki Kinoshita and
                  Ryuya Uda},
  title        = {Virtual machine remote detection method using network timestamp in
                  cloud computing},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {375--380},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750225},
  doi          = {10.1109/ICITST.2013.6750225},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NoorafizaMKU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ObrulZ13,
  author       = {Denis Obrul and
                  Borut Zalik},
  title        = {Real-time adaptive arrival prediction system for public transport},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {674--677},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750288},
  doi          = {10.1109/ICITST.2013.6750288},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ObrulZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OestR13,
  author       = {Adam Oest and
                  Manjeet Rege},
  title        = {Feedback-driven clustering for automated linking of web pages},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {344--349},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750219},
  doi          = {10.1109/ICITST.2013.6750219},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OestR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OlmstedF13,
  author       = {Aspen Olmsted and
                  Csilla Farkas},
  title        = {Web Service constraint optimization},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {270--275},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750204},
  doi          = {10.1109/ICITST.2013.6750204},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OlmstedF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Ontanon-GarciaGCC13,
  author       = {L. J. Ontanon{-}Garcia and
                  M. Garcia{-}Martinez and
                  Eric Campos{-}Cant{\'{o}}n and
                  Sergej Celikovsk{\'{y}}},
  title        = {Grayscale image encryption using a hyperchaotic unstable dissipative
                  system},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {503--507},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750252},
  doi          = {10.1109/ICITST.2013.6750252},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Ontanon-GarciaGCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OnumaNKMMN13,
  author       = {Ryo Onuma and
                  Hiroki Nakayama and
                  Hiroaki Kaminaga and
                  Yasuhiko Morimoto and
                  Youzou Miyadera and
                  Shoichi Nakamura},
  title        = {Methods for strategic accumulation of context information in research
                  activities},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {678--683},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750289},
  doi          = {10.1109/ICITST.2013.6750289},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OnumaNKMMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PaudelTB13,
  author       = {Sarita Paudel and
                  Markus Tauber and
                  Ivona Brandic},
  title        = {Security standards taxonomy for Cloud applications in Critical Infrastructure
                  {IT}},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {645--646},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750282},
  doi          = {10.1109/ICITST.2013.6750282},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PaudelTB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PerettiGSZ13,
  author       = {Chiara Peretti and
                  Paolo Gastaldo and
                  Marco Stramezzi and
                  Rodolfo Zunino},
  title        = {Embedded implementation of Edwards curve- and extended Jacobi quartic
                  curve-based cryptosystems},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {394--400},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750229},
  doi          = {10.1109/ICITST.2013.6750229},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PerettiGSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Prince13,
  author       = {Nwankwo Nonso Prince},
  title        = {Design and implementation of microcontroller based short message service
                  control system},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {494--499},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750249},
  doi          = {10.1109/ICITST.2013.6750249},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Prince13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PrungsinchaiKB13,
  author       = {Supakorn Prungsinchai and
                  Fouad Khelifi and
                  Ahmed Bouridane},
  title        = {{DCT} sign-based robust image hashing},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {401--405},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750230},
  doi          = {10.1109/ICITST.2013.6750230},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PrungsinchaiKB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/QuwaiderJ13,
  author       = {Muhannad Quwaider and
                  Yaser Jararweh},
  title        = {Cloudlet-based for big data collection in body area networks},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {137--141},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750178},
  doi          = {10.1109/ICITST.2013.6750178},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/QuwaiderJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RahimM13,
  author       = {Aneel Rahim and
                  Paul Malone},
  title        = {Intrusion detection system for Wireless Nano sensor Networks},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {327--330},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750215},
  doi          = {10.1109/ICITST.2013.6750215},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RahimM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RamliAA13,
  author       = {Sofia Najwa Ramli and
                  Rabiah Ahmad and
                  Mohd Faizal Abdollah},
  title        = {Electrocardiogram {(ECG)} signals as biometrics in securing Wireless
                  Body Area Network},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {536--541},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750259},
  doi          = {10.1109/ICITST.2013.6750259},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RamliAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RanaeeNJG13,
  author       = {Iman Ranaee and
                  Mahdi Majidi Nia and
                  Reza Jahantigh and
                  Amirhossein Gharib},
  title        = {Introducing a new algorithm for medical image encryption based on
                  chaotic feature of cellular automata},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {582--587},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750269},
  doi          = {10.1109/ICITST.2013.6750269},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RanaeeNJG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RehmanE13,
  author       = {Shafiq{-}Ur Rehman and
                  Naveed Ejaz},
  title        = {Towards an efficient shopping mechanism for M-commerce},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {558--562},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750264},
  doi          = {10.1109/ICITST.2013.6750264},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/RehmanE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RezaeiKRK13,
  author       = {Abdolazim Rezaei and
                  Zarinah Mohd Kasirun and
                  Vala Ali Rohani and
                  Touraj Khodadadi},
  title        = {Anomaly detection in Online Social Networks using structure-based
                  technique},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {619--622},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750277},
  doi          = {10.1109/ICITST.2013.6750277},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RezaeiKRK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RinaldiRMN13,
  author       = {Luciene Cristina Alves Rinaldi and
                  Briseida Dogo de Resende and
                  Rodrigo Bossini Tavares Moreira and
                  M{\'{a}}rcio Lobo Netto},
  title        = {A system for social network analysis},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {120--125},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750175},
  doi          = {10.1109/ICITST.2013.6750175},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/RinaldiRMN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SGT13,
  author       = {S. Ananda Kanagaraj and
                  G. Arjun and
                  T. Sree Sharmila},
  title        = {Pseudo Eye: The next-generation shopping application using Augmented
                  Reality},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {549--553},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750262},
  doi          = {10.1109/ICITST.2013.6750262},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SGT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SahuS13,
  author       = {Hemlal Sahu and
                  Birendra Kumar Sharma},
  title        = {A new encryption scheme based on hybrid Problems},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {524--527},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750255},
  doi          = {10.1109/ICITST.2013.6750255},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SahuS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SalemB13,
  author       = {Maher Salem and
                  Ulrich Buehler},
  title        = {Reinforcing network security by converting massive data flow to continuous
                  connections for {IDS}},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {570--575},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750267},
  doi          = {10.1109/ICITST.2013.6750267},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/SalemB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SchlessV13,
  author       = {Timo Schless and
                  Harald P. E. Vranken},
  title        = {Counter botnet activities in the Netherlands a study on organisation
                  and effectiveness},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {437--442},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750238},
  doi          = {10.1109/ICITST.2013.6750238},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SchlessV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShaheenIF13,
  author       = {Muhammad Shaheen and
                  Saeed Iqbal and
                  Fazl{-}e{-}Basit},
  title        = {Labeled clustering a unique method to label unsupervised classes},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {210--214},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750193},
  doi          = {10.1109/ICITST.2013.6750193},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShaheenIF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShahriarNCM13,
  author       = {Hossain Shahriar and
                  Sarah North and
                  Wei{-}Chuen Chen and
                  Edward Mawangi},
  title        = {Design and development of Anti-XSS proxy},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {484--489},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750247},
  doi          = {10.1109/ICITST.2013.6750247},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShahriarNCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShandilyaS13,
  author       = {Vivek Shandilya and
                  Sajjan G. Shiva},
  title        = {Security in the cloud based systems: Structure and breaches},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {542--547},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750260},
  doi          = {10.1109/ICITST.2013.6750260},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShandilyaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShemailiYZMC13,
  author       = {Mouza Ahmad Bani Shemaili and
                  Chan Yeob Yeun and
                  Mohamed Jamal Zemerly and
                  Khalid Mubarak and
                  Yoon Seok Chang},
  title        = {Securing E-Seal real time tracking system for Internet of Things},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {65--69},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750163},
  doi          = {10.1109/ICITST.2013.6750163},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShemailiYZMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Shoniregun13,
  author       = {Charles A. Shoniregun},
  title        = {{ICITST-2013:} Keynote speaker 4: Writing a sustainable research paper},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {16},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750151},
  doi          = {10.1109/ICITST.2013.6750151},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Shoniregun13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SicuranzaE13,
  author       = {Mario Sicuranza and
                  Angelo Esposito},
  title        = {An access control model for easy management of patient privacy in
                  {EHR} systems},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {463--470},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750243},
  doi          = {10.1109/ICITST.2013.6750243},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SicuranzaE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SilvaMZ13,
  author       = {Bruno Silva and
                  Paulo Romero Martins Maciel and
                  Armin Zimmermann},
  title        = {Performability models for designing disaster tolerant Infrastructure-as-a-Service
                  cloud computing systems},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {647--652},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750283},
  doi          = {10.1109/ICITST.2013.6750283},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/SilvaMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SitaramPVRPJDRPRA13,
  author       = {Dinkar Sitaram and
                  H. L. Phalachandra and
                  Anush Vishwanath and
                  Pramod Ramesh and
                  Meghana Prashanth and
                  Akshay G. Joshi and
                  Anoop R. Desai and
                  Harikrishna Prabhu C. R and
                  Prafulla and
                  Shwetha R and
                  Yashaswini A},
  title        = {Keystone federated security},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {659--664},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750285},
  doi          = {10.1109/ICITST.2013.6750285},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SitaramPVRPJDRPRA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Sorensen13,
  author       = {Ove S{\"{o}}rensen},
  title        = {Zombie-cookies: Case studies and mitigation},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {321--326},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750214},
  doi          = {10.1109/ICITST.2013.6750214},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Sorensen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Stupples13,
  author       = {David Stupples},
  title        = {{ICITST-2013:} Keynote speaker 2: Security challenge of {TOR} and
                  the deep web},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {14},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750149},
  doi          = {10.1109/ICITST.2013.6750149},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Stupples13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VelascoWR13,
  author       = {Margarita Velasco and
                  David While and
                  Pathmeswaran Raju},
  title        = {Adaptation of Web services using policies},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {338--343},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750218},
  doi          = {10.1109/ICITST.2013.6750218},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VelascoWR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WesthuizenC13,
  author       = {Charl van der Westhuizen and
                  Marijke Coetzee},
  title        = {Context-aware RESTful services on mobile devices},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {350--355},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750220},
  doi          = {10.1109/ICITST.2013.6750220},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WesthuizenC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Wiley13,
  author       = {Jeffrey J. Wiley},
  title        = {{ICITST-2013:} Keynote speaker 1: Principles of information security
                  risk management},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {13},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750148},
  doi          = {10.1109/ICITST.2013.6750148},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Wiley13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WillettS13,
  author       = {Melanie Willett and
                  Rossouw von Solms},
  title        = {A framework for assuring the conformance of cloud-based email},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {168--173},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750184},
  doi          = {10.1109/ICITST.2013.6750184},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WillettS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YuliantoP13,
  author       = {Aditya Yulianto and
                  Maria Irmina Prasetiyowati},
  title        = {BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time
                  Password mechanism implementation for Dropbox files security},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {357--362},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750222},
  doi          = {10.1109/ICITST.2013.6750222},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YuliantoP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZalmoutG13,
  author       = {Nasser Zalmout and
                  Moustafa Ghanem},
  title        = {Multidimensional community detection in Twitter},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {83--88},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750167},
  doi          = {10.1109/ICITST.2013.6750167},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZalmoutG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhaoBB13,
  author       = {Nan Zhao and
                  Lo{\"{\i}}c Baud and
                  Patrick Bellot},
  title        = {Characteristics analysis for the cyberlockers files study on Rapidgator
                  Speedyshare and 1Fichier},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {176--181},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750187},
  doi          = {10.1109/ICITST.2013.6750187},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhaoBB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2013,
  title        = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6745432/proceeding},
  isbn         = {978-1-908320-20-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdelhamidAT12,
  author       = {Neda Abdelhamid and
                  Aladdin Ayesh and
                  Fadi A. Thabtah},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {An experimental study of three different rule ranking formulas in
                  associative classification},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {795--800},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470929/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdelhamidAT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbuhusseinBS12,
  author       = {Abdullah Abuhussein and
                  Harkeerat Singh Bedi and
                  Sajjan G. Shiva},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Evaluating security and privacy in cloud computing services: {A} Stakeholder's
                  perspective},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {388--395},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470836/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbuhusseinBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlMahmoudCYA12,
  author       = {Abdelrahman AlMahmoud and
                  Maurizio Colombo and
                  Chan Yeob Yeun and
                  Hassan Al{-}Muhairi},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Smart authentication for real-time business process monitoring},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {253--258},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470954/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlMahmoudCYA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlarifiW12,
  author       = {Suaad S. Alarifi and
                  Stephen D. Wolthusen},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Detecting anomalies in IaaS environments through virtual machine host
                  system call analysis},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {211--218},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470945/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlarifiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlghafliJM12,
  author       = {Khawla Abdulla Alghafli and
                  Andrew Jones and
                  Thomas Anthony Martin},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Forensics data acquisition methods for mobile phones},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {265--269},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470956/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlghafliJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlharbiPA12,
  author       = {Mafawez T. Alharbi and
                  Amelia Platt and
                  Ali H. Al{-}Bayatti},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Context-aware Personal Learning Environment},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {692--697},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470905/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlharbiPA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlhusseinSW12,
  author       = {Mohammed Alhussein and
                  Avinash Srinivasan and
                  Duminda Wijesekera},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Forensics filesystem with cluster-level identifiers for efficient
                  data recovery},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {411--415},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470840/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlhusseinSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlotaibiW12,
  author       = {Sara Jeza Alotaibi and
                  Mike Wald},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Towards a UTAUT-based model for studying the integrating physical
                  and virtual Identity Access Management Systems in e-government domain},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {453--458},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470849/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlotaibiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmatoMV12,
  author       = {Alba Amato and
                  Beniamino Di Martino and
                  Salvatore Venticinque},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Evaluation and brokering of service level agreements for negotiation
                  of cloud infrastructures},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {144--149},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470932/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmatoMV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AndradeLN12,
  author       = {Ana A. Andrade and
                  Vitor V. Lopes and
                  Augusto Q. Novais},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Quantifying the impact on distrust of e-commerce trust factors: {A}
                  non-parametric study},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {356--361},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470830/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AndradeLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AnzaiKMYMN12,
  author       = {Hiroyuki Anzai and
                  Hiroaki Kaminaga and
                  Yasuhiko Morimoto and
                  Setsuo Yokoyama and
                  Youzou Miyadera and
                  Shoichi Nakamura},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A system for management of research resources focusing on grasping
                  the polish processes},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {816--817},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470826/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AnzaiKMYMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AokiIS12,
  author       = {Shunsuke Aoki and
                  Masayuki Iwai and
                  Kaoru Sezaki},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Perturbation for privacy-preserving participatory sensing on mobile},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {809},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470822/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AokiIS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArunLT12,
  author       = {S. N. Arun and
                  W. C. Lam and
                  Kok Kiong Tan},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Innovative solution for a telemedicine application},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {778--783},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470924/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ArunLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Assad12,
  author       = {Safwan El Assad},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Chaos Based Information Hiding and Security},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470986/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Assad12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AzniAN12,
  author       = {A. H. Azni and
                  Rabiah Ahmad and
                  Zul Azri Muhamad Noh},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Correlated node behavior in wireless ad hoc networks: An epidemic
                  model},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {403--410},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470839/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AzniAN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AzzamZ12,
  author       = {Said Rabah Azzam and
                  Shikun Zhou},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Implementation methodology of Rely/Guarantee plug-in for Prot{\'{e}}g{\'{e}}},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {710--714},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470909/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AzzamZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AzzamZ12a,
  author       = {Said Rabah Azzam and
                  Shikun Zhou},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Assessment of ontology alignment methodology},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {759--764},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470920/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AzzamZ12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BacksWK12,
  author       = {Peter Backs and
                  Steffen Wendzel and
                  J{\"{o}}rg Keller},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Dynamic routing in covert channel overlays based on control protocols},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {32--39},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470978/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BacksWK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BaekVJAY12,
  author       = {Joonsang Baek and
                  Quang Hieu Vu and
                  Andrew Jones and
                  Sameera Al{-}Mulla and
                  Chan Yeob Yeun},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Smart-frame: {A} flexible, scalable, and secure information management
                  framework for smart grids},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {668--673},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470900/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BaekVJAY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BahigE12,
  author       = {Ghada Moussa Bahig and
                  Amr El{-}Kadi},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Ensuring software safety in safety critical domains},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {308--312},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470966/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BahigE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BenzidaneKS12,
  author       = {Karim Benzidane and
                  Saad Khoudali and
                  Abderrahim Sekkaki},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Autonomous agent-based inspection for inter-VM traffic in a Cloud
                  environment},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {656--661},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470898/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BenzidaneKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BotelhoNU12,
  author       = {Bruno Alves Pereira Botelho and
                  Emilio Tissato Nakamura and
                  Nelson Uto},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Implementation of tools for brute forcing touch inputted passwords},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {807--808},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470821/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BotelhoNU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CarmichaelC12,
  author       = {Dawn Carmichael and
                  David Cleave},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {How effective is social media advertising? {A} study of Facebook Social
                  Advertisements},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {226--229},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470948/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CarmichaelC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CastroMFB12,
  author       = {Sidney de Castro and
                  Maria das Gra{\c{c}}as Bruno Marietto and
                  Robson dos Santos Fran{\c{c}}a and
                  Wagner Tanaka Botelho},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A Multi-Agent System for information management and augmented reality
                  in asymmetric wars},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {499--504},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470859/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CastroMFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChaisanitHSP12,
  author       = {Settachai Chaisanit and
                  Napatwadee Sangboonnum Hongthong and
                  Surachai Suksakulchai and
                  Chuchart Pinpat},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Traditional musical Virtual Reality on M-learning},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {271--274},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470958/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChaisanitHSP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Chemerkin12,
  author       = {Yury Chemerkin},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Vulnerability elimination by force of new mobile {OS} Comparative
                  research of security techniques on BlackBerry {OS} (incl. PlayBook)},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {483--487},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470855/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Chemerkin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChenTN12,
  author       = {Y. Y. Chen and
                  Shakirah Mohd Taib and
                  Che Sarah Che Nordin},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Determinants of student performance in advanced programming course},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {304--307},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470965/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChenTN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChettoNAF12,
  author       = {Maryline Chetto and
                  Hassan Noura and
                  Safwan El Assad and
                  Mousa Farajallah},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {How to guarantee secured transactions with QoS and real-time constraints},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {40--44},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470979/},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ChettoNAF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChotoP12,
  author       = {Somsak Choto and
                  Nol Premasathian},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A dynamic fuzzy commitment scheme using {ARRSES} forecasting},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {616--619},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470890/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChotoP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ConnollyL12,
  author       = {Lena Yuryna Connolly and
                  Michael Lang},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Investigation of cultural aspects within information systems security
                  research},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {105--111},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470994/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ConnollyL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CotL12,
  author       = {L{\'{e}}a D. Cot and
                  Ren{\'{e}} Lozi},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Assessing the security of subsampling process using modified {EKF}
                  and nonlinear least squares methods},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {27--31},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470977/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CotL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CristinaE12,
  author       = {Ana Cristina Dascalescu and
                  Radu Eugen Boriga},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A new method to improve cryptographic properties of chaotic discrete
                  dynamical systems},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {60--65},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470984/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CristinaE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Delgado-GuillenGT12,
  author       = {Lorenzo Antonio Delgado{-}Guillen and
                  Jose Juan Garcia{-}Hernandez and
                  C{\'{e}}sar Torres{-}Huitzil},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Validating the existence of watermarks on digital images using a mobile
                  phone},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {51--55},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470982/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Delgado-GuillenGT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ElbadrawyA12,
  author       = {Rehaballah Elbadrawy and
                  Rasha Abdel Aziz},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Mobile banking contexts and prospects in Egypt: {A} framework},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {766--771},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470922/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ElbadrawyA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EldefrawyK12,
  author       = {Mohamed Hamdy Eldefrawy and
                  Muhammad Khurram Khan},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Detecting counterfeit-money using RFID-enabled mobile devices},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {74--79},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470988/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/EldefrawyK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Fan12,
  author       = {Limin Fan},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Security management mechanism for composite applications based on
                  hash chains},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {575--577},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470877/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Fan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FarooqiN12,
  author       = {Norah Farooqi and
                  Siobh{\'{a}}n North},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Evaluation of practical trust based access control for {XML} databases},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {336--340},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470972/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FarooqiN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FischerMFB12,
  author       = {Daniel Fischer and
                  Bernd Markscheffel and
                  Sebastian Frosch and
                  Daniela B{\"{u}}ttner},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A survey of threats and security measures for data transmission over
                  {GSM/UMTS} networks},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {477--482},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470854/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FischerMFB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FloodDKM12,
  author       = {Jason Flood and
                  Mark Denihan and
                  Anthony Keane and
                  Fredrick Mtenzi},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Black hat training of white hat resources: The future of security
                  is gaming},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {488--491},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470856/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FloodDKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FranzSH12,
  author       = {Elke Franz and
                  Thomas Springer and
                  Norbert Harder},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Enhancing privacy in social applications with the notion of group
                  context},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {112--118},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470995/},
  timestamp    = {Tue, 24 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FranzSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GadelhaFC12,
  author       = {Mikhail Y. R. Gadelha and
                  Cicero Ferreira Fernandes Costa Filho and
                  Marly Guimar{\~{a}}es Fernandes Costa},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Proposal of a cryptography method using gray scale digital images},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {331--335},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470971/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GadelhaFC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GaoK12,
  author       = {Tom Yuan Gao and
                  David Kearney},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A shared secret security broker implementation in a commercial context},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {133--138},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470884/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GaoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GhauriHHS12,
  author       = {Sajjad Ahmed Ghauri and
                  Hasan Humayun and
                  Muhammad Ehsan ul Haq and
                  Farhan Sohail},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Implementation of Convolutional codes on {FPGA}},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {175--178},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470938/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GhauriHHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GhazizadehZMKT12,
  author       = {Eghbal Ghazizadeh and
                  Mazdak Zamani and
                  Jamalul{-}lail Ab Manan and
                  Reza Khaleghparast and
                  Ali Taherian},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A trust based model for federated identity architecture to mitigate
                  identity theft},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {376--381},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470834/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GhazizadehZMKT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GonzalezLL12,
  author       = {Carlos R. Jaimez{-}Gonz{\'{a}}lez and
                  Wulfrano Arturo Luna{-}Ram{\'{\i}}rez and
                  Simon M. Lucas},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A web tool for monitoring {HTTP} asynchronous method invocations},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {127--132},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470883/},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GonzalezLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GonzalezSBSC12,
  author       = {Jos{\'{e}} Luis Gonz{\'{a}}lez and
                  Victor Sosa{-}Sosa and
                  Borja Bergua and
                  Luis Miguel S{\'{a}}nchez and
                  Jes{\'{u}}s Carretero},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Fault-tolerant middleware based on multistream pipeline for private
                  storage services},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {548--555},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470871/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GonzalezSBSC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Gordon12,
  author       = {Damian Gordon},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Hackers and Hollywood 2: Considering televisual Cyberthreats in Security
                  Risk Analysis},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {524--527},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470865/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Gordon12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GulAVY12,
  author       = {Omniyah Gul and
                  Mahmoud Al{-}Qutayri and
                  Quang Hieu Vu and
                  Chan Yeob Yeun},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Data integration of electronic health records using artificial neural
                  networks},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {313--317},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470967/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GulAVY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GuoBH12,
  author       = {Yang Guo and
                  Guohua Bai and
                  Yan Hu},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Using Bayes Network for Prediction of Type-2 diabetes},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {471--472},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470852/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GuoBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GuptaSK12,
  author       = {Sanchika Gupta and
                  Anjali Sardana and
                  Padam Kumar},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A light weight centralized file monitoring approach for securing files
                  in Cloud environment},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {382--387},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470835/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GuptaSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HaJ12,
  author       = {JeongMok Ha and
                  Hong Jeong},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Modelsim simulation for real-time stereo matching using {DP} algorithm},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {244--248},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470952/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HaJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Halaoui12,
  author       = {Hatem Fawzi Halaoui},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Uncertainty with {STOS:} Intelligent solution for uncertain navigation
                  problems},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {362--367},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470831/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Halaoui12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HamidAY12,
  author       = {N. Abdul Hamid and
                  M. F. Al A'zhim and
                  M. L. Yap},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {e-Ticketing system for football events in Malaysia},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {556--561},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470872/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HamidAY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HaronMSL12,
  author       = {Galoh Rashidah Haron and
                  Dharmadharshni Maniam and
                  Vijayakumari Sadasivam and
                  Wong Hon Loon},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Re-engineering of web reverse proxy with shibboleth authentication},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {325--330},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470970/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HaronMSL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HassaneinG12,
  author       = {Mohamed Sameh Hassanein and
                  Gheorghita Ghinea},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Text fingerprint key generation},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {603--609},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470888/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HassaneinG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HeckmannZMWP12,
  author       = {Benjamin Heckmann and
                  Marcus Zinn and
                  Ronald C. Moore and
                  Christoph Wentzel and
                  Andrew D. Phippen},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Economic efficiency control on data centre resources in heterogeneous
                  cost scenarios},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {675--679},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470902/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HeckmannZMWP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HuLKB12,
  author       = {Yan Hu and
                  Fangjie Lu and
                  Israr Khan and
                  Guohua Bai},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A cloud computing solution for sharing healthcare information},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {465--470},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470851/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HuLKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HuangFCZR12,
  author       = {Xin Huang and
                  Rong Fu and
                  Bangdao Chen and
                  Tingting Zhang and
                  A. W. Roscoe},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {User interactive Internet of things privacy preserved access control},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {597--602},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470887/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HuangFCZR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HuangGCR12,
  author       = {Xin Huang and
                  Shangyuan Guo and
                  Bangdao Chen and
                  A. W. Roscoe},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Bootstrapping body sensor networks using human controlled LED-camera
                  channels},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {433--438},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470845/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HuangGCR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Idzikowska12,
  author       = {Ewa Idzikowska},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A round level approach to fault detection in {PP-2} symmetric block
                  cipher},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {416--419},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470841/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Idzikowska12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IonescuATMS12,
  author       = {Laurentiu Ionescu and
                  Constantin Anton and
                  Ion Tutanescu and
                  Alin Mazare and
                  Gheorghe Serban},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Error correction and detection system based on Hopfield networks},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {541--544},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470868/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IonescuATMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IzidaTMSBF12,
  author       = {Aline Izida and
                  Thiago da Rocha Tedrus and
                  Maria das Gra{\c{c}}as Bruno Marietto and
                  Margarethe Steinberger{-}Elias and
                  Wagner Tanaka Botelho and
                  Robson dos Santos Fran{\c{c}}a},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Emergency care in situations of natural disaster: {A} Multi-Agent
                  approach},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {237--242},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470950/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IzidaTMSBF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JainA12,
  author       = {Ruchi Jain and
                  Nasser S. Abouzakhar},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Hidden Markov Model based anomaly intrusion detection},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {528--533},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470866/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JainA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JungHDKJK12,
  author       = {Markus Jung and
                  Thomas Hofer and
                  Susen D{\"{o}}belt and
                  Georg Kienesberger and
                  Florian Judex and
                  Wolfgang Kastner},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Access control for a Smart Grid {SOA}},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {281--287},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470960/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JungHDKJK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JustA12,
  author       = {Mike Just and
                  David Aspinall},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {On the security and usability of dual credential authentication in
                  {UK} online banking},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {259--264},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470955/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JustA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KarnadN12,
  author       = {Kiran Karnad and
                  Saravanan Nagenthram},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Cloud security: Can the cloud be secured?},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {208--210},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470944/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KarnadN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhalidAPR12,
  author       = {Saneeha Khalid and
                  Haider Abbas and
                  Maruf Pasha and
                  Asad Raza},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Securing Internet Information Services {(IIS)} configuration files},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {726--729},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470913/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KhalidAPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhongpitpKS12,
  author       = {Veena Khongpit and
                  Uthairatt Phangphol and
                  M. L. Kulthon Kasemsan and
                  Chonawat Srisa{-}an},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {2D Gun's type classification using edge detection algorithm and {SUSAN}
                  low level image processing},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {521--523},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470864/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KhongpitpKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimA12,
  author       = {Sukyoung Kim and
                  Kihong Ahn},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {User-intent custom adaptive search service based on ontology and similar-word
                  retrieval algorithm composition},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {121--126},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470882/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimLDY12,
  author       = {Yongki Kim and
                  Jungmin Lim and
                  Seokjoo Doo and
                  Hyunsoo Yoon},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {The design of adaptive intrusion tolerant system(ITS) based on historical
                  data},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {662--667},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470899/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimLDY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KirkhamDKJAKVE12,
  author       = {Tom Kirkham and
                  Karim Djemame and
                  Mariam Kiran and
                  Ming Jiang and
                  Django Armstrong and
                  George Kousiouris and
                  George Vafiadis and
                  Athanasia Evangelinou},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Risk based {SLA} management in clouds: {A} legal perspective},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {156--160},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470934/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KirkhamDKJAKVE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KulkarniMKG12,
  author       = {Saurabh Kulkarni and
                  Madhumitra Mutalik and
                  Prathamesh Kulkarni and
                  Tarun Gupta},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Honeydoop - a system for on-demand virtual high interaction honeypots},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {743--747},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470917/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KulkarniMKG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KumarD12,
  author       = {V. Anil Kumar and
                  Debabrata Das},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Feedback manipulation flooding attack: Feasibility evaluation and
                  impact quantification on Stream Control Transmission Protocol},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {420--425},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470842/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KumarD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LazouskiMMM12,
  author       = {Aliaksandr Lazouski and
                  Gaetano Mancini and
                  Fabio Martinelli and
                  Paolo Mori},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Usage control in cloud systems},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {202--207},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470943/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LazouskiMMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Lin12,
  author       = {Hsi{-}Chung Lin},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Content Extraction Signatures Revisited},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {447--451},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470847/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Lin12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Ma12,
  author       = {Ji Ma},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Analysis of access control protocols using labelled tableaux},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {610--615},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470889/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Ma12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MalikHC12,
  author       = {Sheheryar Malik and
                  Fabrice Huet and
                  Denis Caromel},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Reliability aware scheduling in cloud computing},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {194--200},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470942/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MalikHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MalikHC12a,
  author       = {Sheheryar Malik and
                  Fabrice Huet and
                  Denis Caromel},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {{RACS:} {A} framework for Resource Aware Cloud computing},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {680--687},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470903/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MalikHC12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ManzoorEAUKU12,
  author       = {Umar Manzoor and
                  Naveed Ejaz and
                  Nadeem Akhtar and
                  Muhammad Umar and
                  M. Shoaib Khan and
                  Hafsa Umar},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Ontology based image retrieval},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {288--293},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470961/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ManzoorEAUKU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MariettoFSBNS12,
  author       = {Maria das Gra{\c{c}}as Bruno Marietto and
                  Robson dos Santos Fran{\c{c}}a and
                  Margarethe Steinberger{-}Elias and
                  Wagner Tanaka Botelho and
                  Emerson Aguiar Noronha and
                  Vera L{\'{u}}cia da Silva},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Comparing distinct approaches for panic behavior computer simulations:
                  {A} theoretical analysis},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {628--633},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470893/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MariettoFSBNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MariettoSAT12,
  author       = {Maria das Gra{\c{c}}as Bruno Marietto and
                  Margarethe Born Steinberger{-}Elias and
                  Marllon Felipe Muniz De Farias Alves and
                  Rita Vucinic Teles},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {The process of building knowledge and communication of social systems
                  emulated by multiagent systems capable of cause and emerging learning},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {642--647},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470895/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MariettoSAT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MatsumotoYKMN12,
  author       = {Takuya Matsumoto and
                  Tatuya Yamazaki and
                  Hiroaki Kaminaga and
                  Youzou Miyadera and
                  Shoichi Nakamura},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Visualization of Web exploration streams and user's genuine intentions},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {814--815},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470825/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MatsumotoYKMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MbaleMH12,
  author       = {Jameson Mbale and
                  Kauna Mufeti and
                  Victor Hamutenya},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Examining ubiquitous security-capital issues in implementing a Campus-System-as-a-Service(CSaaS)
                  model in the cloud computing age: Case study sub-Saharan region},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {99--104},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470993/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MbaleMH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MedsgerS12,
  author       = {Jeffrey Medsger and
                  Avinash Srinivasan},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {{ERASE-} entropy-based sanitization of sensitive data for privacy
                  preservation},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {427--432},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470844/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MedsgerS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MeeananTHCN12,
  author       = {Laddawan Meeanan and
                  Apichai Trangansri and
                  Pornpipat Hongthai and
                  Settachai Chaisanit and
                  Ratchadawan Nimnual},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {The edutainment of virtual music instrument for Thai xylophone (Ranad-ek)},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {546--547},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470870/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MeeananTHCN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MghawishAAA12,
  author       = {Afif Mghawish and
                  Akram A. AbdelQader and
                  Mahmoud A. Al{-}Jezawi and
                  Mohammad AbuMahfouz},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Multi function control system using {GSM} modem based {SM5100B} Module},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {515--518},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470862/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MghawishAAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MichalasB12,
  author       = {Antonis Michalas and
                  Menelaos Bakopoulos},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {SecGOD Google Docs: Now i feel safer!},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {589--595},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470880/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MichalasB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Miiller12,
  author       = {Greg Miiller},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Issues in inter-organisational encryption systems: The problem with
                  FedLink},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {341--346},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470973/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Miiller12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MilenkoskiK12,
  author       = {Aleksandar Milenkoski and
                  Samuel Kounev},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Towards benchmarking intrusion detection systems for virtualized cloud
                  environments},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {562--563},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470873/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MilenkoskiK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MillerBT12,
  author       = {Brad Miller and
                  Kaitlyn Buck and
                  J. D. Tygar},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Systematic analysis and evaluation of web privacy policies and implementations},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {534--540},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470867/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MillerBT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MirheidariAKJ12,
  author       = {Seyed Ali Mirheidari and
                  Sajjad Arshad and
                  Saeidreza Khoshkdahan and
                  Rasool Jalili},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Two novel server-side attacks against log file in Shared Web Hosting
                  servers},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {318--323},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470968/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MirheidariAKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MohammadTM12,
  author       = {Rami Mustafa A. Mohammad and
                  Fadi A. Thabtah and
                  Lee McCluskey},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {An assessment of features related to phishing websites using an automated
                  technique},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {492--497},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470857/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MohammadTM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MoritaAKMN12,
  author       = {Yusuke Morita and
                  Hiroyuki Anzai and
                  Hiroaki Kaminaga and
                  Youzou Miyadera and
                  Shoichi Nakamura},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Visual support system for semi-automatic generation of spadework of
                  academic paper from presentation slides},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {812--813},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470824/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MoritaAKMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MselleK12,
  author       = {Leonard James Mselle and
                  Tabu S. Kondo},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Deploying Computer-Based Learning under suboptimal conditions},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {94--98},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470992/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MselleK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Mtsweni12,
  author       = {Jabu Mtsweni},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Exploiting {UML} and acceleo for developing Semantic Web Services},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {753--758},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470919/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Mtsweni12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NakayamaKMN12,
  author       = {Hiroki Nakayama and
                  Hiroaki Kaminaga and
                  Youzou Miyadera and
                  Shoichi Nakamura},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Innovative extracting and integrating the potential and subjectively
                  formed context-information},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {810--811},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470823/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NakayamaKMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NawazGF12,
  author       = {Omer Nawaz and
                  Christian Gehrmann and
                  Markus Fiedler},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Secure mobile social networks using {USIM} in a closed environment},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {439--446},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470846/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NawazGF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Negron12,
  author       = {Martin A. Negron},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A Bayesian Belief Network analysis of the Internet governance conflict},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {621--627},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470892/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Negron12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NimnualC12,
  author       = {Ratchadawan Nimnual and
                  Settachai Chaisanit},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {M-learning for Eco-Packaging using {KM}},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {793--794},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470928/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NimnualC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Odat12,
  author       = {Ahmad Mousa Odat},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {E-Government in developing countries: Framework of challenges and
                  opportunities},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {578--582},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470878/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Odat12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OjamaaD12,
  author       = {Andres Ojamaa and
                  Karl D{\"{u}}{\"{u}}na},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Assessing the security of Node.js platform},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {348--355},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470829/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OjamaaD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OlajideSAT12,
  author       = {Funminiyi Olajide and
                  Nick Savage and
                  Galyna A. Akmayeva and
                  Richard Trafford},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Forensic memory evidence of windows application},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {715--718},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470910/},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/OlajideSAT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OlmstedF12,
  author       = {Aspen Olmsted and
                  Csilla Farkas},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {High volume web service resource consumption},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {275--280},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470959/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OlmstedF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PhangpholCPKK12,
  author       = {Uthairatt Phangphol and
                  Settachai Chaisanit and
                  Tau{-}tong Puangsuwan and
                  Veena Khongpit and
                  Parichat Kunpluem},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Community {OTOP} Web Portal for Eastern Region of Thailand},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {513--514},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470861/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PhangpholCPKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PhuongOLT12,
  author       = {Tran Thao Phuong and
                  Kazumasa Omote and
                  Nguyen Gia Luyen and
                  Nguyen Dinh Thuc},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Improvement of multi-user searchable encrypted data scheme},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {396--401},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470837/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PhuongOLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PourghomiG12,
  author       = {Pardis Pourghomi and
                  Gheorghita Ghinea},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Challenges of managing secure elements within the {NFC} ecosystem},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {720--725},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470912/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PourghomiG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PourghomiG12a,
  author       = {Pardis Pourghomi and
                  Gheorghita Ghinea},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Managing {NFC} payment applications through cloud computing},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {772--777},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470923/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PourghomiG12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PovedaWI12,
  author       = {Geovanny Poveda and
                  Adam Westerski and
                  Carlos Angel Iglesias},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Application of semantic search in Idea Management Systems},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {230--236},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470949/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PovedaWI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/QayumK12,
  author       = {Abdul Qayum and
                  Prakash Kumar},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {{QR} decomposition-based cryptography: Via image generation {(QR-CRYPT)}},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {179--184},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470939/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/QayumK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RathKMT12,
  author       = {Ashwini Rath and
                  Sanjay Kumar and
                  Sanjay Mohapatra and
                  Rahul Thakurta},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Decision points for adoption cloud computing in small, medium enterprises
                  (SMEs)},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {688--691},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470904/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RathKMT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RixonF12,
  author       = {Daphne Rixon and
                  Mary Furey},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Learning from oversight by telecommunications regulatory agencies},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {368--374},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470832/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RixonF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaeedW12,
  author       = {Muhammad Qasim Saeed and
                  Colin D. Walter},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Off-line {NFC} Tag Authentication},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {730--735},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470914/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SaeedW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShemailiYMZ12,
  author       = {Mouza Ahmad Bani Shemaili and
                  Chan Yeob Yeun and
                  Khalid Mubarak and
                  Mohamed Jamal Zemerly},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A new lightweight hybrid cryptographic algorithm for the internet
                  of things},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {87--92},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470990/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShemailiYMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SlamanigH12,
  author       = {Daniel Slamanig and
                  Christian Hanser},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {On cloud storage and the cloud of clouds approach},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {649--655},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470897/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SlamanigH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SobhyEE12,
  author       = {Dalia Sobhy and
                  Yasser El{-}Sonbaty and
                  Mohamad Abou El{-}Nasr},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {MedCloud: Healthcare cloud computing system},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470935/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SobhyEE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SomaliG12,
  author       = {Zawlikhah Al Somali and
                  Gheorghita Ghinea},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Investigation of factors affecting growth of e-banking services in
                  Saudi Arabia},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {583--588},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470879/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SomaliG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/StirparoK12,
  author       = {Pasquale Stirparo and
                  Ioannis Kounelis},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {The mobileak project: Forensics methodology for mobile application
                  privacy assessment},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {297--303},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470964/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/StirparoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/StulmanLS12,
  author       = {Ariel Stulman and
                  Jonathan Lahav and
                  Avraham Shmueli},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {{MANET} secure key exchange using spraying diffie-hellman algorithm},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {249--252},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470953/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/StulmanLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SurSS12,
  author       = {Chiranjib Sur and
                  Sanjeev Sharma and
                  Anupam Shukla},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Analysis {\&} modeling multi-breeded Mean-Minded ant colony optimization
                  of agent based Road Vehicle Routing Management},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {634--641},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470894/},
  timestamp    = {Mon, 02 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SurSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SusakulchaiKC12,
  author       = {Surachai Suksakulchai and
                  Wacheerapan Kaewprapan and
                  Settachai Chaisanit},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Making of {DAISY} Talking book on mobile phone: {A} concept and architecture},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {791--792},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470927/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SusakulchaiKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TahirHGMH12,
  author       = {Ruhma Tahir and
                  Huosheng Hu and
                  Dongbing Gu and
                  Klaus D. McDonald{-}Maier and
                  Gareth Howells},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A scheme for the generation of strong cryptographic key pairs based
                  on ICMetrics},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {168--174},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470937/},
  timestamp    = {Fri, 15 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TahirHGMH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TaqieddinS12,
  author       = {Eyad Taqieddin and
                  Jagannathan Sarangapani},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Vulnerability analysis of two ultra-lightweight {RFID} authentication
                  protocols: {RAPP} and gossamer},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {80--86},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470989/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TaqieddinS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TaralovaLA12,
  author       = {Ina Taralova and
                  Ren{\'{e}} Lozi and
                  Safwan El Assad},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Chaotic generator synthesis: Dynamical and statistical analysis},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {56--59},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470983/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TaralovaLA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TataruAD12,
  author       = {Relu Laurentiu Tataru and
                  Safwan El Assad and
                  Olivier D{\'{e}}forges},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Improved blind {DCT} watermarking by using chaotic sequences},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {46--50},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470981/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TataruAD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TeuflZKL12,
  author       = {Peter Teufl and
                  Thomas Zefferer and
                  Sandra Kreuzhuber and
                  Christian M. Lesjak},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Trusted Location Based Services},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {185--192},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470940/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TeuflZKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TrojahnM12,
  author       = {Matthias Trojahn and
                  Philipp Marcus},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Towards coupling user and device locations using biometrical authentication
                  on smartphones},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {736--741},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470915/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TrojahnM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/UllahXLB12,
  author       = {Abrar Ullah and
                  Hannan Xiao and
                  Mariana Lilley and
                  Trevor Barker},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Usability of profile based student authentication and traffic light
                  system in online examinations},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {220--225},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470947/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/UllahXLB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/UpadhyaySB12,
  author       = {Alok Upadhyay and
                  Jajati Keshari Sahoo and
                  Vibhor Bajpai},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {A novel architecture for secure communications in mobile systems},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {801--805},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470930/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/UpadhyaySB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VidovicK12,
  author       = {Maja Vidovic and
                  Josip Kolic},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Are contemporary trade unions utilizing the opportunities for revival
                  presented by internet technology? {A} comparison of Croatian, {UK}
                  and {USA} practice},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {569--574},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470876/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VidovicK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WalshRF12,
  author       = {Jerry Walsh and
                  Donogh Roche and
                  Franclin S. Foping},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {NitroScript: {A} {PHP} template engine for customizing of e-commerce
                  applications},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {459--464},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470850/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WalshRF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WangLCC12,
  author       = {Zhe Wang and
                  Xiaodong Liu and
                  Kevin Chalmers and
                  Guojian Cheng},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Evolution pattern for Service Evolution in Clouds},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {704--709},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470908/},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WangLCC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WileyC12,
  author       = {Jeffrey J. Wiley and
                  Frank P. Coyle},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Semantic hedgehog for log analysis},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {748--752},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470918/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WileyC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/XuSS12,
  author       = {Junfeng Xu and
                  Bo Sun and
                  Chengxiang Si},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {The survey of cache management in the shared storage environment},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {139--142},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470885/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/XuSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YkhlefA12,
  author       = {Mourad Ykhlef and
                  Abeer AlDayel},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Query paraphrasing using genetic approach for intelligent information
                  retrieval},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {699--703},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470907/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YkhlefA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YoshidaW12,
  author       = {Kotaro Yoshida and
                  Yodai Watanabe},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Security of audio secret sharing scheme encrypting audio secrets},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {294--295},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470962/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YoshidaW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YusofS12,
  author       = {Rozita Mohd Yusof and
                  Norrozila Sulaiman},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Multi-probes fusion framework for matching simultaneous latent impressions},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {564--567},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470874/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YusofS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZaniBA12,
  author       = {Tafta Zani and
                  Ari Moesriami Barmawi and
                  Maman Abdurohman},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Securing Elliptic Curve based El-Gamal against Pollard Rho attack
                  using Elliptic Curve based Diffie-Hellman Key Exchange},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {505--512},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470860/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZaniBA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhangCS12,
  author       = {Gaozheng Zhang and
                  Mengdong Chen and
                  Mou Shen},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Authorization model of {SSO} for a distributed environment based on
                  the attributes},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {784--789},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470925/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhangCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZwattendorferT12,
  author       = {Bernd Zwattendorfer and
                  Arne Tauber},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {Secure cross-cloud single sign-on {(SSO)} using eIDs},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {150--155},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470933/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZwattendorferT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2012,
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6459616/proceeding},
  isbn         = {978-1-4673-5325-0},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbbadiN11,
  author       = {Imad M. Abbadi and
                  Cornelius Namiluko},
  title        = {Dynamics of trust in Clouds - Challenges and research agenda},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {110--115},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148362/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbbadiN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbbadiNM11,
  author       = {Imad M. Abbadi and
                  Cornelius Namiluko and
                  Andrew P. Martin},
  title        = {Insiders analysis in Cloud computing focusing on home healthcare system},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {350--357},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148464/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbbadiNM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdelhalimEAE11,
  author       = {Mohamed B. Abdelhalim and
                  Mohamed S. El{-}Mahallawy and
                  M. Ayyad and
                  Adel ElHennawy},
  title        = {Implementation of a modified lightweight cryptographic {TEA} algorithm
                  in {RFID} system},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {509--513},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148491/},
  timestamp    = {Sun, 27 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdelhalimEAE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdlrudhaN11,
  author       = {Hadi H. Abdlrudha and
                  Qassim Nasir},
  title        = {Low complexity high security image encryption based on Nested {PWLCM}
                  Chaotic Map},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {220--225},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148381/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdlrudhaN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdouliBY11,
  author       = {Ameera Salem Abdouli and
                  Joonsang Baek and
                  Chan Yeob Yeun},
  title        = {Survey on computationally hard problems and their applications to
                  cryptography},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {46--52},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148358/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdouliBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Abyaneh11,
  author       = {Mohammad Reza Sohizadeh Abyaneh},
  title        = {On the privacy of two tag ownership transfer protocols for RFIDs},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {683--688},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148420/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Abyaneh11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AhmadBACC11,
  author       = {Kassem Ahmad and
                  Bassem Bakhache and
                  Safwan El Assad and
                  Daniel Caragata and
                  Maryline Chetto},
  title        = {Multicast security protocol over satellite {DVB} based on chaotic
                  sequences},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {97--102},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148377/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AhmadBACC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AkramTK11,
  author       = {Muhammad Usman Akram and
                  Anam Tariq and
                  Shoab Ahmad Khan},
  title        = {Retinal recognition: Personal identification using blood vessels},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {180--184},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148446/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AkramTK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-DuwairiKA11,
  author       = {Basheer Al{-}Duwairi and
                  I. Khater and
                  Omar M. Al{-}Jarrah},
  title        = {Texture Analysis-Based Image Spam Filtering},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {288--293},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148459/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-DuwairiKA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-HamadiYZAG11,
  author       = {Hussam M. N. Al Hamadi and
                  Chan Yeob Yeun and
                  Mohamed Jamal Zemerly and
                  Mahmoud Al{-}Qutayri and
                  Amjad Gawanmeh},
  title        = {Formal modeling and verification of {DLK} protocol},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {578--583},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148402/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-HamadiYZAG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-SomaniH11,
  author       = {Turki F. Al{-}Somani and
                  Hilal Houssain},
  title        = {Implementation of GF(2\({}^{\mbox{m}}\)) Elliptic Curve cryptoprocessor
                  on a Nano {FPGA}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {7--12},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148351/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-SomaniH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlMarashdaASM11,
  author       = {Khalfan AlMarashda and
                  Yousuf Alsalami and
                  Khaled Salah and
                  Thomas Martin},
  title        = {On the security of inclusion or omission of MixColumns in {AES} cipher},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {34--39},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148356/},
  timestamp    = {Wed, 26 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlMarashdaASM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlShamsiAS11,
  author       = {Amna AlDahak AlShamsi and
                  M. AlMarzouqi and
                  Lakmal D. Seneviratne},
  title        = {Evaluating USARSim for use in fire search and rescue},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {556--561},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148398/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlShamsiAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlahmadZHWAS11,
  author       = {Mahmoud A. Alahmad and
                  Muhammad F. Zulfiqar and
                  Hosen Hasna and
                  Timothy Wisnieski and
                  Nasser A. Aljuhaishi and
                  Hamid Sharif},
  title        = {Technologies enabling sustainability in the built environment},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {701--706},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148423/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlahmadZHWAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlbalooshiMA11,
  author       = {Noora Albalooshi and
                  Nader Mohamed and
                  Jameela Al{-}Jaroodi},
  title        = {The challenges of Arabic language use on the Internet},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {378--382},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148469/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlbalooshiMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlipourSN11,
  author       = {Hadiseh Seyyed Alipour and
                  Mehdi Sabbari and
                  Eslam Nazemi},
  title        = {A policy based access control model for web services},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {472--477},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148484/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlipourSN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmeiriS11,
  author       = {Faisal Al Ameiri and
                  Khaled Salah},
  title        = {Evaluation of popular application sandboxing},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {358--362},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148465/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmeiriS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmeiriZM11,
  author       = {Faisal Al Ameiri and
                  Mohamed Jamal Zemerly and
                  Mohamed Al Marzouqi},
  title        = {Mobile Arabic sign language},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {363--367},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148466/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmeiriZM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AminARNSA11,
  author       = {Asjad Amin and
                  Haseeb Ahmed and
                  Abubakar Rafique and
                  Muhammad Junaid Nawaz and
                  Muhammad Salahudin and
                  Zulfiqar Ahmed},
  title        = {Designing a hierarchical {DHCP} server's model to automatically provide
                  dedicated {IP} address anywhere in the world with mobility},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {250--253},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148452/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AminARNSA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AminQJHA11,
  author       = {Asjad Amin and
                  Haseeb Ahmad Qureshi and
                  Muhammad Junaid Nawaz and
                  Muhammad Yasir Habib and
                  Waqas Anjum},
  title        = {Modified run length encoding scheme with introduction of bit stuffing
                  for efficient data compression},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {668--672},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148417/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AminQJHA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AnghelescuII11,
  author       = {Petre Anghelescu and
                  Silviu Ionita and
                  Vasile{-}Gabriel Iana},
  title        = {{FPGA} implementation of cellular automata based encryption algorithm
                  for internet communications},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {208--213},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148379/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AnghelescuII11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArakawaS11,
  author       = {Jumpei Arakawa and
                  Koichi Sasada},
  title        = {A decentralized access control mechanism using authorization certificate
                  for distributed file systems},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {148--153},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148371/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ArakawaS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AsllaniA11,
  author       = {Arben Asllani and
                  Amjad Ali},
  title        = {Securing information systems in airports: {A} practical approach},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {314--318},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148385/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AsllaniA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AyedG11,
  author       = {Ghazi Ben Ayed and
                  Solange Ghernaouti{-}Helie},
  title        = {Privacy requirements specification for digital identity management
                  systems implementation: Towards a digital society of privacy},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {602--607},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148406/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AyedG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BassilEKC11,
  author       = {Ramzi Bassil and
                  Wissam El{-}Beaino and
                  Ayman I. Kayssi and
                  Ali Chehab},
  title        = {A PUF-based ultra-lightweight mutual-authentication {RFID} protocol},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {495--499},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148488/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BassilEKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BavafaHN11,
  author       = {M. Bavafa and
                  Zahra Taheri Hanjani and
                  N. Navidi},
  title        = {A survey on space-time {\&} high-rate redundant},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {154--158},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148372/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BavafaHN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BazarganYZ11,
  author       = {Fatma Ahmad Bazargan and
                  Chan Yeob Yeun and
                  Mohamed Jamal Zemerly},
  title        = {Understanding the security challenges of virtualized environments},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {67--72},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148441/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BazarganYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BelaqzizFAP11,
  author       = {Salwa Belaqziz and
                  Abdelaziz El Fazziki and
                  Mohammed El Adnani and
                  Michel Le Page},
  title        = {An Agent-Based Modeling approach for decision-making in Gravity Irrigation
                  Systems},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {673--680},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148418/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BelaqzizFAP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BenferhatBO11,
  author       = {Salem Benferhat and
                  Khalid Bouriche and
                  Mohamed Ouzarf},
  title        = {Encoding default-based SELinux-security policy in Organization-Based
                  Access Control Model},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {608--613},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148407/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BenferhatBO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Bilski11,
  author       = {Tomasz Bilski},
  title        = {Security-functionality tradeoffs in {IP} transition phase},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {632--638},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148411/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Bilski11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BoschM11,
  author       = {Thomas Bosch and
                  Brigitte Mathiak},
  title        = {{XSLT} transformation generating {OWL} ontologies automatically based
                  on {XML} Schemas},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {660--667},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148416/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BoschM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BoudguigaL11,
  author       = {Aymen Boudguiga and
                  Maryline Laurent},
  title        = {An {EAP} ID-based authentication method for wireless networks},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {232--239},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148383/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BoudguigaL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CaragataASA11,
  author       = {Daniel Caragata and
                  Safwan El Assad and
                  Charles A. Shoniregun and
                  Galyna A. Akmayeva},
  title        = {{UMTS} security: Enhancement of identification, authentication and
                  key agreement protocols},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {278--282},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148457/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CaragataASA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChettoGC11,
  author       = {Maryline Chetto and
                  Hussein El Ghor and
                  Rafic Hage Chehade},
  title        = {Real-time scheduling for energy harvesting sensors},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {396--402},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148472/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChettoGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Choudhary11,
  author       = {Abdur Rahim Choudhary},
  title        = {Policy rule-sets for policy based systems},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {572--577},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148401/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Choudhary11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CotB11,
  author       = {L{\'{e}}a D. Cot and
                  Christian B{\`{e}}s},
  title        = {Study of the robustness of an enhanced {CSK} system by using the Extended
                  Kalman Filter},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {202--207},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148378/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CotB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DaikporA11,
  author       = {Michael Naseimo Daikpor and
                  Oluwole Adegbenro},
  title        = {Concurrent realization of the multiply-by-7 Elliptic Curve Scalar
                  Multiplication algorithm},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {797--804},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148440/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DaikporA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DeMottEP11,
  author       = {Jared D. DeMott and
                  Richard J. Enbody and
                  William F. Punch III},
  title        = {Towards an automatic exploit pipeline},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {323--329},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148387/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DeMottEP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EbriBY11,
  author       = {Noura Al Ebri and
                  Joonsang Baek and
                  Chan Yeob Yeun},
  title        = {Study on Secret Sharing Schemes {(SSS)} and their applications},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {40--45},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148357/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/EbriBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EkbergYL11,
  author       = {Jarkko Ekberg and
                  Jorma Ylinen and
                  Pekka Loula},
  title        = {Network behaviour anomaly detection using Holt-Winters algorithm},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {627--631},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148410/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/EkbergYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ElmoghanyDKKSS11,
  author       = {Mohamed Elmoghany and
                  Mohamed Diab and
                  Moustafa Kassem and
                  Mustafa Khairallah and
                  Omar El Shahat and
                  Wael Sharkasy},
  title        = {{FPGA} implementation of high speed {XTS-AES} for data storage devices},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {25--28},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148354/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ElmoghanyDKKSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Eswari11,
  author       = {P. R. Lakshmi Eswari},
  title        = {A process framework for securing an e-Learning ecosystem},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {403--407},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148473/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Eswari11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FarooqiN11,
  author       = {Norah Farooqi and
                  Siobh{\'{a}}n North},
  title        = {Trust-based access control for {XML} databases},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {764--765},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148434/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FarooqiN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FattahEIA11,
  author       = {Amr Sayed Abdel Fattah and
                  Salwa H. El{-}Ramly and
                  Magdy M. Ibrahim and
                  Ahmed Abdel{-}Hafez},
  title        = {Synchronization recovery of chaotic signal through imperfect channel
                  using optimization approach},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {73--78},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148442/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FattahEIA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FattahEIA11a,
  author       = {Amr Sayed Abdel Fattah and
                  Salwa H. El{-}Ramly and
                  Magdy M. Ibrahim and
                  Ahmed Abdel{-}Hafez},
  title        = {Denoising algorithm for noisy chaotic signal by using wavelet transform:
                  Comprehensive study},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {79--85},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148443/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FattahEIA11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Fournier-PrunaretCG11,
  author       = {Daniele Fournier{-}Prunaret and
                  Pascal Charg{\'{e}} and
                  Laura Gardini},
  title        = {Chaos generation from 1D or 2D circuits including switches},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {86--90},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148375/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Fournier-PrunaretCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Francis11,
  author       = {Tina Francis},
  title        = {Proximity aware overlays in peer-to-peer networks},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {341--344},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148462/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Francis11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GahiGGE11,
  author       = {Youssef Gahi and
                  Mouhcine Guennoun and
                  Zouhair Guennoun and
                  Khalil El{-}Khatib},
  title        = {Encrypted processes for oblivious data retrieval},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {514--518},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148390/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GahiGGE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GarmehiA11,
  author       = {Mehran Garmehi and
                  Morteza Analoui},
  title        = {An economical mechanism for multicasting of content among servers
                  of Hybrid {CDN-P2P} networks},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {566--571},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148400/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GarmehiA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GawanmehT11,
  author       = {Amjad Gawanmeh and
                  Sofi{\`{e}}ne Tahar},
  title        = {Modeling and verification of firewall configurations using domain
                  restriction method},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {642--647},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148413/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GawanmehT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GruberFTSG11,
  author       = {Markus Gruber and
                  Florian Fankhauser and
                  Stefan Taber and
                  Christian Schanes and
                  Thomas Grechenig},
  title        = {Trapping and analyzing malicious VoIP traffic using a honeynet approach},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {442--447},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148479/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GruberFTSG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GuelpeliGB11,
  author       = {Marcus Vinicius Carvalho Guelpeli and
                  Ana Cristina Bicharra Garcia and
                  Ant{\'{o}}nio Horta Branco},
  title        = {The process of summarization in the pre-processing stage in order
                  to improve measurement of texts when clustering},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {388--395},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148471/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GuelpeliGB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HalboobAA11,
  author       = {Waleed Halboob and
                  Muhammad Abulaish and
                  Khaled Alghathbar},
  title        = {Quaternary privacy-levels preservation in computer forensics investigation
                  process},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {777--782},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148437/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HalboobAA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HanafyNA11,
  author       = {Ayman A. Hanafy and
                  Sherif Hazem Noureldin and
                  Marianne A. Azer},
  title        = {Immunizing the {SAODV} protocol against routing information disclosure},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {330--334},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148388/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HanafyNA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HaronN11,
  author       = {Galoh Rashidah Haron and
                  Kang Siong Ng},
  title        = {Extrapolating security requirements to an established software process:
                  Version 1.0},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {752--757},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148432/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HaronN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HasselbachA11,
  author       = {Jens Hasselbach and
                  Patrick Aichroth},
  title        = {Access control and content authentication for hybrid {DVB-T2/P2P}
                  broadcasting},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {448--453},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148480/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HasselbachA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Hildmann11,
  author       = {Hanno Hildmann},
  title        = {Behavioural game {AI} - {A} theoretical approach},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {550--555},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148397/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Hildmann11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HildmannNS11,
  author       = {Hanno Hildmann and
                  Sebastien Nicolas and
                  Fabrice Saffre},
  title        = {Critical infrastructure protection through distributed reactive demand-side
                  management},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {294--301},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148460/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HildmannNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HildmannNS11a,
  author       = {Hanno Hildmann and
                  Sebastien Nicolas and
                  Fabrice Saffre},
  title        = {Demand-side management for air conditioning},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {519--524},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148391/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HildmannNS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HirschN11,
  author       = {Benjamin Hirsch and
                  Jason W. P. Ng},
  title        = {Education beyond the cloud: Anytime-anywhere learning in a smart campus
                  environment},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {718--723},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148426/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HirschN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HousaniBY11,
  author       = {Hajer Al Housani and
                  Joonsang Baek and
                  Chan Yeob Yeun},
  title        = {Survey on certificateless public key cryptography},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {53--58},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148359/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HousaniBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HoussainBA11,
  author       = {Hilal Houssain and
                  Mohamad Badra and
                  Turki F. Al{-}Somani},
  title        = {Hardware implementations of Elliptic Curve Cryptography in Wireless
                  Sensor Networks},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148350/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HoussainBA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HuSWRL11,
  author       = {Xin Hu and
                  Yonglin Sun and
                  Yongjun Wang and
                  Zhanrui Ren and
                  Jie Liu},
  title        = {Two algorithms for Network Security Gradient marking},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {142--147},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148370/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HuSWRL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HughesAH11,
  author       = {G. Hughes and
                  Dhiya Al{-}Jumeily and
                  Abir Jaafar Hussain},
  title        = {Research, design and development review of the Cloud Computing Management
                  System {(CCMS)}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {128--131},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148365/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HughesAH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IonescuATMS11,
  author       = {Laurentiu Ionescu and
                  Constantin Anton and
                  Ion Tutanescu and
                  Alin Mazare and
                  Gheorghe Serban},
  title        = {Reed-Muller decoder with associative memories},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {274--277},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148456/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IonescuATMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IrfanYH11,
  author       = {Nazish Irfan and
                  Mustapha C. E. Yagoub and
                  Khelifa Hettak},
  title        = {Redundant reader elimination for directional antenna in {RFID} systems},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {695--700},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148422/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IrfanYH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JeyalathaV11,
  author       = {S. Jeyalatha and
                  B. Vijayakumar},
  title        = {Design and implementation of a web structure mining algorithm using
                  breadth first search strategy for academic search application},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {648--654},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148414/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JeyalathaV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JungKGUK11,
  author       = {Markus Jung and
                  Georg Kienesberger and
                  Wolfgang Granzer and
                  Martin Unger and
                  Wolfgang Kastner},
  title        = {Privacy enabled web service access control using {SAML} and {XACML}
                  for home automation gateways},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {584--591},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148403/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JungKGUK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JuniorTTN11,
  author       = {Fl{\'{a}}vio Dumortout de Mendon{\c{c}}a J{\'{u}}nior and
                  Daniela Gorski Trevisan and
                  Thiago Cortat Tavares and
                  Jos{\'{e}} Luiz Thomaselli Nogueira},
  title        = {A-CitizenMobile: {A} case study for blind users},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {713--717},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148425/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JuniorTTN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhanK11,
  author       = {Maleika Heenaye{-}Mamode Khan and
                  Naushad Mamode Khan},
  title        = {Dorsal hand vein biometric using Independent Component Analysis {(ICA)}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {191--195},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148448/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KhanK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhonjiIJ11,
  author       = {Mahmoud Khonji and
                  Youssef Iraqi and
                  Andrew Jones},
  title        = {Mitigation of spear phishing attacks: {A} Content-based Authorship
                  Identification framework},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {416--421},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148475/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KhonjiIJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhonjiIJ11a,
  author       = {Mahmoud Khonji and
                  Youssef Iraqi and
                  Andrew Jones},
  title        = {Lexical {URL} analysis for discriminating phishing and legitimate
                  e-mail messages},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {422--427},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148476/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KhonjiIJ11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimC11,
  author       = {Woo Ram Kim and
                  Yoon Seok Chang},
  title        = {A study on {RFID} code structure for traceability system of electric
                  vehicle batteries},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {490--494},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148487/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimLLP11,
  author       = {Jung{-}Tae Tae Kim and
                  Jong{-}Hoon Hoon Lee and
                  HeeKyung Lee and
                  Eui{-}Hyun H. Paik},
  title        = {Location-based personalized social media service for the Smart Phone:
                  Distributed social contents sharings},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {655--659},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148415/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimLLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Kuba11,
  author       = {Martin Kuba},
  title        = {Automated trust negotiation in identity federations using OWL-based
                  abduction of missing credentials},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {164--169},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148374/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Kuba11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LailaSI11,
  author       = {Umm{-}e Laila and
                  Syed Zain Ali Shah and
                  Nadia Ishaque},
  title        = {Using Keystroke-Level Model to analyze {IOS} optimization techniques},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {373--377},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148468/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LailaSI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LeeKLP11,
  author       = {Jong{-}Hoon Hoon Lee and
                  Jung{-}Tae Tae Kim and
                  HeeKyung Lee and
                  Eui{-}Hyun H. Paik},
  title        = {Design and implementation of the Geo-Context Engine for semantic social
                  media service},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {383--387},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148470/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LeeKLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LimC11,
  author       = {Hun{-}lung Lim and
                  Tai{-}Myoung Myoung Chung},
  title        = {Performace evaluation of relative positioning based on low-cost {GPS}
                  and {VANET}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {542--543},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148395/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LimC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LingL11,
  author       = {Lezhen Ling and
                  Junguo Liao},
  title        = {Anonymous electronic voting protocol with traceability},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {59--66},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148360/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LingL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LoRW11,
  author       = {Nai{-}Wei Lo and
                  Shiou{-}Huei Ruan and
                  Tzong{-}Chen Wu},
  title        = {Ownership transfer protocol for {RFID} objects using lightweight computing
                  operators},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {484--489},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148486/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LoRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LozhnikovC11,
  author       = {Pavel Lozhnikov and
                  Oksana Chernikova},
  title        = {Handwriting dynamics as a means of authentication},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {176--179},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148445/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LozhnikovC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LoziC11,
  author       = {Ren{\'{e}} Lozi and
                  Estelle Cherrier},
  title        = {Noise-resisting ciphering based on a chaotic multi-stream pseudo-random
                  number generator},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {91--96},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148376/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LoziC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MahmoodD11,
  author       = {Ahmed B. Mahmood and
                  Robert D. Dony},
  title        = {Segmentation based encryption method for medical images},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {596--601},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148405/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MahmoodD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MalikH11,
  author       = {Sheheryar Malik and
                  Fabrice Huet},
  title        = {Virtual Cloud: Rent Out the Rented Resources},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {536--541},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148394/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MalikH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MamaghaniM11,
  author       = {Ali Safari Mamaghani and
                  Mohammad Reza Meybodi},
  title        = {An application of Imperialist Competitive Algorithm to solve the quadratic
                  assignment problem},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {562--565},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148399/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MamaghaniM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Mar11,
  author       = {Kheng Kok Mar},
  title        = {Secured Virtual Diffused File System for the cloud},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {116--121},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148363/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Mar11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MarkscheffelBF11,
  author       = {Bernd Markscheffel and
                  Daniela B{\"{u}}ttner and
                  Daniel Fischer},
  title        = {Desktop search engines - {A} state of the art comparison},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {707--712},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148424/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MarkscheffelBF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MarzouqiSAY11,
  author       = {Hamad Marzouqi and
                  Khaled Salah and
                  Mahmoud Al{-}Qutayri and
                  Chan Yeob Yeun},
  title        = {A unified countermeasure against side channel attacks on cryptographic
                  {RFID}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {13--18},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148352/},
  timestamp    = {Fri, 17 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/MarzouqiSAY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MazroueiN11,
  author       = {Maitha Salem Al Mazrouei and
                  Sundaravalli Narayanaswami},
  title        = {Mobile adhoc networks: {A} simulation based security evaluation and
                  intrusion prevention},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {308--313},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148384/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MazroueiN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MehrnejadBHT11,
  author       = {Maryam Mehrnejad and
                  Abbas Ghaemi Bafghi and
                  Ahad Harati and
                  Ehsan Toreini},
  title        = {Multiple {SEIMCHA:} Multiple semantic image {CAPTCHA}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {196--201},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148449/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MehrnejadBHT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MiC11,
  author       = {Bo Mi and
                  Jianqiu Cao},
  title        = {A novel key establishment scheme for wireless sensor networks based
                  on complex network synchronization},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {137--141},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148369/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MiC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MouradOYB11,
  author       = {Azzam Mourad and
                  Hadi Otrok and
                  Hamdi Yahyaoui and
                  Lama Baajour},
  title        = {Toward an abstract language on top of {XACML} for web services security},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {254--259},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148453/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MouradOYB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MukaddamE11,
  author       = {Ayman Mukaddam and
                  Imad H. Elhajj},
  title        = {Hop count variability},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {240--244},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148450/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MukaddamE11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MutawaABM11,
  author       = {Noora Al Mutawa and
                  Ibtesam Al Awadhi and
                  Ibrahim M. Baggili and
                  Andrew Marrington},
  title        = {Forensic artifacts of Facebook's instant messaging service},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {771--776},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148436/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MutawaABM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NarhimeneM11,
  author       = {Boustia Narhimene and
                  A{\"{\i}}cha Mokhtari},
  title        = {Temporal context in multilevel access control model},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {758--763},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148433/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NarhimeneM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NassrS11,
  author       = {Nezar Nassr and
                  Eric Steegmans},
  title        = {A parameterized {RBAC} access control model for {WS-BPEL} orchestrated
                  composite web services},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {122--127},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148364/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NassrS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NoponenSSK11,
  author       = {Sami Noponen and
                  Jarno Salonen and
                  Hanna{-}Miina Sihvonen and
                  Taina A. Kurki},
  title        = {Systematic literature review of virtual role},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {738--743},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148430/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NoponenSSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NouraAVC11,
  author       = {Hassan Noura and
                  Safwan El Assad and
                  Calin Vladeanu and
                  Daniel Caragata},
  title        = {An efficient and secure {SPN} cryptosystem based on chaotic control
                  parameters},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {226--231},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148382/},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/NouraAVC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ObaidliI11,
  author       = {Hanan Al Obaidli and
                  Asif Iqbal},
  title        = {Digital forensics education in {UAE}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {766--770},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148435/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ObaidliI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Oreku11,
  author       = {George S. Oreku},
  title        = {Key complication procedure in data driven ciphers based on controlled
                  substitution-permutation networks},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {368--372},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148467/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Oreku11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PoonO11,
  author       = {Kin Fai Poon and
                  Anis Ouali},
  title        = {A {MILP} based design tool for {FTTH} access networks with consideration
                  of demand growth},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {544--549},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148396/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PoonO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RahimiaslA11,
  author       = {Farshad Rahimiasl and
                  Reza Azmi},
  title        = {SeKMAC: {A} secure model for key management and access control in
                  cryptographic file system},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {732--737},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148429/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RahimiaslA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RochaSN11,
  author       = {Eduardo Rocha and
                  Paulo Salvador and
                  Ant{\'{o}}nio Manuel Duarte Nogueira},
  title        = {A real-time traffic classification approach},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {620--626},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148409/},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RochaSN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaabIKCG11,
  author       = {Soulaf Saab and
                  Wassim Itani and
                  Ayman I. Kayssi and
                  Ali Chehab and
                  Cesar Ghali},
  title        = {Secure delay-tolerant communications in the presence of oppressive
                  governments},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {302--307},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148461/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SaabIKCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaabKC11,
  author       = {Salwa Adriana Saab and
                  Ayman I. Kayssi and
                  Ali Chehab},
  title        = {A decentralized energy-aware key management scheme for Wireless Sensor
                  Networks},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {504--508},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148490/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SaabKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SabeehL11,
  author       = {Ahmed A. Sabeeh and
                  Arash Habibi Lashkari},
  title        = {Users' perceptions on mobile devices security awareness in Malaysia},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {428--435},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148477/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SabeehL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Sadok11,
  author       = {Hicham Sadok},
  title        = {E-Banking in Morocco: Study of some specifying factors},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {726--731},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148428/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Sadok11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaeedW11,
  author       = {Muhammad Qasim Saeed and
                  Colin D. Walter},
  title        = {A Record Composition/Decomposition attack on the {NDEF} Signature
                  Record Type Definition},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {283--287},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148458/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SaeedW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaetentVC11,
  author       = {Jane Saetent and
                  Nattawut Vejkanchana and
                  Suphamit Chittayasothorn},
  title        = {A thin client application development using {OCL} and conceptual schema},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {260--265},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148454/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SaetentVC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SafkhaniBN11,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi},
  title        = {Vulnerabilities in a new {RFID} access control protocol},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {500--503},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148489/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SafkhaniBN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SafkhaniBNS11,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi and
                  Somitra Kumar Sanadhya},
  title        = {Security analysis of LMAP\({}^{\mbox{++}}\), an {RFID} authentication
                  protocol},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {689--694},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148421/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SafkhaniBNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaidGMA11,
  author       = {Huwida Said and
                  M{\'{a}}rio A. M. Guimar{\~{a}}es and
                  Noora Al Mutawa and
                  Ibtesam Al Awadhi},
  title        = {Forensics and war-driving on unsecured wireless network},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {19--24},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148353/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SaidGMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SalahAASB11,
  author       = {Khaled Salah and
                  M. Al{-}Saba and
                  M. Akhdhor and
                  O. Shaaban and
                  M. I. Buhari},
  title        = {Performance evaluation of popular Cloud IaaS providers},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {345--349},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148463/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SalahAASB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SalehiSD11,
  author       = {Mahmood Salehi and
                  Hamed Samavati and
                  Mehdi Dehghan},
  title        = {Performance assessment of {OLSR} protocol under routing attacks},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {791--796},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148439/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SalehiSD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ScottB11,
  author       = {Kris Scott and
                  Rachid Benlamri},
  title        = {Context-aware real-time framework for local collaboration},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {531--535},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148393/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ScottB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShaikhH11,
  author       = {Farhan Bashir Shaikh and
                  Sajjad Haider},
  title        = {Security threats in cloud computing},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {214--219},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148380/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShaikhH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShakeriB11,
  author       = {Hassan Shakeri and
                  Abbas Ghaemi Bafghi},
  title        = {Propagation of trust and confidence using intervals},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {436--441},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148478/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShakeriB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Shamseldin11,
  author       = {Ramez Shamseldin},
  title        = {Dynamically complex system using adaptive simulation for interconnected
                  nodes},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {266--273},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148455/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Shamseldin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShehhiBY11,
  author       = {Muna Abdulla Al Shehhi and
                  Joonsang Baek and
                  Chan Yeob Yeun},
  title        = {The use of Boolean functions in stream ciphers},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {29--33},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148355/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShehhiBY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShinKI11,
  author       = {SeongHan Shin and
                  Kazukuni Kobara and
                  Hideki Imai},
  title        = {A secure public cloud storage system},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {103--109},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148361/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShinKI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShresthaHMPS11,
  author       = {Pradhumna Shrestha and
                  Michael Hempel and
                  Tao Ma and
                  Dongming Peng and
                  Hamid Sharif},
  title        = {A general attack method for steganography removal using Pseudo-CFA
                  re-interpolation},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {454--459},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148481/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShresthaHMPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SoldatoLMV11,
  author       = {Arianna Del Soldato and
                  Pasquale Lazzareschi and
                  Maurizio Martinelli and
                  Giuseppe Vasarelli},
  title        = {The use of detection systems to improve the quality of the Italian
                  Public Administration},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {724--725},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148427/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SoldatoLMV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SouthernOS11,
  author       = {Eric Southern and
                  Abdelkader H. Ouda and
                  Abdallah Shami},
  title        = {Solutions to security issues with legacy integration of {GSM} into
                  {UMTS}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {614--619},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148408/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SouthernOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SunWHRL11,
  author       = {Yonglin Sun and
                  Yongjun Wang and
                  Xin Hu and
                  Zhanrui Ren and
                  Jie Liu},
  title        = {A new perspective of network vulnerability analysis using Network
                  Security Gradient},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {159--163},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148373/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SunWHRL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SureshM11,
  author       = {Nitha Rachel Suresh and
                  Suresh V. Mathew},
  title        = {Security concerns for cloud computing in aircraft data networks},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {132--136},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148366/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SureshM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TaheriZ11,
  author       = {Mohammad Moein Taheri and
                  Kamran Zamanifar},
  title        = {2-phase optimization method for energy aware scheduling of virtual
                  machines in cloud data centers},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {525--530},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148392/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TaheriZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TairZAL11,
  author       = {Hend Al Tair and
                  Mohamed Jamal Zemerly and
                  Mahmoud Al{-}Qutayri and
                  Marcello Leida},
  title        = {Pro-active multi-agent recommender system for travelers},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {466--471},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148483/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TairZAL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TariqAK11,
  author       = {Anam Tariq and
                  Muhammad Usman Akram and
                  Shoab Ahmad Khan},
  title        = {An automated system for fingerprint classification using singular
                  points for biometric security},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {170--175},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148444/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TariqAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ToreiniM11,
  author       = {Ehsan Toreini and
                  Maryam Mehrnejad},
  title        = {A novel method in fuzzy data clustering based on chaotic {PSO}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {335--340},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148389/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ToreiniM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Tripathi11,
  author       = {Devendra Mani Tripathi},
  title        = {A note on modified {SET} protocol for mobile payment},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {639--641},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148412/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Tripathi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TsenovMT11,
  author       = {Georgi T. Tsenov and
                  Valeri M. Mladenov and
                  Ina Taralova},
  title        = {Synchronization of Sigma Delta Modulators},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {319--322},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148386/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TsenovMT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Tzouramanis11,
  author       = {Theodoros Tzouramanis},
  title        = {A robust watermarking scheme for relational databases},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {783--790},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148438/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Tzouramanis11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WangN11,
  author       = {Gang Wang and
                  Kunming Nie},
  title        = {A framework of VI-based ranking and recommendation of web services},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {478--483},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148485/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WangN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WillemsKRCM11,
  author       = {Christian Willems and
                  Thomas Klingbeil and
                  Lukas Radvilavicius and
                  Antanas Cenys and
                  Christoph Meinel},
  title        = {A distributed virtual laboratory architecture for cybersecurity training},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {408--415},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148474/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WillemsKRCM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YamamuraOFI11,
  author       = {Chigusa Yamamura and
                  Kazuhiro Otsuki and
                  Arisa Fujii and
                  Kiyohiko Ishikawa},
  title        = {Identity management architecture for integrated personalized service
                  on {TV}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {681--682},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148419/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YamamuraOFI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Yoshimura11,
  author       = {Hiroyuki Yoshimura},
  title        = {Fingerprint templates with high recognition accuracy and high security
                  generated by discrete fractional sine transform},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {185--190},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148447/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Yoshimura11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZayedODC11,
  author       = {Mohamed Zayed and
                  Asma Ouari and
                  Meriem Derraschouk and
                  Youcef Chibani},
  title        = {An effective hybrid thresholding technique for degraded documents
                  images binarization},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {460--465},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148482/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZayedODC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhangLD11,
  author       = {Xian Zhang and
                  Martin Leucker and
                  Wei Dong},
  title        = {An event pattern language for runtime monitoring based on {AOP}},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {744--751},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148431/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhangLD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Zineddine11,
  author       = {Mhamed Zineddine},
  title        = {Automated healthcare information privacy and security: {UAE} case},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {592--595},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148404/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Zineddine11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZisiadisKVT11,
  author       = {Dimitris Zisiadis and
                  Spyros Kopsidas and
                  Argyris Varalis and
                  Leandros Tassiulas},
  title        = {Mailbook: {A} social network against spamming},
  booktitle    = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  pages        = {245--249},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/document/6148451/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZisiadisKVT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2011,
  title        = {6th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6141531/proceeding},
  isbn         = {978-1-908320-00-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbdelhaqAAA10,
  author       = {Abdelhaq Belkadi and
                  Abdelaziz El Fazziki and
                  Ait Ouahman Abdallah and
                  Ibourk Aomar},
  title        = {Toward an agent based approach for decisional systems modeling},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678115/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbdelhaqAAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AhmadAA10,
  author       = {Iftikhar Ahmad and
                  Azween Vitra Abdullah and
                  Abdullah Sharaf Alghamdi},
  title        = {Remote to Local attack detection using supervised neural network},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678110/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AhmadAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AkgunGC10,
  author       = {Mete Akg{\"{u}}n and
                  Ali {\"{O}}zhan G{\"{u}}rel and
                  Mehmet Ufuk {\c{C}}aglayan},
  title        = {Attacks to a lightweight {RFID} mutual authentication protocol},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678039/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AkgunGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-AssamSJ10,
  author       = {Hisham Al{-}Assam and
                  Harin Sellahewa and
                  Sabah Jassim},
  title        = {On security of multi-factor biometric authentication},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678012/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-AssamSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-Fedaghi10,
  author       = {Sabah S. Al{-}Fedaghi},
  title        = {Diagrammatical framework for information system attacks},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678533/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-Fedaghi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-WabilAAA10,
  author       = {Areej Al{-}Wabil and
                  Ebtisam Alabdulqader and
                  Latifa Al{-}Abdulkarim and
                  Nora Al{-}Twairesh},
  title        = {Measuring the user experience of digital books with children: An eyetracking
                  study of interaction with digital libraries},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678025/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-WabilAAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Alaraj10,
  author       = {Abdullah Mohammed Alaraj},
  title        = {Ownership transfer protocol},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678022/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Alaraj10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlghafliY10,
  author       = {Khawla Alghafli and
                  Chan Yeob Yeun},
  title        = {New authentication protocol for {IP} {CAS} of {IPTV}},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678535/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlghafliY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AliSK10,
  author       = {Safdar Ali and
                  Waseem Shahzad and
                  Farrukh Aslam Khan},
  title        = {Remote-to-Local attacks detection using incremental genetic algorithm},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678024/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AliSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Aloul10,
  author       = {Fadi A. Aloul},
  title        = {Information security awareness in {UAE:} {A} survey paper},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678046/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Aloul10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlrouhAG10,
  author       = {Bachar Alrouh and
                  Adel Almohammad and
                  Gheorghita Ghinea},
  title        = {{SOAP} message-based steganography},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678538/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlrouhAG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlzomaiAJ10,
  author       = {Mohammed Alzomai and
                  Bander AlFayyadh and
                  Audun J{\o}sang},
  title        = {Display security for online transactions: SMS-based authentication
                  scheme},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678536/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlzomaiAJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmanK10,
  author       = {Aini Aman and
                  Hasmiah Kasimin},
  title        = {E-government evaluation: The case of e-procurement in Malaysia government},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678549/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmanK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Ayodele10,
  author       = {Taiwo Ayodele},
  title        = {Unsupervised email vector space model {(UEVSM)}},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678093/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Ayodele10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BenelliP10,
  author       = {Giuliano Benelli and
                  Alessandro Pozzebon},
  title        = {An automated payment system for car parks based on Near Field Communication
                  technology},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678029/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BenelliP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BicaTG10,
  author       = {Ion Bica and
                  Mihai Togan and
                  Stefan{-}Vladimir Ghita},
  title        = {Gossip membership protocol for peer-to-peer streaming overlay construction},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678028/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BicaTG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BurghouwtSS10,
  author       = {Pieter Burghouwt and
                  Marcel E. M. Spruit and
                  Henk J. Sips},
  title        = {Detection of botnet collusion by degree distribution of domains},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678103/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BurghouwtSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CaragataRAA10,
  author       = {Daniel Caragata and
                  Anca{-}Livia Radu and
                  Safwan El Assad and
                  Cristian{-}Gabriel Apostol},
  title        = {Chaos based fragile watermarking algorithm for {JPEG} images},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678064/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CaragataRAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChovanecKW10,
  author       = {Peter Chovanec and
                  Michal Kr{\'{a}}tk{\'{y}} and
                  Jir{\'{\i}} Walder},
  title        = {Lossless R-tree compression using variable-length codes},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678116/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChovanecKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CulverhouseGRW10,
  author       = {Mark E. Culverhouse and
                  Bogdan V. Ghita and
                  Paul L. Reynolds and
                  Xingang Wang},
  title        = {Optimising Quality of Service through the controlled aggregation of
                  traffic},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678553/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CulverhouseGRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DominikusAK10,
  author       = {Sandra Dominikus and
                  Manfred Josef Aigner and
                  Stefan Kraxberger},
  title        = {Passive {RFID} technology for the internet of things},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678037/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DominikusAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DucKY10,
  author       = {Dang Nguyen Duc and
                  Kwangjo Kim and
                  Chan Yeob Yeun},
  title        = {Reconsidering Ryu-Takagi {RFID} authentication protocol},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678044/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DucKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EdelmanDS10,
  author       = {Paul T. Edelman and
                  Michael J. Donahoo and
                  David B. Sturgill},
  title        = {Secure group communications for Delay-Tolerant Networks},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678120/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/EdelmanDS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ElDahshanL10,
  author       = {Kamal A. ElDahshan and
                  Hany M. S. Lala},
  title        = {Mining uncertain data warehouse},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678108/},
  timestamp    = {Sun, 29 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ElDahshanL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ElahiKY10,
  author       = {Najeeb Elahi and
                  Randi Karlsen and
                  Waqas Younas},
  title        = {Semantic image annotation with social context},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678026/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ElahiKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EmeboDA10,
  author       = {Onyeka Emebo and
                  Olawande J. Daramola and
                  Charles Ayo},
  title        = {A Grid-based e-learning model for Open Universities},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678119/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/EmeboDA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EpiphaniouMSN10,
  author       = {Gregory Epiphaniou and
                  Carsten Maple and
                  Paul Sant and
                  Peter Norrington},
  title        = {The effects of encryption on VoIP streams under the code-excited linear
                  prediction coder {G.729}},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678023/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/EpiphaniouMSN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EzzatiNCH10,
  author       = {Saeed Ezzati and
                  Hamid Reaza Naji and
                  Amir Chegini and
                  Payam Habibimehr},
  title        = {A new method of hardware firewall implementation on {SOC}},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678545/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/EzzatiNCH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FeldhoferABHPW10,
  author       = {Martin Feldhofer and
                  Manfred Josef Aigner and
                  Thomas Baier and
                  Michael Hutter and
                  Thomas Plos and
                  Erich Wenger},
  title        = {Semi-passive {RFID} development platform for implementing and attacking
                  security tags},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678040/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FeldhoferABHPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GalanAOA10,
  author       = {Elena Castro Gal{\'{a}}n and
                  Almudena Alcaide and
                  Agust{\'{\i}}n Orfila and
                  Jorge Blasco Al{\'{\i}}s},
  title        = {A multi-agent scanner to detect stored-XSS vulnerabilities},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678543/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GalanAOA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GarridoMRG10,
  author       = {Pilar Castro Garrido and
                  Guillermo Matas Miraz and
                  Irene Luque Ruiz and
                  Miguel {\'{A}}ngel G{\'{o}}mez{-}Nieto},
  title        = {Near Field Communication in the development of ubiquitous games},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678018/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GarridoMRG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Habib10,
  author       = {Muhammad Asif Habib},
  title        = {Mutual exclusion and role inheritance affecting least privilege in
                  {RBAC}},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678530/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Habib10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HadiMN10,
  author       = {Fazl{-}e Hadi and
                  Fahad Bin Muhaya and
                  Atif R. Naseer},
  title        = {Secure multimedia communication in wireless mesh networks},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678528/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HadiMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HanMS10,
  author       = {Kyusuk Han and
                  Hyeran Mun and
                  Taeshik Shon},
  title        = {Design of secure key agreement protocol for pairing in {RF4CE}},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678042/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HanMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HatimBB10,
  author       = {Hamid Hatim and
                  Hanane El Bakkali and
                  Ilham Berrada},
  title        = {Workflow access control: From role engineering to task engineering},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678532/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HatimBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HinaAJ10,
  author       = {Saman Hina and
                  Eric Atwell and
                  Owen A. Johnson},
  title        = {Secure information extraction from clinical documents using {SNOMED}
                  {CT} gazetteer and natural language processing},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678112/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HinaAJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Hooper10,
  author       = {Emmanuel Hooper},
  title        = {Strategic and intelligent smart grid systems engineering},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678118/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Hooper10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IonescuATMS10,
  author       = {Laurentiu Ionescu and
                  Constantin Anton and
                  Ion Tutanescu and
                  Alin Mazare and
                  Gheorghe Serban},
  title        = {On a {FPGA} implementation of {BCH} codes},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678091/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IonescuATMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/IskandarS10,
  author       = {Manar Iskandar and
                  Noor Akma Mohd Salleh},
  title        = {{IT} governance in e-commerce environment: Cases from airline industry},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678016/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/IskandarS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JafariMOFO10,
  author       = {Said Jafari and
                  Fredrick Mtenzi and
                  Ciaran O'Driscoll and
                  Ronan Fitzpatrick and
                  Brendan O'Shea},
  title        = {Privacy metrics in ubiquitous computing applications},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678048/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JafariMOFO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JangCKJN10,
  author       = {Dae{-}il Jang and
                  Kang{-}yu Cho and
                  Minsoo Kim and
                  Hyun{-}Chul Jung and
                  Bong{-}Nan Noh},
  title        = {Evasion technique and detection of malicious botnet},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678101/},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/JangCKJN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JayahkudyT10,
  author       = {Usha Jayahkudy and
                  Chong Eng Tan},
  title        = {Link signal strength based path selection scheme for ad hoc networks},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678551/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JayahkudyT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Johnson10,
  author       = {Robert E. Johnson III},
  title        = {Survey of {SCADA} security challenges and potential attack vectors},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678102/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Johnson10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhanAASM10,
  author       = {Zeeshan Shafi Khan and
                  Nabila Akram and
                  Khaled Alghathbar and
                  Muhammad Sher and
                  Rashid Mehmood},
  title        = {Secure single packet {IP} Traceback mechanism to identify the source},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678105/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KhanAASM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KimKJ10,
  author       = {Young Sam Kim and
                  Seung{-}Hyun Hyun Kim and
                  Seung{-}Hun Hun Jin},
  title        = {SRS-based automatic secure device pairing on audio channels},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678019/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KimKJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KrizkaK10,
  author       = {Filip Krizka and
                  Michal Kr{\'{a}}tk{\'{y}}},
  title        = {On the efficient indexing of ordered multidimensional tuples},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678117/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KrizkaK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KusetogullariYLH10,
  author       = {Huseyin Kusetogullari and
                  Amir Yavariabdi and
                  Mark S. Leeson and
                  Evor L. Hines},
  title        = {Genetic algorithm based rainbow network flow optimization for multiple
                  description coding in lossy network},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678113/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KusetogullariYLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LavarackC10,
  author       = {Tristan Lavarack and
                  Marijke Coetzee},
  title        = {A Web Services security policy assistant},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678032/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LavarackC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LeicherSSC10,
  author       = {Andreas Leicher and
                  Andreas U. Schmidt and
                  Yogendra Shah and
                  Inhyok Cha},
  title        = {Trusted Computing enhanced OpenID},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678097/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LeicherSSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LivaniA10,
  author       = {Mohammad Ahmadi Livani and
                  Mahdi Abadi},
  title        = {Distributed PCA-based anomaly detection in wireless sensor networks},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678106/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LivaniA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LupianaMOO10,
  author       = {Dennis M. Lupiana and
                  Fredrick Mtenzi and
                  Ciaran O'Driscoll and
                  Brendan O'Shea},
  title        = {Strictly alphanumeric data: Improving privacy in smart environments},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678045/},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/LupianaMOO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LutzLMHS10,
  author       = {David J. Lutz and
                  Dominik Lamp and
                  Patrick Mandic and
                  Fabio Victora Hecht and
                  Burkhard Stiller},
  title        = {Charging of SAML-based federated VoIP services},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678547/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LutzLMHS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ManamonM10,
  author       = {Conor Mc Manamon and
                  Fredrick Mtenzi},
  title        = {Defending privacy: The development and deployment of a darknet},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678544/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ManamonM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MishraM10,
  author       = {Ravi Bhushan Mishra and
                  Bireshwar Dass Mazumdar},
  title        = {Cognitive parameters based seller agent selection in {B2C} E-Commerce},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678015/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MishraM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MohammedCVHB10,
  author       = {Mohssen M. Z. E. Mohammed and
                  H. Anthony Chan and
                  Neco Ventura and
                  Mohsin Hashim and
                  Eihab Bashier},
  title        = {Fast and accurate detection for polymorphic worms},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678546/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MohammedCVHB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MoritzSM10,
  author       = {Franka Moritz and
                  Maria Siebert and
                  Christoph Meinel},
  title        = {Improving community rating in the tele-lecturing context},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678013/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MoritzSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MunYHC10,
  author       = {Hyeran Mun and
                  Chan Yeob Yeun and
                  Kyusuk Han and
                  Byung{-}Ho Chung},
  title        = {Enhancement of anonymous authentication scheme in wireless sensor
                  network},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678041/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MunYHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NadiSJ10,
  author       = {Shiva Nadi and
                  Mohamadhosein Hussein Saraee and
                  Mohamad Davarpanah Jazi},
  title        = {A fuzzy recommender system for dynamic prediction of user's behavior},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678109/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NadiSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NarhimeneM10,
  author       = {Boustia Narhimene and
                  A{\"{\i}}cha Mokhtari},
  title        = {A contextual multilevel access control model with default and exception
                  description logic},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678531/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NarhimeneM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ODriscollD10,
  author       = {Ciaran O'Driscoll and
                  Paul Doyle},
  title        = {The cost of security for a completely private ubiquitous environment},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678047/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ODriscollD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OmaryMWO10,
  author       = {Zanifa Omary and
                  Fredrick Mtenzi and
                  Bing Wu and
                  Ciaran O'Driscoll},
  title        = {Accessing sensitive patient information in ubiquitous healthcare systems},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678051/},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/OmaryMWO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OthmanHM10,
  author       = {Hanunah Othman and
                  Habibah Hashim and
                  Jamalul{-}lail Ab Manan},
  title        = {A conceptual framework providing Direct Anonymous Attestation {(DAA)}
                  protocol in trusted location-based services {(LBS)}},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678526/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OthmanHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OzdenizciACK10,
  author       = {Busra Ozdenizci and
                  Mehmet N. Aydin and
                  Vedat Coskun and
                  Kerem Ok},
  title        = {Design science in {NFC} research},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678014/},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OzdenizciACK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OzdenizciCAK10,
  author       = {Busra Ozdenizci and
                  Vedat Coskun and
                  Mehmet N. Aydin and
                  Kerem Ok},
  title        = {{NFC} loyal: {A} beneficial model to promote loyalty on smart cards
                  of mobile devices},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678068/},
  timestamp    = {Thu, 09 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OzdenizciCAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Pathak10,
  author       = {Vivek Pathak},
  title        = {Combating web plagiarism and improving internet safety by authenticating
                  web content},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678095/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Pathak10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Peris-LopezMLE10,
  author       = {Pedro Peris{-}Lopez and
                  Enrique San Mill{\'{a}}n and
                  Jan C. A. van der Lubbe and
                  Luis Entrena},
  title        = {Cryptographically secure pseudo-random bit generator for {RFID} tags},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678035/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Peris-LopezMLE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PonnusamyA10,
  author       = {Vasaki Ponnusamy and
                  Azween Vitra Abdullah},
  title        = {A bio-inspired framework for wireless sensor network using mobile
                  sensors},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678122/},
  timestamp    = {Mon, 28 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PonnusamyA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RaghavendraCK10,
  author       = {Prakash S. Raghavendra and
                  Shreya Roy Chowdhury and
                  Srilekha Vedula Kameswari},
  title        = {Comparative study of neural networks and k-means classification in
                  web usage mining},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678107/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RaghavendraCK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ReddySD10,
  author       = {V. Siva RamaKrishna Reddy and
                  Durvasula V. L. N. Somayajulu and
                  Ajay R. Dani},
  title        = {Sentiment Classification of text reviews using novel feature selection
                  with reduced over-fitting},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678555/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ReddySD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ReillyWB10,
  author       = {Denis J. Reilly and
                  Chris Wren and
                  Tom Berry},
  title        = {Cloud computing: Forensic challenges for law enforcement},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678033/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ReillyWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RezaeiMNA10,
  author       = {Masoud Rezaei and
                  Nafise Sadat Moosavi and
                  Hamed Nemati and
                  Reza Azmi},
  title        = {TCvisor: {A} hypervisor level secure storage},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678529/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RezaeiMNA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RonnigerFSG10,
  author       = {Maximilian Ronniger and
                  Florian Fankhauser and
                  Christian Schanes and
                  Thomas Grechenig},
  title        = {A robust and flexible test environment for VoIP security tests},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678010/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RonnigerFSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SiebertMHM10,
  author       = {Maria Siebert and
                  Franka Moritz and
                  Frank Hambach and
                  Christoph Meinel},
  title        = {Enriching E-Learning meta data with user generated playlists},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678550/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SiebertMHM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SingaraveluV10,
  author       = {Pradheepkumar Singaravelu and
                  Shekhar Verma},
  title        = {Viability of multivariate cryptosystems for {WSN}},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678098/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SingaraveluV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SinghL10,
  author       = {Parminder Singh and
                  G. S. Lehal},
  title        = {Statistical syllables selection approach for the preparation of Punjabi
                  speech database},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678557/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SinghL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/StarnbergerFG10,
  author       = {Guenther Starnberger and
                  Lorenz Froihofer and
                  Karl M. G{\"{o}}schka},
  title        = {Distributed timestamping with smart cards using efficient overlay
                  routing},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678034/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/StarnbergerFG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TolnaiS10,
  author       = {Annette Tolnai and
                  Sebastiaan H. von Solms},
  title        = {A Virtualized Environment Security {(VES)} model for a secure virtualized
                  environment},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678027/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TolnaiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/VcelckKR10,
  author       = {P. Vcelck and
                  Jana Kleckov{\'{a}} and
                  Vladimir Rohan},
  title        = {Cerebrovascular diseases research based on heterogeneous medical data
                  mining and knowledge base},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678542/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/VcelckKR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WangPWP10,
  author       = {Jie Wang and
                  Raphael Chung{-}Wei Phan and
                  John N. Whitley and
                  David J. Parish},
  title        = {Quality of detectability (QoD) and QoD-aware AAT-based attack detection},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678009/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WangPWP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WaqarK10,
  author       = {Mohannmad Waqar and
                  Zeeshan Shafi Khan},
  title        = {Web 2.0 content extraction},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678554/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WaqarK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WoodP10,
  author       = {Katie Wood and
                  Ella Pereira},
  title        = {An investigation into cloud configuration and security},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678036/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WoodP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YoonPKHY10,
  author       = {Yeojeong Yoon and
                  Chanil Park and
                  Pyung Kim and
                  Seongoun Hwang and
                  Hyunsoo Yoon},
  title        = {An efficient identity-based proxy signcryption for secure broadcast},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678017/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YoonPKHY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhaoLX10,
  author       = {Fuchun Zhao and
                  Hong Ling and
                  Zhengchuan Xu},
  title        = {Inter-organizational trust and supply chain Flexibility: From a relational
                  view of the firm},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678100/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhaoLX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2010,
  title        = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/5672505/proceeding},
  isbn         = {978-1-4244-8862-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AbbasiMS09,
  author       = {Abdul Ghafoor Abbasi and
                  Sead Muftic and
                  Gernot Schm{\"{o}}lzer},
  title        = {A model and design of a security provider for Java applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402592},
  doi          = {10.1109/ICITST.2009.5402592},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AbbasiMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Al-SharafatN09,
  author       = {Wafa S. Al{-}Sharafat and
                  Reyadh Naoum},
  title        = {Significant of features selection for detecting network intrusions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402584},
  doi          = {10.1109/ICITST.2009.5402584},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Al-SharafatN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Alghathbar09,
  author       = {Khaled Alghathbar},
  title        = {Low power design for silent pass authentication system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402634},
  doi          = {10.1109/ICITST.2009.5402634},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Alghathbar09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlghathbarM09,
  author       = {Khaled Alghathbar and
                  Hanan A. Mahmoud},
  title        = {Noisy password security technique},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402537},
  doi          = {10.1109/ICITST.2009.5402537},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlghathbarM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AliSS09,
  author       = {Ghulam Ali and
                  Noor Ahmed Shaikh and
                  Zubair Ahmed Shaikh},
  title        = {Towards development of a trust grid to balance between organization's
                  interests and employee's privacy},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402637},
  doi          = {10.1109/ICITST.2009.5402637},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AliSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlimANR09,
  author       = {Sophia Alim and
                  Ruqayya Abdulrahman and
                  Daniel Neagu and
                  Mick J. Ridley},
  title        = {Data retrieval from online social network profiles for social engineering
                  applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402568},
  doi          = {10.1109/ICITST.2009.5402568},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AlimANR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AllisonYC09,
  author       = {David S. Allison and
                  Hany F. El Yamany and
                  Miriam A. M. Capretz},
  title        = {Privacy and trust policies within {SOA}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402540},
  doi          = {10.1109/ICITST.2009.5402540},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AllisonYC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlomariSW09,
  author       = {Mohammad Kamel Alomari and
                  Kuldeep Sandhu and
                  Peter Woods},
  title        = {E-government adoption in the Hashemite Kingdom of Jordan: Factors
                  from social perspectives},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402528},
  doi          = {10.1109/ICITST.2009.5402528},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlomariSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlwiF09,
  author       = {Najwa Hayaati Mohd Alwi and
                  Ip{-}Shing Fan},
  title        = {Information security management in e-learning},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402507},
  doi          = {10.1109/ICITST.2009.5402507},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlwiF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AlzaabiBZ09,
  author       = {Mohammed Alzaabi and
                  Jawad Berri and
                  Mohamed Jamal Zemerly},
  title        = {On the fly generation of mobile learning structured multimedia content
                  from the web},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402636},
  doi          = {10.1109/ICITST.2009.5402636},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AlzaabiBZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmirtahmasebiJK09,
  author       = {Kasra Amirtahmasebi and
                  Seyed Reza Jalalinia and
                  Saghar Khadem},
  title        = {A survey of {SQL} injection defense mechanisms},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402604},
  doi          = {10.1109/ICITST.2009.5402604},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmirtahmasebiJK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AmranPP09,
  author       = {Ahmad Roshidi Amran and
                  Raphael C.{-}W. Phan and
                  David J. Parish},
  title        = {Metrics for network forensics conviction evidence},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402640},
  doi          = {10.1109/ICITST.2009.5402640},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AmranPP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AnandPH09,
  author       = {Ankit Anand and
                  Xiao{-}Hong Peng and
                  Richard Haywood},
  title        = {Efficient information retrieval via proxy caching mechanisms within
                  a lossy environment},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402566},
  doi          = {10.1109/ICITST.2009.5402566},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AnandPH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AnandarajaSKSV09,
  author       = {Nallusamy Anandaraja and
                  Nagappan Sriram and
                  C. Kathiresan and
                  Shibi Sebastian and
                  E. Vadivel},
  title        = {Web cum mobile based dynamic market information support for Agri-Horti
                  produces: Linking the farmers with market},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402541},
  doi          = {10.1109/ICITST.2009.5402541},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AnandarajaSKSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AntonITMS09,
  author       = {Constantin Anton and
                  Laurentiu Ionescu and
                  Ion Tutanescu and
                  Alin Mazare and
                  Gheorghe Serban},
  title        = {Detecting errors in digital communications with {CRC} codes implemented
                  with {FPGA}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402630},
  doi          = {10.1109/ICITST.2009.5402630},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AntonITMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ApampaWA09,
  author       = {Kikelomo Maria Apampa and
                  Gary B. Wills and
                  David Argles},
  title        = {Towards security goals in summative e-assessment security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402505},
  doi          = {10.1109/ICITST.2009.5402505},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ApampaWA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArapinisCRR09,
  author       = {Myrto Arapinis and
                  Tom Chothia and
                  Eike Ritter and
                  Mark Ryan},
  title        = {Untraceability in the applied pi-calculus},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402514},
  doi          = {10.1109/ICITST.2009.5402514},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/ArapinisCRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AreerachakulS09,
  author       = {Sirilak Areerachakul and
                  Siripun Sanguansintukul},
  title        = {Water quality classification using neural networks: Case study of
                  canals in Bangkok, Thailand},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402577},
  doi          = {10.1109/ICITST.2009.5402577},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AreerachakulS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ArefiA09,
  author       = {Mahmoodreza Arefi and
                  Amir Masoud Amini},
  title        = {The elements influencing the online price dispersion on Iranian electronic
                  retailers},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402531},
  doi          = {10.1109/ICITST.2009.5402531},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ArefiA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AyadiMZ09,
  author       = {Rami Ayadi and
                  Mohsen Maraoui and
                  Mounir Zrigui},
  title        = {Intertextual distance for Arabic texts classification},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402564},
  doi          = {10.1109/ICITST.2009.5402564},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AyadiMZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AyodeleZK09,
  author       = {Taiwo Ayodele and
                  Shikun Zhou and
                  Rinat Khusainov},
  title        = {Email classification: Solution with back propagation technique},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402583},
  doi          = {10.1109/ICITST.2009.5402583},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AyodeleZK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AyodeleZK09a,
  author       = {Taiwo Ayodele and
                  Shikun Zhou and
                  Rinat Khusainov},
  title        = {Intelligent email prediction system {(IEPS)}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402580},
  doi          = {10.1109/ICITST.2009.5402580},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/AyodeleZK09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AzenaborDSI09,
  author       = {Cyril Ehijie Azenabor and
                  Mohammad Dastbaz and
                  Charles A. Shoniregun and
                  Chris Imafidon},
  title        = {The society and electronic government usage},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402522},
  doi          = {10.1109/ICITST.2009.5402522},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AzenaborDSI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AzevedoGSRFS09,
  author       = {Ryan Ribeiro de Azevedo and
                  Eric Rommel Dantas Galv{\~{a}}o and
                  Rubean Caitano dos Santos and
                  Cleyton M{\'{a}}rio de Oliveira Rodrigues and
                  Fred Freitas and
                  Marcelo J. Siqueira},
  title        = {An autonomic multiagent system ontology-based for management of security
                  of information},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402615},
  doi          = {10.1109/ICITST.2009.5402615},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AzevedoGSRFS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BarchettiGM09,
  author       = {Ugo Barchetti and
                  Anna Lisa Guido and
                  Luca Mainetti},
  title        = {A conceptual framework for business driven integration},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402527},
  doi          = {10.1109/ICITST.2009.5402527},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BarchettiGM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BaruahMS09,
  author       = {Siddhartha Baruah and
                  Anjana Kakoty Mahanta and
                  Kanak Chandra Sarma},
  title        = {A comparative study on client server technology and web technology
                  in design and implementation of an embedded system used for monitoring
                  and controlling of physical parameters},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402544},
  doi          = {10.1109/ICITST.2009.5402544},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BaruahMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BarzegarSK09,
  author       = {Siamak Barzegar and
                  Mohammad Shojafar and
                  Mohammad Reza Keyvanpour},
  title        = {User interface in virtual learning environment},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402572},
  doi          = {10.1109/ICITST.2009.5402572},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BarzegarSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BatistaMBFK09,
  author       = {Andr{\'{e}} Filipe de Moraes Batista and
                  Maria das Gra{\c{c}}as Bruno Marietto and
                  Gislene Cristina de O. Barbosa and
                  Robson dos Santos Fran{\c{c}}a and
                  Guiou Kobayashi},
  title        = {Multi-agent systems to build a computational middleware: {A} chatterbot
                  case study},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402586},
  doi          = {10.1109/ICITST.2009.5402586},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BatistaMBFK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BeranS09,
  author       = {Peter Paul Beran and
                  Erich Schikuta},
  title        = {An extended multi-layered blackboard approach for the optimization
                  of world-spanning query execution plans},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402518},
  doi          = {10.1109/ICITST.2009.5402518},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BeranS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BiggsV09,
  author       = {Stephen Biggs and
                  Stilianos Vidalis},
  title        = {Cloud Computing: The impact on digital forensic investigations},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402561},
  doi          = {10.1109/ICITST.2009.5402561},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BiggsV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BoldyrevOBTPL09,
  author       = {Sergey Boldyrev and
                  Ian Oliver and
                  Ronald Brown and
                  Juha{-}Matti Tuupola and
                  Arto Palin and
                  Antti Lappetel{\"{a}}inen},
  title        = {Network and content aware information management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402569},
  doi          = {10.1109/ICITST.2009.5402569},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BoldyrevOBTPL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BoumhamdiJ09,
  author       = {Kaouthar Boumhamdi and
                  Zahi Jarir},
  title        = {Yet another approach for dynamic web service composition},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5435098},
  doi          = {10.1109/ICITST.2009.5435098},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/BoumhamdiJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/BrescianiB09,
  author       = {Riccardo Bresciani and
                  Andrew Butterfield},
  title        = {A formal security proof for the {ZRTP} Protocol},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402595},
  doi          = {10.1109/ICITST.2009.5402595},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/BrescianiB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CaragataATS09,
  author       = {Daniel Caragata and
                  Safwan El Assad and
                  Ion Tutanescu and
                  Emil Sofron},
  title        = {Secure {TCP/IP} communications over {DVB-S/DVB-RCS} using chaotic
                  sequences},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402591},
  doi          = {10.1109/ICITST.2009.5402591},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CaragataATS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChanSA09,
  author       = {Yi{-}Tung F. Chan and
                  Charles A. Shoniregun and
                  Galyna A. Akmayeva},
  title        = {Mixed load balance strategy to improve performance efficacy for three
                  tiers Peer-to-Peer network topology},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402621},
  doi          = {10.1109/ICITST.2009.5402621},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChanSA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChanSAA09,
  author       = {Yi{-}Tung F. Chan and
                  Charles A. Shoniregun and
                  Galyna A. Akmayeva and
                  Ali Al{-}Dahoud},
  title        = {Applying semantic web and user behavior analysis to enforce the intrusion
                  detection system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402616},
  doi          = {10.1109/ICITST.2009.5402616},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChanSAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChangMM09,
  author       = {Chee Er Chang and
                  Faisal Mohd{-}Yasin and
                  Azhar Kassim Mustapha},
  title        = {RBStreX: Hardware {XML} parser for embedded system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402548},
  doi          = {10.1109/ICITST.2009.5402548},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChangMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ChehabA09,
  author       = {Maya I. Chehab and
                  Ali E. Abdallah},
  title        = {Architectures for identity management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402603},
  doi          = {10.1109/ICITST.2009.5402603},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ChehabA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/CokusluHE09,
  author       = {Deniz Cokuslu and
                  Abdelkader Hameurlain and
                  Kayhan Erciyes},
  title        = {Grid resource discovery based on web services},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402543},
  doi          = {10.1109/ICITST.2009.5402543},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/CokusluHE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DammakKRA09,
  author       = {Hajer Ben Mahmoud Dammak and
                  Raouf Ketata and
                  Taieb Ben Romdhane and
                  Samir Ben Ahmed},
  title        = {Modeling Quality Management System: {A} multi-agent approach},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402578},
  doi          = {10.1109/ICITST.2009.5402578},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DammakKRA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DucLKK09,
  author       = {Dang Nguyen Duc and
                  Hyunrok Lee and
                  Divyan M. Konidala and
                  Kwangjo Kim},
  title        = {Open issues in {RFID} security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402510},
  doi          = {10.1109/ICITST.2009.5402510},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DucLKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Efstathopoulos09,
  author       = {Petros Efstathopoulos},
  title        = {Practical study of a defense against low-rate TCP-targeted DoS attack},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402593},
  doi          = {10.1109/ICITST.2009.5402593},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Efstathopoulos09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/EgiSO09,
  author       = {Hironori Egi and
                  Hiroshi Shigeno and
                  Ken{-}ichi Okada},
  title        = {Grasping contextual awareness inside aworkspace at the entrance to
                  support group interaction},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5435099},
  doi          = {10.1109/ICITST.2009.5435099},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/EgiSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FanBV09,
  author       = {Junfeng Fan and
                  Lejla Batina and
                  Ingrid Verbauwhede},
  title        = {Light-weight implementation options for curve-based cryptography:
                  {HECC} is also ready for {RFID}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402516},
  doi          = {10.1109/ICITST.2009.5402516},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FanBV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FanHGSE09,
  author       = {Xinxin Fan and
                  Honggang Hu and
                  Guang Gong and
                  Eric M. Smith and
                  Daniel W. Engels},
  title        = {Lightweight implementation of Hummingbird cryptographic algorithm
                  on 4-bit microcontrollers},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402515},
  doi          = {10.1109/ICITST.2009.5402515},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FanHGSE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FaresW09,
  author       = {Rasha Fares and
                  Mike Woodward},
  title        = {A new algorithm for controlling the mean queue length in a buffer
                  with time varying arrival rate},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402596},
  doi          = {10.1109/ICITST.2009.5402596},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FaresW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FazzikiNS09,
  author       = {Aziz El Fazziki and
                  Sana Nouzri and
                  Mohammed Sadgal},
  title        = {A multi-agent development approach based on the {MDA} for modelling
                  information systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402555},
  doi          = {10.1109/ICITST.2009.5402555},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FazzikiNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Fernando09,
  author       = {Juanita I. Fernando},
  title        = {The elephant in the room: Health information system security and the
                  user-level environment},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402503},
  doi          = {10.1109/ICITST.2009.5402503},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Fernando09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FingerMRH09,
  author       = {Andreas Finger and
                  Holger Meyer and
                  Tim Rieger and
                  Andreas Heuer},
  title        = {Transactions and service level agreements for online music distribution},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402524},
  doi          = {10.1109/ICITST.2009.5402524},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FingerMRH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FioreNA09,
  author       = {Sandro Fiore and
                  Alessandro Negro and
                  Giovanni Aloisio},
  title        = {Data virtualization in grid environments through the GRelC Data Access
                  and Integration Service},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402520},
  doi          = {10.1109/ICITST.2009.5402520},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FioreNA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FirminoBGV09,
  author       = {Macedo Firmino and
                  Glaucio B. Brandao and
                  Ana M. G. Guerreiro and
                  Ricardo Alexsandro de Medeiros Valentim},
  title        = {Neural cryptography applied to key management protocol with mutual
                  authentication in {RFID} systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402512},
  doi          = {10.1109/ICITST.2009.5402512},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FirminoBGV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FischerM09,
  author       = {Daniel Fischer and
                  Bernd Markscheffel},
  title        = {State of the art in wireless {LAN} security - Results and implications
                  of an empirical study concerning German companies and federal authorities},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402585},
  doi          = {10.1109/ICITST.2009.5402585},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FischerM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/FrancisHMM09,
  author       = {Lishoy Francis and
                  Gerhard P. Hancke and
                  Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Potential misuse of {NFC} enabled mobile phones with embedded security
                  elements as contactless attack platforms},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402513},
  doi          = {10.1109/ICITST.2009.5402513},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/FrancisHMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GajdosR09,
  author       = {Petr Gajdos and
                  Michal Radeck{\'{y}}},
  title        = {Web visualization support for disaster management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402608},
  doi          = {10.1109/ICITST.2009.5402608},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GajdosR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GallardoB09,
  author       = {Justo Carracedo Gallardo and
                  Emilia P{\'{e}}rez Belleboni},
  title        = {Use of the new Smart Identity Card to reinforce electronic voting
                  guarantees},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402529},
  doi          = {10.1109/ICITST.2009.5402529},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GallardoB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GamloB09,
  author       = {Amina Gamlo and
                  Omaima Bamasak},
  title        = {Towards securing e-transactions in e-government systems of Saudi Arabia},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402546},
  doi          = {10.1109/ICITST.2009.5402546},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GamloB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GiambrunoSML09,
  author       = {Alessandro Giambruno and
                  Muhammad Awais Shibli and
                  Sead Muftic and
                  Antonio Lioy},
  title        = {MagicNET: {XACML} authorization policies for mobile agents},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402600},
  doi          = {10.1109/ICITST.2009.5402600},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GiambrunoSML09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GoncalvesF09,
  author       = {Joel Mana Gon{\c{c}}alves and
                  Fabio Neves Fernandes},
  title        = {The impact of information security on Latin America},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402535},
  doi          = {10.1109/ICITST.2009.5402535},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GoncalvesF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GrobertSW09,
  author       = {Felix Gr{\"{o}}bert and
                  Ahmad{-}Reza Sadeghi and
                  Marcel Winandy},
  title        = {Software distribution as a malware infection vector},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402538},
  doi          = {10.1109/ICITST.2009.5402538},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GrobertSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GronliG09,
  author       = {Tor{-}Morten Gr{\o}nli and
                  George Ghinea},
  title        = {Web 2.0 integration in a context-aware mobile {PIM} application},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402613},
  doi          = {10.1109/ICITST.2009.5402613},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GronliG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GuineeB09,
  author       = {Richard A. Guinee and
                  Marta Blaszczyk},
  title        = {A novel true random binary sequence generator based On a chaotic double
                  scroll oscillator combination with a pseudo random generator for cryptographic
                  applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402536},
  doi          = {10.1109/ICITST.2009.5402536},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GuineeB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/GyongyosiI09,
  author       = {Laszlo Gyongyosi and
                  S{\'{a}}ndor Imre},
  title        = {Unduplicable quantum data medium based secret decryption and verification},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402590},
  doi          = {10.1109/ICITST.2009.5402590},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/GyongyosiI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HabibP09,
  author       = {Muhammad Asif Habib and
                  Christian Praher},
  title        = {Object based dynamic separation of duty in {RBAC}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402642},
  doi          = {10.1109/ICITST.2009.5402642},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HabibP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HammamiS09,
  author       = {Nacereddine Hammami and
                  Mokhtar Sellam},
  title        = {Tree distribution classifier for automatic spoken Arabic digit recognition},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402575},
  doi          = {10.1109/ICITST.2009.5402575},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HammamiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HansenG09,
  author       = {Jarle Hansen and
                  Gheorghita Ghinea},
  title        = {Multi-platform Bluetooth remote control},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402609},
  doi          = {10.1109/ICITST.2009.5402609},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HansenG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HaqPA09,
  author       = {Muhammad Ehsan ul Haq and
                  Muhammad Raza Perwaz and
                  Kabeer Ahmed Bhatti},
  title        = {Compact and user-friendly representation of IPv6 addressing approach
                  and masking},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402594},
  doi          = {10.1109/ICITST.2009.5402594},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/HaqPA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HarbBG09,
  author       = {Ali Harb and
                  Michel Beigbeder and
                  Jean{-}Jacques Girardot},
  title        = {Evaluation of question classification systems using differing features},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402567},
  doi          = {10.1109/ICITST.2009.5402567},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HarbBG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HewettK09,
  author       = {Rattikorn Hewett and
                  Phongphun Kijsanayothin},
  title        = {On securing privacy in composite web service transactions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402545},
  doi          = {10.1109/ICITST.2009.5402545},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HewettK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Hooper09,
  author       = {Emmanuel Hooper},
  title        = {Intelligent strategies and techniques for effective cyber security,
                  infrastructure protection and privacy},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402581},
  doi          = {10.1109/ICITST.2009.5402581},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Hooper09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/HourdinTLRR09,
  author       = {Vincent Hourdin and
                  Jean{-}Yves Tigli and
                  Stephane Lavirotte and
                  Ga{\"{e}}tan Rey and
                  Michel Riveill},
  title        = {Context-sensitive authorization for asynchronous communications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402550},
  doi          = {10.1109/ICITST.2009.5402550},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/HourdinTLRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JafariMFO09,
  author       = {Said Jafari and
                  Fredrick Mtenzi and
                  Ronan Fitzpatrick and
                  Brendan O'Shea},
  title        = {An approach for developing comparative security metrics for healthcare
                  organizations},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402504},
  doi          = {10.1109/ICITST.2009.5402504},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JafariMFO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JainJRP09,
  author       = {Abhimanyu Jain and
                  Ashish Jain and
                  Aditya Raj and
                  Tushar Pahwa},
  title        = {Sequenced picture captcha: generation and its strength analysis},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5435097},
  doi          = {10.1109/ICITST.2009.5435097},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JainJRP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JalalBM09,
  author       = {Samir Kumar Jalal and
                  Subal Chandra Biswas and
                  Parthasarathi Mukhopadhyay},
  title        = {Webometric analysis of Central Universities in India: {A} study},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402605},
  doi          = {10.1109/ICITST.2009.5402605},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JalalBM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/JomsriSC09,
  author       = {Pijitra Jomsri and
                  Siripun Sanguansintukul and
                  Worasit Choochaiwattana},
  title        = {A comparison of search engine using "tag title and abstract" with
                  CiteULike - An initial evaluation},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402563},
  doi          = {10.1109/ICITST.2009.5402563},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/JomsriSC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Juels09,
  author       = {Ari Juels},
  title        = {Power games in {RFID} security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402509},
  doi          = {10.1109/ICITST.2009.5402509},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Juels09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KanyameeS09,
  author       = {Kanokwan Kanyamee and
                  Chanboon Sathitwiriyawong},
  title        = {A simple high-availability multiple-agent key recovery system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402606},
  doi          = {10.1109/ICITST.2009.5402606},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KanyameeS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KaramiF09,
  author       = {Mohammad Karami and
                  Mohammad Fathian},
  title        = {A robust trust establishment framework using Dempster-Shafer theory
                  for MANETs},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402628},
  doi          = {10.1109/ICITST.2009.5402628},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KaramiF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KarimRH09,
  author       = {Zakaria Karim and
                  Karim Mohammed Rezaul and
                  Aliar Hossain},
  title        = {Towards secure information systems in online banking},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402619},
  doi          = {10.1109/ICITST.2009.5402619},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KarimRH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KaufmannS09,
  author       = {Sascha Kaufmann and
                  Christoph Schommer},
  title        = {e-Conviviality in web systems by the wisdom of crowds},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402530},
  doi          = {10.1109/ICITST.2009.5402530},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KaufmannS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KhanN09,
  author       = {Khaisar Muneebulla Khan and
                  Umesha Naik},
  title        = {Open source software for personal information managers and personal
                  knowledge management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402558},
  doi          = {10.1109/ICITST.2009.5402558},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KhanN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KharazmiNA09,
  author       = {Sadegh Kharazmi and
                  Ali Farahmand Nejad and
                  Hassan Abolhassani},
  title        = {Freshness of Web search engines: Improving performance of Web search
                  engines using data mining techniques},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402607},
  doi          = {10.1109/ICITST.2009.5402607},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KharazmiNA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KirkhamDCSW09,
  author       = {Thomas Kirkham and
                  Ingo Dahn and
                  David W. Chadwick and
                  Marc Santos and
                  Sandra Winfield},
  title        = {Aggregating policies in user centric, real-time and distributed applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402553},
  doi          = {10.1109/ICITST.2009.5402553},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KirkhamDCSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KirkhamKGLJ09,
  author       = {Tom Kirkham and
                  Kleopatra Konstanteli and
                  Julian R. Gallop and
                  Constantinos Lalos and
                  Ian J. Johnson},
  title        = {Identity management in a mobile service orientated grid},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402547},
  doi          = {10.1109/ICITST.2009.5402547},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KirkhamKGLJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KoR09,
  author       = {Hoon Ko and
                  Carlos Ramos},
  title        = {A study on Security Status Matrix {(SSM)} in Urban Computing},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402573},
  doi          = {10.1109/ICITST.2009.5402573},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KoR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/KretschmerG09,
  author       = {Mathias Kretschmer and
                  Gheorghita Ghinea},
  title        = {Seamless integration of unidirectional broadcast links into QoS-constrained
                  broadband Wireless Mesh Access Networks},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402587},
  doi          = {10.1109/ICITST.2009.5402587},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/KretschmerG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LexSGJ09,
  author       = {Elisabeth Lex and
                  Christin Seifert and
                  Michael Granitzer and
                  Andreas Juffinger},
  title        = {Cross-domain classification: Trade-off between complexity and accuracy},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402559},
  doi          = {10.1109/ICITST.2009.5402559},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LexSGJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LimT09,
  author       = {Boon Hoi Lim and
                  Chong Eng Tan},
  title        = {Simplified link reliability enhancement schemes for wireless networks},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402599},
  doi          = {10.1109/ICITST.2009.5402599},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LimT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Lin09,
  author       = {Wen{-}Shan Lin},
  title        = {An integrated framework For modelling the adoptive behaviour of online
                  product recommendations},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402552},
  doi          = {10.1109/ICITST.2009.5402552},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Lin09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LioudakisGAMVK09,
  author       = {Georgios V. Lioudakis and
                  Fotios Gogoulos and
                  Anna Antonakopoulou and
                  Aziz S. Mousas and
                  Iakovos S. Venieris and
                  Dimitra I. Kaklamani},
  title        = {An access control approach for privacy-preserving passive network
                  monitoring},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402632},
  doi          = {10.1109/ICITST.2009.5402632},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LioudakisGAMVK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Liu09,
  author       = {Chenglian Liu},
  title        = {Improvement of authentication of anycast communication},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402618},
  doi          = {10.1109/ICITST.2009.5402618},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Liu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/LuP09,
  author       = {Zheng Lu and
                  Taoxin Peng},
  title        = {The VoIP intrusion detection through a LVQ-based neural network},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402626},
  doi          = {10.1109/ICITST.2009.5402626},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/LuP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Maalouf09,
  author       = {Hoda W. Maalouf},
  title        = {Managing trade-offs between information loss and latency in real-time
                  distributed systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402614},
  doi          = {10.1109/ICITST.2009.5402614},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Maalouf09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MarieBB09,
  author       = {Rashiq Rafiq Marie and
                  Jonathan M. Blackledge and
                  Helmut E. Bez},
  title        = {On the fractal characteristics of Internet network traffic and its
                  utilization in covert communications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402542},
  doi          = {10.1109/ICITST.2009.5402542},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MarieBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MondalRB09,
  author       = {Arpita Mondal and
                  Kaushik Roy and
                  Prabir Bhattacharya},
  title        = {Secure biometric system for accessing home appliances via Internet},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402631},
  doi          = {10.1109/ICITST.2009.5402631},
  timestamp    = {Mon, 10 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MondalRB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MujtabaP09,
  author       = {Ghulam Mujtaba and
                  David J. Parish},
  title        = {Detection of applications within encrypted tunnels using packet size
                  distributions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402624},
  doi          = {10.1109/ICITST.2009.5402624},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MujtabaP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/MwakalingaKY09,
  author       = {Jeffy Mwakalinga and
                  Stewart Kowalski and
                  Louise Yngstr{\"{o}}m},
  title        = {Secure e-learning using a holistic and immune security framework},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402508},
  doi          = {10.1109/ICITST.2009.5402508},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/MwakalingaKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NanCC09,
  author       = {Nan Lu and
                  Chunguang Zhou and
                  Laizhong Cui},
  title        = {The application of association rules algorithm on web search engine},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402610},
  doi          = {10.1109/ICITST.2009.5402610},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NanCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Nehinbe09,
  author       = {Joshua Ojo Nehinbe},
  title        = {Critical analyses of alerts swamping and intrusion redundancy},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402617},
  doi          = {10.1109/ICITST.2009.5402617},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Nehinbe09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NiweS09,
  author       = {Moses Niwe and
                  Janis Stirna},
  title        = {Pattern approach to business-to-business transactions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402523},
  doi          = {10.1109/ICITST.2009.5402523},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NiweS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/NormanY09,
  author       = {Azah Anir Norman and
                  Norizan Mohd Yasin},
  title        = {An analysis of Information Systems Security Management {(ISSM):} The
                  hierarchical organizations vs. emergent organization},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402551},
  doi          = {10.1109/ICITST.2009.5402551},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/NormanY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OSheaBC09,
  author       = {Karen O'Shea and
                  Zuhair Bandar and
                  Keeley A. Crockett},
  title        = {A semantic-based conversational agent framework},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402582},
  doi          = {10.1109/ICITST.2009.5402582},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OSheaBC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OliveiraO09,
  author       = {Frederico Guilherme {\'{A}}lvares de Oliveira J{\'{u}}nior and
                  Jos{\'{e}} Maria Parente de Oliveira},
  title        = {A heuristic-based runtime ranking for service composition},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402539},
  doi          = {10.1109/ICITST.2009.5402539},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OliveiraO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OmaryM09,
  author       = {Zanifa Omary and
                  Fredrick Mtenzi},
  title        = {Dataset threshold for the performance estimators in supervised machine
                  learning experiments},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402500},
  doi          = {10.1109/ICITST.2009.5402500},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OmaryM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OmaryMW09,
  author       = {Zanifa Omary and
                  Fredrick Mtenzi and
                  Bing Wu},
  title        = {How does politics affect electronic healthcare adoption},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402502},
  doi          = {10.1109/ICITST.2009.5402502},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/OmaryMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PatelB09,
  author       = {Alkesh Patel and
                  Ajit Balakrishnan},
  title        = {Generic framework for recommendation system using collective intelligence},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402612},
  doi          = {10.1109/ICITST.2009.5402612},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PatelB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PatelMP09,
  author       = {Samir B. Patel and
                  Tejas B. Mehta and
                  Shrikant N. Pradhan},
  title        = {A novel approach using transformation techniques and decision tree
                  algorithm on images for performing Digital Watermarking},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402565},
  doi          = {10.1109/ICITST.2009.5402565},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PatelMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PereraANS09,
  author       = {Indika Perera and
                  Colin Allison and
                  Ross Nicoll and
                  Thomas Sturgeon},
  title        = {Towards successful 3D virtual learning - a case study on teaching
                  human computer interaction},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5435085},
  doi          = {10.1109/ICITST.2009.5435085},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/PereraANS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PickeringG09,
  author       = {J. Adrian Pickering and
                  Christopher Gutteridge},
  title        = {A networked registration scheme for enhancing trust},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402620},
  doi          = {10.1109/ICITST.2009.5402620},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PickeringG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PinkasK09,
  author       = {Petr Pinkas and
                  Jana Kleckov{\'{a}}},
  title        = {The composite algebraic structure over capabilities and actions of
                  a system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402562},
  doi          = {10.1109/ICITST.2009.5402562},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PinkasK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PontesG09,
  author       = {Elvis Pontes and
                  Adilson Eduardo Guelfi},
  title        = {{IDS} 3G - Third generation for intrusion detection: Applying forecasts
                  and return on security investment to cope with unwanted traffic},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402622},
  doi          = {10.1109/ICITST.2009.5402622},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PontesG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/PrangchumpolST09,
  author       = {Dulyawit Prangchumpol and
                  Siripun Sanguansintukul and
                  Panjai Tantasanawong},
  title        = {Server virtualization by user behaviour model using a data mining
                  technique - {A} preliminary study},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402611},
  doi          = {10.1109/ICITST.2009.5402611},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/PrangchumpolST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/QadeerMW09,
  author       = {Abdul Qadeer and
                  Waqar Mahmood and
                  Abdul Waheed},
  title        = {The website census},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402623},
  doi          = {10.1109/ICITST.2009.5402623},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/QadeerMW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RadeckyG09,
  author       = {Michal Radeck{\'{y}} and
                  Petr Gajdos},
  title        = {Traffic simulation and intelligent agents},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402576},
  doi          = {10.1109/ICITST.2009.5402576},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RadeckyG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RahimiMR09,
  author       = {Arian Rahimi and
                  Sharhriar Mohammadi and
                  Rozita Rahimi},
  title        = {An efficient Iris authentication using chaos theory-based cryptography
                  for e-commerce transactions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402532},
  doi          = {10.1109/ICITST.2009.5402532},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RahimiMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RahmanRH09,
  author       = {Mohammad Rahman and
                  Karim Mohammed Rezaul and
                  Aliar Hossain},
  title        = {Finding an effective and secured information system in e-commerce
                  environment},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402521},
  doi          = {10.1109/ICITST.2009.5402521},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RahmanRH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RaufAA09,
  author       = {Bilal Rauf and
                  M. Faisal Amjad and
                  Kabeer Ahmed Bhatti},
  title        = {Performance evaluation of {IEEE} 802.11 {DCF} in comparison with {IEEE}
                  802.11e {EDCA}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402597},
  doi          = {10.1109/ICITST.2009.5402597},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/RaufAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RekikKBF09,
  author       = {Wiem Rekik and
                  Maher Khemakhem and
                  Abdelfettah Belghith and
                  Jacques Fayolle},
  title        = {{PKI} and {UDDI} based trust centre: An attempt to improve web service
                  security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402549},
  doi          = {10.1109/ICITST.2009.5402549},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/RekikKBF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RixonF09,
  author       = {Daphne Rixon and
                  Mary Furey},
  title        = {Who regulates the regulator: Oversight of the Canadian Radio-television
                  and telecommunications Commission},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402589},
  doi          = {10.1109/ICITST.2009.5402589},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RixonF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/RomliC09,
  author       = {Awanis M. Romli and
                  Arnidcha P. Cha},
  title        = {An expert system for stress management},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402579},
  doi          = {10.1109/ICITST.2009.5402579},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/RomliC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SaadSZ09,
  author       = {Saidah Saad and
                  Naomie Salim and
                  Hakim Zainal},
  title        = {Islamic knowledge ontology creation},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402635},
  doi          = {10.1109/ICITST.2009.5402635},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/SaadSZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SarantisA09,
  author       = {Demetrios Sarantis and
                  Dimitris Askounis},
  title        = {A project management ontology as a reference for e-Government projects},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402526},
  doi          = {10.1109/ICITST.2009.5402526},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SarantisA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShaikhD09,
  author       = {A. R. Rizwana Shaikh and
                  Satish Devane},
  title        = {Verification of security properties of payment protocol using {AVISPA}},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402598},
  doi          = {10.1109/ICITST.2009.5402598},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShaikhD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShemailiYZ09,
  author       = {Mouza Ahmad Bani Shemaili and
                  Chan Yeob Yeun and
                  Mohamed Jamal Zemerly},
  title        = {{RFID} lightweight mutual authentication using shrinking generator},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402511},
  doi          = {10.1109/ICITST.2009.5402511},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShemailiYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShiZY09,
  author       = {Peipei Shi and
                  Bo Zhu and
                  Amr M. Youssef},
  title        = {A rotary {PIN} entry scheme resilient to shoulder-surfing},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402625},
  doi          = {10.1109/ICITST.2009.5402625},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShiZY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ShriramVVS09,
  author       = {Shriram K. Vasudevan and
                  K. Venkateshwaran and
                  V. Vaithiyanathan and
                  Subashri Vasudevan},
  title        = {Design of analog to digital converter for {SDR} (Software Defined
                  Radio)},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402602},
  doi          = {10.1109/ICITST.2009.5402602},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ShriramVVS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SidorovaB09,
  author       = {Julia Sidorova and
                  Toni Badia},
  title        = {Syntactic learning for ESEDA.1, a tool for enhanced speech emotion
                  detection and analysis},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402574},
  doi          = {10.1109/ICITST.2009.5402574},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SidorovaB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/StephanWB09,
  author       = {Jean Stephan and
                  Nagi Wakim and
                  Youakim Badr},
  title        = {E-profile-based security for critical transactions in web applications},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402525},
  doi          = {10.1109/ICITST.2009.5402525},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/StephanWB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/StillerRA09,
  author       = {Carsten Stiller and
                  Fred Ro{\ss} and
                  Christoph Ament},
  title        = {Towards spatial awareness in recommender systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402633},
  doi          = {10.1109/ICITST.2009.5402633},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/StillerRA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/SukumaranS09,
  author       = {Sanath Sukumaran and
                  M. V. Shetty},
  title        = {Knowledge Management {(KM)} in automobile: Application of a value
                  chain {(VC)} approach using {KM} tools},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402554},
  doi          = {10.1109/ICITST.2009.5402554},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/SukumaranS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Tabatabaei09,
  author       = {Shayesteh Tabatabaei},
  title        = {Multiple criteria routing algorithms to increase durability path in
                  mobile ad hoc networks},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402627},
  doi          = {10.1109/ICITST.2009.5402627},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/Tabatabaei09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TahajodID09,
  author       = {Maryam Tahajod and
                  Azadeh Iranmehr and
                  Mohammad Reza Darajeh},
  title        = {A roadmap to develop enterprise security architecture},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402639},
  doi          = {10.1109/ICITST.2009.5402639},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TahajodID09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TinaboMO09,
  author       = {Rose Tinabo and
                  Fredrick Mtenzi and
                  Brendan O'Shea},
  title        = {Anonymisation vs. Pseudonymisation: Which one is most useful for both
                  privacy protection and usefulness of e-healthcare data},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402501},
  doi          = {10.1109/ICITST.2009.5402501},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TinaboMO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/TolnaiS09,
  author       = {Annette Tolnai and
                  Sebastiaan H. von Solms},
  title        = {Solving security issues using Information Security Awareness Portal},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402560},
  doi          = {10.1109/ICITST.2009.5402560},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/TolnaiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Vasilescu09,
  author       = {Rares Vasilescu},
  title        = {Architectural model for a high performance content management system},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402570},
  doi          = {10.1109/ICITST.2009.5402570},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Vasilescu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ViscontiT09,
  author       = {Andrea Visconti and
                  Hooman Tahayori},
  title        = {Detecting misbehaving nodes in {MANET} with an artificial immune system
                  based on type-2 fuzzy sets},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402588},
  doi          = {10.1109/ICITST.2009.5402588},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ViscontiT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WangY09,
  author       = {Tzong{-}I Wang and
                  Ting Yuan Yeh},
  title        = {A fault-tolerant mechanism for reducing pollution attacks in peer-to-peer
                  networks},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402601},
  doi          = {10.1109/ICITST.2009.5402601},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WangY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WilkinsN09,
  author       = {Rebecca Wilkins and
                  Abel Nyamapfene},
  title        = {Usability driven website design - An equine sports case study},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402571},
  doi          = {10.1109/ICITST.2009.5402571},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WilkinsN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WillemsDKM09,
  author       = {Christian Willems and
                  Wesam Dawoud and
                  Thomas Klingbeil and
                  Christoph Meinel},
  title        = {Security in Tele-Lab - Protecting an online virtual lab for security
                  training},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402506},
  doi          = {10.1109/ICITST.2009.5402506},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WillemsDKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WohrerLB09,
  author       = {Alexander W{\"{o}}hrer and
                  Thomas Lustig and
                  Peter Brezany},
  title        = {Scalable relational query results handling in service oriented architectures},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402517},
  doi          = {10.1109/ICITST.2009.5402517},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WohrerLB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WongthongthamKK09,
  author       = {Pornpit Wongthongtham and
                  Natsuda Kasisopha and
                  Surasak Komchaliaw},
  title        = {Community-oriented software engineering ontology evolution},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402557},
  doi          = {10.1109/ICITST.2009.5402557},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WongthongthamKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WongthongthamZ09,
  author       = {Pornpit Wongthongtham and
                  Behrang Zadjabbari},
  title        = {Signifying ontology complexity for knowledge sharing},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402638},
  doi          = {10.1109/ICITST.2009.5402638},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WongthongthamZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/WuL09,
  author       = {Tsang{-}Hung Wu and
                  Shyh{-}Chang Liu},
  title        = {A research on the establishment of enterprise information architecture},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402556},
  doi          = {10.1109/ICITST.2009.5402556},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/WuL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/YiXD09,
  author       = {Gao Yi and
                  Lin Xinda and
                  Wang Dong},
  title        = {A computer based strategy design for automobile spare part logistics
                  network optimization},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402534},
  doi          = {10.1109/ICITST.2009.5402534},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/YiXD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZamaniMAJTZ09,
  author       = {Mazdak Zamani and
                  Azizah Bt Abdul Manaf and
                  Rabiah Bt Ahmad and
                  Farhang Jaryani and
                  Hamed Taherdoost and
                  Akram M. Zeki},
  title        = {A secure audio steganography approach},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402644},
  doi          = {10.1109/ICITST.2009.5402644},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZamaniMAJTZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhengO09,
  author       = {Xianghan Zheng and
                  Vladimir A. Oleshchuk},
  title        = {Trust-based framework for security enhancement of {P2PSIP} communication
                  systems},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402533},
  doi          = {10.1109/ICITST.2009.5402533},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhengO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZhouKP09,
  author       = {Wei Zhou and
                  Gaurav Kapoor and
                  Selwyn Piramuthu},
  title        = {Modified Slotted {ALOHA} protocol for {RFID} tag collisions},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402629},
  doi          = {10.1109/ICITST.2009.5402629},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZhouKP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/ZolfagharBM09,
  author       = {Kiyana Zolfaghar and
                  Arash Barfar and
                  Shahriar Mohammadi},
  title        = {A framework for online counter terrorism},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402641},
  doi          = {10.1109/ICITST.2009.5402641},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/ZolfagharBM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitst/2009,
  title        = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST15451.2009},
  doi          = {10.1109/ICITST15451.2009},
  isbn         = {978-1-4244-5648-2},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}