default search action
Search dblp for Publications
export results for "stream:conf/icitst:"
@inproceedings{DBLP:conf/icitst/Al-AhmariRO20, author = {Saad Al{-}Ahmari and Karen Renaud and Inah Omoronyia}, title = {Implement a Model for Describing and Maximising Security Knowledge Sharing}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351318}, doi = {10.23919/ICITST51030.2020.9351318}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-AhmariRO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-FawarehSJE20, author = {Mohammad Al{-}Fawa'reh and Amal Saif and Mousa Tayseer Jafar and Ammar Elhassan}, title = {Malware Detection by Eating a Whole {APK}}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351333}, doi = {10.23919/ICITST51030.2020.9351333}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Al-FawarehSJE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AnthonioK20, author = {Harris Anthonio and Yvonne Hwei{-}Syn Kam}, title = {A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351349}, doi = {10.23919/ICITST51030.2020.9351349}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AnthonioK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AryehA20, author = {Felix Larbi Aryeh and Boniface Kayode Alese}, title = {A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351316}, doi = {10.23919/ICITST51030.2020.9351316}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AryehA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AshiAAQ20, author = {Zein Ashi and Laila Aburashed and Mohammad Al{-}Fawa'reh and Malik Qasaimeh}, title = {Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351347}, doi = {10.23919/ICITST51030.2020.9351347}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AshiAAQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BermudezS20, author = {Esau Bermudez and Djamel Fawzi Hadj Sadok}, title = {Energy Consumption of a LoRaWAN Network using Jarvis Algorithm}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351345}, doi = {10.23919/ICITST51030.2020.9351345}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/BermudezS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChanCG20, author = {Wai Kok Chan and Ji{-}Jian Chin and Vik Tor Goh}, title = {Evolution of Bitcoin Addresses from Security Perspectives}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351346}, doi = {10.23919/ICITST51030.2020.9351346}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChanCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DeriS20, author = {Luca Deri and Daniele Sartiano}, title = {Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351330}, doi = {10.23919/ICITST51030.2020.9351330}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/DeriS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DridiAAYM20, author = {Fethi Dridi and Safwan El Assad and Carinelle Atamech and Wajih El Hadj Youssef and Mohsen Machhout}, title = {Design and Implementation on {FPGA} Board of a Chaos-based Stream Cipher}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351328}, doi = {10.23919/ICITST51030.2020.9351328}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DridiAAYM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HueSIC20, author = {Sook{-}Yan Hue and Nor Haniza Sarmin and Eddie Shahril Ismail and Ji{-}Jian Chin}, title = {Easy Simple Factoring-based Digital Signature Scheme}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351341}, doi = {10.23919/ICITST51030.2020.9351341}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HueSIC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hunusekattte20, author = {Dhruva Hunusekattte}, title = {Smart Parking With Automated Billing System}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351312}, doi = {10.23919/ICITST51030.2020.9351312}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Hunusekattte20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KannanJG20, author = {Raadhesh Kannan and Ji{-}Jian Chin and Xiaoning Guo}, title = {Adversarial Evasion Noise Attacks Against TensorFlow Object Detection {API}}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351331}, doi = {10.23919/ICITST51030.2020.9351331}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/KannanJG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Kim20, author = {Song{-}Kyoo Amang Kim}, title = {Toward Compact Data from Big Data}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351315}, doi = {10.23919/ICITST51030.2020.9351315}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Kim20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimLL20, author = {Jong{-}Jin Kim and Sang{-}Gil Lee and Cheol{-}Hoon Lee}, title = {Real-Time supports on Tablet {PC} Platforms}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351322}, doi = {10.23919/ICITST51030.2020.9351322}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KioskliP20, author = {Kitty Kioskli and Nineta Polemi}, title = {Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351343}, doi = {10.23919/ICITST51030.2020.9351343}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KioskliP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KosakataniUT20, author = {Satoshi Kosakatani and Tetsutaro Uehara and Songpon Teerakanok}, title = {Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351320}, doi = {10.23919/ICITST51030.2020.9351320}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/KosakataniUT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LiuZC20, author = {Huangxiaolie Liu and Dong Zhang and Huijun Chen}, title = {Towards robust classification detection for adversarial examples}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351309}, doi = {10.23919/ICITST51030.2020.9351309}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/LiuZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MahmoudP20, author = {Loreen Mahmoud and Raja Praveen}, title = {Network Security Evaluation Using Deep Neural Network}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351326}, doi = {10.23919/ICITST51030.2020.9351326}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MahmoudP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MasumS20, author = {Mohammad Masum and Hossain Shahriar}, title = {{TL-NID:} Deep Neural Network with Transfer Learning for Network Intrusion Detection}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351317}, doi = {10.23919/ICITST51030.2020.9351317}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MasumS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MedhatEFS20, author = {May Medhat and Menna Essa and Hend Faisal and Samir G. Sayed}, title = {{YARAMON:} {A} Memory-based Detection Framework for Ransomware Families}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351319}, doi = {10.23919/ICITST51030.2020.9351319}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/MedhatEFS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MohamedAAK20, author = {Khalid Mohamed and Suleiman Ali and Soilahoudini Ali and Ilyas Kassim}, title = {Performance Evaluation of {RPL} and {DODAG} Formations for IoTs Applications}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351340}, doi = {10.23919/ICITST51030.2020.9351340}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/MohamedAAK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NcubukeziMR20, author = {Tabisa Ncubukezi and Laban Mwansa and Fran{\c{c}}ois Rocaries}, title = {A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351339}, doi = {10.23919/ICITST51030.2020.9351339}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/NcubukeziMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OkikeM20, author = {Ezekiel Uzor Okike and Gofaone Mogapi}, title = {A Pedagogic Analysis of Information Systems Security Measures in Online Services}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351325}, doi = {10.23919/ICITST51030.2020.9351325}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/OkikeM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/QiaoTA20, author = {Zongchao Qiao and Ina Taralova and Safwan El Assad}, title = {A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351314}, doi = {10.23919/ICITST51030.2020.9351314}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/QiaoTA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RayaM20, author = {Ali Raya and K. Mariyappn}, title = {Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: {A} Comparative Study}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351327}, doi = {10.23919/ICITST51030.2020.9351327}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RayaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SchillingerS20, author = {Fabian Schillinger and Christian Schindelhauer}, title = {Partitioned Private User Storages in End-to-End Encrypted Online Social Networks}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351335}, doi = {10.23919/ICITST51030.2020.9351335}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SchillingerS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YangTLA20, author = {Chunxiao Yang and Ina Taralova and Jean{-}Jacques Loiseau and Safwan El Assad}, title = {A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator}, booktitle = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020.9351350}, doi = {10.23919/ICITST51030.2020.9351350}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/YangTLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2020, title = {15th International Conference for Internet Technology and Secured Transactions, {ICITST} 2020, London, United Kingdom, December 8-10, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.23919/ICITST51030.2020}, doi = {10.23919/ICITST51030.2020}, isbn = {978-1-913572-21-1}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbatanM17, author = {Omotayo Kayode Abatan and Manoj S. Maharaj}, title = {Change management and the integration of information technology: Research notes from selected African universities}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {167--172}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356370}, doi = {10.23919/ICITST.2017.8356370}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbatanM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdounAHAKD17, author = {Nabil Abdoun and Safwan El Assad and Khodor Hammoud and Rima Assaf and Mohamad Khalil and Olivier D{\'{e}}forges}, title = {New keyed chaotic neural network hash function based on sponge construction}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {35--38}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356341}, doi = {10.23919/ICITST.2017.8356341}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdounAHAKD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AhmedBR17, author = {Md. Tomig Uddin Ahmed and Nazrul Islam Bhuiya and Md. Mahbubur Rahman}, title = {A secure enterprise architecture focused on security and technology-transformation {(SEAST)}}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {215--220}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356386}, doi = {10.23919/ICITST.2017.8356386}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AhmedBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlShehyariYD17, author = {Shaikha AlShehyari and Chan Yeob Yeun and Ernesto Damiani}, title = {Monitoring darknet activities by using network telescope}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {123--128}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356360}, doi = {10.23919/ICITST.2017.8356360}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlShehyariYD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlkhwaldiKQ17, author = {Abeer F. Alkhwaldi and Mumtaz M. Kamala and Rami Qahwaji}, title = {From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public services}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {298--304}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356405}, doi = {10.23919/ICITST.2017.8356405}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlkhwaldiKQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlmalkiA17, author = {Faris A. Almalki and Marios C. Angelides}, title = {Propagation modelling and performance assessment of aerial platforms deployed during emergencies}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {238--243}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356391}, doi = {10.23919/ICITST.2017.8356391}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlmalkiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiA17, author = {Abdullah Alhumaidi Alotaibi and Marios C. Angelides}, title = {A hybrid approach for femtocell co-tier interference mitigation}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {148--153}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356366}, doi = {10.23919/ICITST.2017.8356366}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiCF17, author = {Fayez Alotaibi and Nathan L. Clarke and Steven Furnell}, title = {An analysis of home user security awareness {\&} education}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {116--122}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356359}, doi = {10.23919/ICITST.2017.8356359}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiFSP17, author = {Faisal Alotaibi and Steven Furnell and Ingo Stengel and Maria Papadaki}, title = {Enhancing cyber security awareness with mobile games}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {129--134}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356361}, doi = {10.23919/ICITST.2017.8356361}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiFSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlothmanR17, author = {Basil Alothman and Prapa Rattadilok}, title = {Android botnet detection: An integrated source code mining approach}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {111--115}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356358}, doi = {10.23919/ICITST.2017.8356358}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlothmanR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlothmanR17a, author = {Basil Alothman and Prapa Rattadilok}, title = {Towards using transfer learning for Botnet Detection}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {281--282}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356400}, doi = {10.23919/ICITST.2017.8356400}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlothmanR17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlqaydiYD17, author = {Lamya Alqaydi and Chan Yeob Yeun and Ernesto Damiani}, title = {Security enhancements to {TLS} for improved national control}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {274--279}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356398}, doi = {10.23919/ICITST.2017.8356398}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlqaydiYD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlqurashiB17, author = {Saja Alqurashi and Omar Batarfi}, title = {A comparison between {API} call sequences and opcode sequences as reflectors of malware behavior}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {105--110}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356357}, doi = {10.23919/ICITST.2017.8356357}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlqurashiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlshehriM17, author = {Haya Alshehri and Farid Meziane}, title = {The influence of advanced and secure e-commerce environments on customers behaviour: The case of Saudis in the {UK}}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {332--337}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356411}, doi = {10.23919/ICITST.2017.8356411}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlshehriM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AltorbaqBS17, author = {Alaa Altorbaq and Fredrik Blix and Stina Sorman}, title = {Data subject rights in the cloud: {A} grounded study on data protection assurance in the light of {GDPR}}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {305--310}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356406}, doi = {10.23919/ICITST.2017.8356406}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AltorbaqBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlviSDMB17, author = {Ashik Mostafa Alvi and Md. Faqrul Islam Shaon and Prithvi Ranjan Das and Manazir Mustafa and Mohammad Rezaul Bari}, title = {Automated course management system}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {161--166}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356369}, doi = {10.23919/ICITST.2017.8356369}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlviSDMB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AndreevPT17, author = {Desislav Andreev and Simona Petrakieva and Ina Taralova}, title = {Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {39--42}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356342}, doi = {10.23919/ICITST.2017.8356342}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AndreevPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AvilaMSS17, author = {Anderson Holguin Avila and Brigitte Rodriguez Mendoza and Maria Bohorquez Sotelo and Delgadillo Loaiza Juan Sebastian}, title = {Work in Progress: Nobody knows who you really are online/on the world wide web - Amazon-recognition-service based 'Virtualnet' supported authentication: How certain are you it is indeed you in front of a screen?}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {342--345}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356414}, doi = {10.23919/ICITST.2017.8356414}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AvilaMSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BaddersO17, author = {Blake Badders and Aspen Olmsted}, title = {Improve {CRUD} performance on hierarchical data: Nested interval model vs. nested set model}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {370--371}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356423}, doi = {10.23919/ICITST.2017.8356423}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BaddersO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BauerSMBHITW17, author = {Elisabeth Bauer and Oliver Schluga and Silia Maksuti and Ani Bicaku and David Hofbauer and Igor Ivkic and Markus Gerhard Tauber and Alexander W{\"{o}}hrer}, title = {Towards a security baseline for IaaS-cloud back-ends in Industry 4.0}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {427--432}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356438}, doi = {10.23919/ICITST.2017.8356438}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BauerSMBHITW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BennakhiJ17, author = {Ahmad Bennakhi and Mohamed A. Jeragh}, title = {Applying dynamic verification tagging to the k-anonymity model}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {439--443}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356442}, doi = {10.23919/ICITST.2017.8356442}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BennakhiJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BertolissiBU17, author = {Clara Bertolissi and Omar Boucelma and Worachet Uttha}, title = {Enhancing security in the cloud: When traceability meets access control}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {365--366}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356420}, doi = {10.23919/ICITST.2017.8356420}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BertolissiBU17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BissadaO17, author = {Andrew Bissada and Aspen Olmsted}, title = {Mobile multi-factor authentication}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {210--211}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356383}, doi = {10.23919/ICITST.2017.8356383}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BissadaO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BlairOA17, author = {Walter Blair and Aspen Olmsted and Paul Anderson}, title = {Docker vs. {KVM:} Apache spark application performance and ease of use}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {199--201}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356378}, doi = {10.23919/ICITST.2017.8356378}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BlairOA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BlairOA17a, author = {Walter Blair and Aspen Olmsted and Paul Anderson}, title = {Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input files}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {469--471}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356451}, doi = {10.23919/ICITST.2017.8356451}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BlairOA17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BlixEL17, author = {Fredrik Blix and Salah Addin Elshekeil and Saran Laoyookhong}, title = {Data protection by design in systems development: From legal requirements to technical solutions}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {98--103}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356355}, doi = {10.23919/ICITST.2017.8356355}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BlixEL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BoumarafM17, author = {Messaouda Boumaraf and Fatiha Merazka}, title = {Speech encryption based on hybrid chaotic key generator for {AMR-WB} {G.722.2} codec}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {87--91}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356353}, doi = {10.23919/ICITST.2017.8356353}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BoumarafM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BriggsO17, author = {Thomas Briggs and Aspen Olmsted}, title = {Client side calculation of 'bacon number'}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {356--358}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356418}, doi = {10.23919/ICITST.2017.8356418}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BriggsO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BrillN17, author = {Callum Brill and Thomas Nash}, title = {A comparative analysis of {MANET} routing protocols through simulation}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {244--247}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356392}, doi = {10.23919/ICITST.2017.8356392}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BrillN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BuYJ17, author = {Shuaiyi Bu and Shuxin Yang and Haoming Ji}, title = {Distributed computing framework in security: Case study of encryption method}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {311--318}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356407}, doi = {10.23919/ICITST.2017.8356407}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BuYJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CacaisS17, author = {Michelle G. Cacais and Gilvandenys Leite Sales}, title = {A collaborative system for corporate performance evaluation using gamification and the learning vectors model}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {484--489}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356455}, doi = {10.23919/ICITST.2017.8356455}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/CacaisS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChanO17, author = {Wren Chan and Aspen Olmsted}, title = {Ethereum transaction graph analysis}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {498--500}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356459}, doi = {10.23919/ICITST.2017.8356459}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChanO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChenO17, author = {Wayne Chen and Aspen Olmsted}, title = {Considerations for OS\({}^{\mbox{V}}\) over Linux-based virtual machines}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {346--348}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356415}, doi = {10.23919/ICITST.2017.8356415}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChenO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ClincyS17, author = {Victor Clincy and Hossain Shahriar}, title = {Web service injection attack detection}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {173--178}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356371}, doi = {10.23919/ICITST.2017.8356371}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ClincyS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Cooharojananone17, author = {Nagul Cooharojananone and Krittika Akasarakul and Thipsuda Wongkhamdi and Phonkornkrit Pruetthiwongwanich and Kanokwan Atchariyachanvanich}, title = {The study of the local community products {(OTOP)} website characteristics toward buyer decision using eye tracking}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {411--416}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356434}, doi = {10.23919/ICITST.2017.8356434}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Cooharojananone17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DowlingSM17, author = {Seamus Dowling and Michael Schukat and Hugh Melvin}, title = {Using analysis of temporal variances within a honeypot dataset to better predict attack type probability}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {349--354}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356416}, doi = {10.23919/ICITST.2017.8356416}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DowlingSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DugganMDHB17, author = {Martin Duggan and Karl Mason and Jim Duggan and Enda Howley and Enda Barrett}, title = {Predicting host {CPU} utilization in cloud computing using recurrent neural networks}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {67--72}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356348}, doi = {10.23919/ICITST.2017.8356348}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/DugganMDHB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EnamamuCHL17, author = {Timibloudi S. Enamamu and Nathan L. Clarke and Paul S. Haskell{-}Dowland and Fudong Li}, title = {Transparent authentication: Utilising heart rate for user authentication}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {283--289}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356401}, doi = {10.23919/ICITST.2017.8356401}, timestamp = {Fri, 19 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/EnamamuCHL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ErnawanKM17, author = {Ferda Ernawan and Muhammad Nomani Kabir and Zuriani Mustaffa}, title = {A blind watermarking technique based on {DCT} psychovisual threshold for a robust copyright protection}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {92--97}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356354}, doi = {10.23919/ICITST.2017.8356354}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ErnawanKM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Farooqi17, author = {Norah S. Farooqi}, title = {Intelligent safety management system for crowds using sensors}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {144--147}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356365}, doi = {10.23919/ICITST.2017.8356365}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Farooqi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FeltusP17, author = {Christophe Feltus and Erik H. A. Proper}, title = {Towards a security and privacy co-creation method}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {75--80}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356351}, doi = {10.23919/ICITST.2017.8356351}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FeltusP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FischerMS17, author = {Daniel Fischer and Bernd Markscheffel and K. Scherr}, title = {Secure e-mail communication - Comparison and selection of encryption solutions using an utility value analysis approach}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {433--435}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356439}, doi = {10.23919/ICITST.2017.8356439}, timestamp = {Fri, 22 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/FischerMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Furnell17, author = {Steven Furnell}, title = {Keynote speaker 5: Taming security technology}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {19}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356335}, doi = {10.23919/ICITST.2017.8356335}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Furnell17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GiubiloSSCFL17, author = {Fabio Giubilo and Ali Sajjad and Mark Shackleton and David W. Chadwick and Wenjun Fan and Rog{\'{e}}rio de Lemos}, title = {An architecture for privacy-preserving sharing of {CTI} with 3\({}^{\mbox{rd}}\) party analysis services}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {293--297}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356404}, doi = {10.23919/ICITST.2017.8356404}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GiubiloSSCFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GoeddelSO17, author = {Stephen Goeddel and Pasha Sadeghian and Aspen Olmsted}, title = {Weighing the shopping benefits of a smarter refrigerator}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {377--378}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356425}, doi = {10.23919/ICITST.2017.8356425}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GoeddelSO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GrafK17, author = {Roman Graf and Ross King}, title = {Secured transactions technique based on smart contracts for situational awareness tools}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {81--86}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356352}, doi = {10.23919/ICITST.2017.8356352}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GrafK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HamiltonO17, author = {Cameron Hamilton and Aspen Olmsted}, title = {Database multi-factor authentication via pluggable authentication modules}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {367--368}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356421}, doi = {10.23919/ICITST.2017.8356421}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HamiltonO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HealySO17, author = {Elizabeth Healy and Husna Siddiqui and Aspen Olmsted}, title = {Classifying influenza outbreaks by analyzing and filtering Twitter data}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {205--207}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356381}, doi = {10.23919/ICITST.2017.8356381}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HealySO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HellingRO17, author = {Paul Helling and Ahana Roy and Aspen Olmsted}, title = {Effects of lexicon size on solving bananagrams}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {339--341}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356413}, doi = {10.23919/ICITST.2017.8356413}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HellingRO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HueHB17, author = {Ta Thi Kim Hue and Thang Manh Hoang and An Braeken}, title = {Lightweight signcryption scheme based on discrete Chebyshev maps}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {43--47}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356343}, doi = {10.23919/ICITST.2017.8356343}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HueHB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IvkicTW17, author = {Igor Ivkic and Markus Gerhard Tauber and Alexander W{\"{o}}hrer}, title = {Towards comparing programming paradigms}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {436--437}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356440}, doi = {10.23919/ICITST.2017.8356440}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IvkicTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IvkicWOT17, author = {Igor Ivkic and Stephan Wolfauer and Thomas Oberhofer and Markus Gerhard Tauber}, title = {On the cost of cyber security in smart business}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {255--260}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356395}, doi = {10.23919/ICITST.2017.8356395}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IvkicWOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/James17, author = {Anne E. James}, title = {Keynote speaker 4: Cloud forensics}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {18}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356334}, doi = {10.23919/ICITST.2017.8356334}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/James17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JanardhananB17, author = {Deepak Janardhanan and Enda Barrett}, title = {{CPU} workload forecasting of machines in data centers using {LSTM} recurrent neural networks and {ARIMA} models}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {55--60}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356346}, doi = {10.23919/ICITST.2017.8356346}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JanardhananB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KennedyO17, author = {William Kennedy and Aspen Olmsted}, title = {Three factor authentication}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {212--213}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356384}, doi = {10.23919/ICITST.2017.8356384}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KennedyO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Kim17, author = {Charles Kim}, title = {Keynote speaker 1: Cyber-resilient {ICS} through diversified redundancy and intrusion detection}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {15}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356331}, doi = {10.23919/ICITST.2017.8356331}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Kim17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimL17, author = {Ahyoung Kim and Junwoo Lee}, title = {Mobile business performance metrics: Framework and case study}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {179--184}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356372}, doi = {10.23919/ICITST.2017.8356372}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimYK17, author = {Daehee Kim and Jaekeun Yun and Sungjun Kim}, title = {Hybrid public key authentication for wireless sensor networks}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {142--143}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356364}, doi = {10.23919/ICITST.2017.8356364}, timestamp = {Fri, 19 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimYK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KiyomotoBRR17, author = {Shinsaku Kiyomoto and Anirban Basu and Mohammad Shahriar Rahman and Sushmita Ruj}, title = {On blockchain-based authorization architecture for beyond-5G mobile services}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {136--141}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356363}, doi = {10.23919/ICITST.2017.8356363}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KiyomotoBRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Kongsoontornkijkul17, author = {Kritika Kongsoontornkijkul and Rath Pichyangkura and Pakpachong Vadhanasindhu and Kanlaya Vanichbuncha}, title = {A study of factors effecting Thailand talent mobility programme: Case of university and food technology industry}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {444--449}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356443}, doi = {10.23919/ICITST.2017.8356443}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Kongsoontornkijkul17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KumarV017, author = {Sanjay Kumar and Ari Viinikainen and Timo H{\"{a}}m{\"{a}}l{\"{a}}inen}, title = {Evaluation of ensemble machine learning methods in mobile threat detection}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {261--268}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356396}, doi = {10.23919/ICITST.2017.8356396}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KumarV017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Lee17, author = {Yen{-}Mei Lee}, title = {Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {320--324}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356409}, doi = {10.23919/ICITST.2017.8356409}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Lee17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LileO17, author = {Ryan Lile and Aspen Olmsted}, title = {Meaningful sandbox data}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {203--204}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356380}, doi = {10.23919/ICITST.2017.8356380}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LileO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LiuL017, author = {Juhua Liu and Wei Li and Guoqiang Bai}, title = {Efficient hardware implementation of ITUbee for lightweight application}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {372--376}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356424}, doi = {10.23919/ICITST.2017.8356424}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LiuL017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LoiO17, author = {Huicong Loi and Aspen Olmsted}, title = {Low-cost detection of backdoor malware}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {197--198}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356377}, doi = {10.23919/ICITST.2017.8356377}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LoiO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MaWW17, author = {Yichen Ma and Fuyao Wang and Zhuozheng Wang}, title = {Intelligent laboratory management system based on Internet of Things}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {464--467}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356449}, doi = {10.23919/ICITST.2017.8356449}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MaWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MahmoodNM17, author = {Khurram Mahmood and Zainab Nayyar and Hafiz Mushtaq}, title = {Role of transformational leadership on e-govemment switching: Multi-channel and digital divide}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {475--478}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356453}, doi = {10.23919/ICITST.2017.8356453}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MahmoodNM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Malfa17, author = {Enrico Malfa}, title = {Keynote speaker 6: Steel made in Europe: The backbone of sustainability}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {20}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356336}, doi = {10.23919/ICITST.2017.8356336}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Malfa17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MashhadaniACFL17, author = {Shahlaa Mashhadani and Hiba Al{-}Kawaz and Nathan L. Clarke and Steven Furnell and Fudong Li}, title = {A novel multimedia-forensic analysis tool {(M-FAT)}}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {388--395}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356429}, doi = {10.23919/ICITST.2017.8356429}, timestamp = {Wed, 22 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/MashhadaniACFL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/McShaneS17, author = {Philip McShane and Darryl Stewart}, title = {Challenge based visual speech recognition using deep learning}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {405--410}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356433}, doi = {10.23919/ICITST.2017.8356433}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/McShaneS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Mejia-RicartHO17, author = {Luis F. Mejia{-}Ricart and Paul Helling and Aspen Olmsted}, title = {Evaluate action primitives for human activity recognition using unsupervised learning approach}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {186--188}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356374}, doi = {10.23919/ICITST.2017.8356374}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Mejia-RicartHO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Mejia-RicartO17, author = {Luis F. Mejia{-}Ricart and Aspen Olmsted}, title = {Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {472--474}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356452}, doi = {10.23919/ICITST.2017.8356452}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Mejia-RicartO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NashO17, author = {Thomas Nash and Aspen Olmsted}, title = {Performance vs. security: Implementing an immutable database in MySQL}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {290--291}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356402}, doi = {10.23919/ICITST.2017.8356402}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NashO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NashO17a, author = {Thomas Nash and Aspen Olmsted}, title = {shinySDM: Point and click species distribution modeling}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {450--451}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356444}, doi = {10.23919/ICITST.2017.8356444}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NashO17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NiazS17, author = {Muhammad Saqib Niaz and Gunter Saake}, title = {Forward secure searchable symmetric encryption}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {49--54}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356345}, doi = {10.23919/ICITST.2017.8356345}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NiazS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ObinnaPCT17, author = {Omego Obinna and Eckhard Pfluegel and Charles A. Clarke and Martin J. Tunnicliffe}, title = {A multi-channel steganographic protocol for secure {SMS} mobile banking}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {248--253}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356393}, doi = {10.23919/ICITST.2017.8356393}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ObinnaPCT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Olmsted17, author = {Aspen Olmsted}, title = {Entity identity, performance, and storage}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {155--160}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356368}, doi = {10.23919/ICITST.2017.8356368}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Olmsted17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OmraniBMRB17, author = {Tasnime Omrani and Rabei Becheikh and Olfa Mannai and Rhouma Rhouma and Safya Belghith}, title = {{RARE:} {A} robust algorithm for rapid encryption}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {23--28}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356339}, doi = {10.23919/ICITST.2017.8356339}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OmraniBMRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OwensO17, author = {Preston T. Owens and Aspen Olmsted}, title = {Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {379--380}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356426}, doi = {10.23919/ICITST.2017.8356426}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OwensO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PadayacheeW17, author = {Keshnee Padayachee and Elias Worku}, title = {Shared situational awareness in information security incident management}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {479--483}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356454}, doi = {10.23919/ICITST.2017.8356454}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PadayacheeW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PellegriniRS17, author = {Roland Pellegrini and Patrick Rottmann and Georg Strieder}, title = {Preventing vendor lock-ins via an interoperable multi-cloud deployment approach}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {382--387}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356428}, doi = {10.23919/ICITST.2017.8356428}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PellegriniRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Pournaras17, author = {Evangelos Pournaras}, title = {Keynote speaker 2: Participatory self-management systems for resilient smart cities}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {16}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356332}, doi = {10.23919/ICITST.2017.8356332}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Pournaras17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RoyMHO17, author = {Ahana Roy and Louis Mejia and Paul Helling and Aspen Olmsted}, title = {Automation of cyber-reconnaissance: {A} Java-based open source tool for information gathering}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {424--426}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356437}, doi = {10.23919/ICITST.2017.8356437}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RoyMHO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RoyO17, author = {Ahana Roy and Aspen Olmsted}, title = {Distributed query processing and data sharing}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {221--224}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356387}, doi = {10.23919/ICITST.2017.8356387}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RoyO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SadeghianO17, author = {Pasha Sadeghian and Aspen Olmsted}, title = {Assessment of fuzzy min-max neural networks for classification tasks}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {193--196}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356376}, doi = {10.23919/ICITST.2017.8356376}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SadeghianO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SadeghianWGO17, author = {Pasha Sadeghian and Casey Wilson and Stephen Goeddel and Aspen Olmsted}, title = {Classification of music by composer using fuzzy min-max neural networks}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {189--192}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356375}, doi = {10.23919/ICITST.2017.8356375}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SadeghianWGO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaidiHRB17, author = {Marwa Saidi and Houcemeddine Hermassi and Rhouma Rhouma and Safya Belghith}, title = {LSB-hamming based chaotic steganography (LH-Steg)}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {29--34}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356340}, doi = {10.23919/ICITST.2017.8356340}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SaidiHRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SandiferWO17, author = {Anna V. Sandifer and Casey Wilson and Aspen Olmsted}, title = {Detection of fake online hotel reviews}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {501--502}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356460}, doi = {10.23919/ICITST.2017.8356460}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SandiferWO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SelcukOB17, author = {Ali Aydin Sel{\c{c}}uk and Fatih Orhan and Berker Batur}, title = {Undecidable problems in malware analysis}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {494--497}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356458}, doi = {10.23919/ICITST.2017.8356458}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SelcukOB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShawHB17, author = {Rachael Shaw and Enda Howley and Enda Barrett}, title = {An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centers}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {61--66}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356347}, doi = {10.23919/ICITST.2017.8356347}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ShawHB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SiddavaatamSS17, author = {Prathap Siddavaatam and Reza Sedaghat and Aakriti Tarun Sharma}, title = {intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {359--364}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356419}, doi = {10.23919/ICITST.2017.8356419}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SiddavaatamSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SiddiquiHO17, author = {Husna Siddiqui and Elizabeth Healy and Aspen Olmsted}, title = {Bot or not}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {462--463}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356448}, doi = {10.23919/ICITST.2017.8356448}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SiddiquiHO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SiddiquiOK17, author = {Husna Siddiqui and Aspen Olmsted and Brendan Keane}, title = {Venmo: Exposing a user's lifestyle}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {403--404}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356432}, doi = {10.23919/ICITST.2017.8356432}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SiddiquiOK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SrimuangCTCA17, author = {Chatipot Srimuang and Nagul Cooharojananone and Uthai Tanlamai and Achara Chandrachai and Kanokwan Atchariyachanvanich}, title = {The study of public organization's intention to use an open government data assessment application: Testing with an applicable {TAM}}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {231--236}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356389}, doi = {10.23919/ICITST.2017.8356389}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/SrimuangCTCA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/StoudenmierO17, author = {Seth Stoudenmier and Aspen Olmsted}, title = {Efficient retrieval of information from hierarchical {REST} requests}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {452--454}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356445}, doi = {10.23919/ICITST.2017.8356445}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/StoudenmierO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Tochikubo17, author = {Kouya Tochikubo}, title = {Multiple assignment secret sharing scheme using hierarchical threshold scheme}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {456--461}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356447}, doi = {10.23919/ICITST.2017.8356447}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Tochikubo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/UtomoWW17, author = {Rio Guntur Utomo and Robert John Walters and Gary B. Wills}, title = {Factors affecting the implementation of information assurance for eGovernment in Indonesia}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {225--230}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356388}, doi = {10.23919/ICITST.2017.8356388}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/UtomoWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Wanchai17, author = {Paweena Wanchai}, title = {Customer churn analysis : {A} case study on the telecommunication industry of Thailand}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {325--331}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356410}, doi = {10.23919/ICITST.2017.8356410}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Wanchai17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Wills17, author = {Gary B. Wills}, title = {Keynote speaker 3: Looking after our {IP} in supply chain}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {17}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356333}, doi = {10.23919/ICITST.2017.8356333}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Wills17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WilsonO17, author = {Casey Wilson and Aspen Olmsted}, title = {Handling an organization's communication needs with a single web service}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {208--209}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356382}, doi = {10.23919/ICITST.2017.8356382}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WilsonO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WilsonSO17, author = {Casey Wilson and Anna V. Sandifer and Aspen Olmsted}, title = {Designing an assembly language using {MIT} App inventor}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {491--493}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356457}, doi = {10.23919/ICITST.2017.8356457}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WilsonSO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YuenC17, author = {W. P. Yuen and K. B. Chuah}, title = {Data visibility and trust enhancement of enterprise customers in cloud computing services}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {417--422}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356435}, doi = {10.23919/ICITST.2017.8356435}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YuenC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZarghoonADD17, author = {Abidullah Zarghoon and Irfan Awan and Jules Pagna Disso and Richard Dennis}, title = {Evaluation of {AV} systems against modern malware}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {269--273}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356397}, doi = {10.23919/ICITST.2017.8356397}, timestamp = {Tue, 19 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ZarghoonADD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZeffererZR17, author = {Thomas Zefferer and Dominik Ziegler and Andreas Reiter}, title = {Best of two worlds: Secure cloud federations meet eIDAS}, booktitle = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, pages = {396--401}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.23919/ICITST.2017.8356430}, doi = {10.23919/ICITST.2017.8356430}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZeffererZR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2017, title = {12th International Conference for Internet Technology and Secured Transactions, {ICITST} 2017, Cambridge, United Kingdom, December 11-14, 2017}, publisher = {{IEEE}}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8354335/proceeding}, isbn = {978-1-908320-93-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AhmedKBC16, author = {Adnan Ahmed and Pardeep Kumar and Ali Raza Bhangwar and Muhammad Ibrahim Channa}, title = {A secure and QoS aware routing protocol for Wireless Sensor Network}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {313--317}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856720}, doi = {10.1109/ICITST.2016.7856720}, timestamp = {Sat, 27 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AhmedKBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-MohammedL16, author = {Emad Al{-}Mohammed and Nigel Linge}, title = {A generic, personalized electronic program guide system for accessing multiple online {TV} providers}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {291--296}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856715}, doi = {10.1109/ICITST.2016.7856715}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-MohammedL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-NaffakhCDL16, author = {Neamah Al{-}Naffakh and Nathan L. Clarke and Paul Dowland and Fudong Li}, title = {Activity Recognition using wearable computing}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {189--195}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856695}, doi = {10.1109/ICITST.2016.7856695}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-NaffakhCDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-SmadiQTAJB16, author = {Mohammad Al{-}Smadi and Omar Qawasmeh and Bashar Talafha and Mahmoud Al{-}Ayyoub and Yaser Jararweh and Elhadj Benkhelifa}, title = {An enhanced framework for aspect-based sentiment analysis of Hotels' reviews: Arabic reviews case study}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {98--103}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856675}, doi = {10.1109/ICITST.2016.7856675}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-SmadiQTAJB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alazri16, author = {Aisha Suliaman Alazri}, title = {Telecommunication traffic through submarine cables: Security and vulnerabilities}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {372--375}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856733}, doi = {10.1109/ICITST.2016.7856733}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alazri16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlghafliM16, author = {Khawla Alghafli and Thomas Martin}, title = {Identification and recovery of video fragments for forensics file carving}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {267--272}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856710}, doi = {10.1109/ICITST.2016.7856710}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlghafliM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlmarashdehA16, author = {Ibrahim Almarashdeh and Mutasem Alsmadi}, title = {Heuristic evaluation of mobile government portal services: An experts' review}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {427--431}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856746}, doi = {10.1109/ICITST.2016.7856746}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlmarashdehA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlmubairikW16, author = {Norah Ahmed Almubairik and Gary B. Wills}, title = {Automated penetration testing based on a threat model}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {413--414}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856742}, doi = {10.1109/ICITST.2016.7856742}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlmubairikW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alomari16, author = {Mohammad Kamel Alomari}, title = {Digital divide impact on e-voting adoption in middle eastern country}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {409--412}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856741}, doi = {10.1109/ICITST.2016.7856741}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alomari16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiFC16, author = {Mutlaq Jalimid Alotaibi and Steven Furnell and Nathan L. Clarke}, title = {Information security policies: {A} review of challenges and influencing factors}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {352--358}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856729}, doi = {10.1109/ICITST.2016.7856729}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiFC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiFSP16, author = {Faisal Alotaibi and Steven Furnell and Ingo Stengel and Maria Papadaki}, title = {A survey of cyber-security awareness in Saudi Arabia}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {154--158}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856687}, doi = {10.1109/ICITST.2016.7856687}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiFSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotibiCLF16, author = {Gaseb Alotibi and Nathan L. Clarke and Fudong Li and Steven Furnell}, title = {User profiling from network traffic via novel application-level interactions}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {279--285}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856712}, doi = {10.1109/ICITST.2016.7856712}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotibiCLF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlsalamiYMK16, author = {Yousuf Alsalami and Chan Yeob Yeun and Thomas Martin and Majid Khonji}, title = {Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {447--454}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856751}, doi = {10.1109/ICITST.2016.7856751}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlsalamiYMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmanoONKMN16, author = {Takashi Amano and Ryo Onuma and Hiroki Nakayama and Hiroaki Kaminaga and Youzou Miyadera and Shoichi Nakamura}, title = {Gaze network extraction from bookmarks in accordance with search intentions}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {472--473}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856756}, doi = {10.1109/ICITST.2016.7856756}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmanoONKMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Anton-Haro16, author = {Carles Ant{\'{o}}n{-}Haro}, title = {Invited speaker {(IEEE} Spain section professional activities): Scientific resumes and job interviews - how to make (a positive) impact}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {20}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856656}, doi = {10.1109/ICITST.2016.7856656}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Anton-Haro16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArakawaNOKMN16, author = {Daisuke Arakawa and Hiroki Nakayama and Ryo Onuma and Hiroaki Kaminaga and Youzou Miyadera and Shoichi Nakamura}, title = {Dynamically visualizing the relationships between Web pages depending on user's search viewpoints}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {474--475}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856757}, doi = {10.1109/ICITST.2016.7856757}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ArakawaNOKMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BensimessaoudBB16, author = {Sihem Bensimessaoud and Nadjib Badache and Souad Benmeziane and Amina Djellalbia}, title = {An enhanced approach to preserving privacy in social network data publishing}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {80--85}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856671}, doi = {10.1109/ICITST.2016.7856671}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BensimessaoudBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BuccafurriLNN16, author = {Francesco Buccafurri and Gianluca Lax and Serena Nicolazzo and Antonino Nocera}, title = {Range query integrity in the cloud: the case of video surveillance}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {170--175}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856691}, doi = {10.1109/ICITST.2016.7856691}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BuccafurriLNN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Clarke16, author = {Sandra Stincic Clarke}, title = {Keynote speaker 4: Data silos of the IoT kind}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {19}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856655}, doi = {10.1109/ICITST.2016.7856655}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Clarke16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Corcho16, author = {{\'{O}}scar Corcho}, title = {Keynote speaker 3: Open Data city portals: Working towards their homogeneisation}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {18}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856654}, doi = {10.1109/ICITST.2016.7856654}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Corcho16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DjellalbiaBBB16, author = {Amina Djellalbia and Nadjib Badache and Souad Benmeziane and Sihem Bensimessaoud}, title = {Anonymous authentication scheme in e-Health Cloud environment}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {47--52}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856664}, doi = {10.1109/ICITST.2016.7856664}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DjellalbiaBBB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FayR16, author = {Robin Fay and Christoph Ruland}, title = {Compressive Sensing encryption modes and their security}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {119--126}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856681}, doi = {10.1109/ICITST.2016.7856681}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FayR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FurnellS16, author = {Steven Furnell and Charles A. Shoniregun}, title = {Welcome message}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {3}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856648}, doi = {10.1109/ICITST.2016.7856648}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FurnellS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GarasymTL16, author = {Oleg Garasym and Ina Taralova and Ren{\'{e}} Lozi}, title = {Key requirements for the design of robust chaotic {PRNG}}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {33--38}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856660}, doi = {10.1109/ICITST.2016.7856660}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GarasymTL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GhannamiS16, author = {Aiman Ghannami and Chenxi Shao}, title = {Experience-based learning for identifying sub-regions in Wireless Sensor Networks}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {326--327}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856722}, doi = {10.1109/ICITST.2016.7856722}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GhannamiS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GhannamiS16a, author = {Aiman Ghannami and Chenxi Shao}, title = {Efficient fast recovery mechanism in Software-Defined Networks: Multipath routing approach}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {432--435}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856747}, doi = {10.1109/ICITST.2016.7856747}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GhannamiS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GrecoCB16, author = {Alessandro Greco and Alberto Caponi and Giuseppe Bianchi}, title = {Facing lateral movements using widespread behavioral probes}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {159--160}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856688}, doi = {10.1109/ICITST.2016.7856688}, timestamp = {Mon, 26 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/GrecoCB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Guzman-Candelario16, author = {Cynthia Lizbeth Guzman{-}Candelario and Jose Juan Garcia{-}Hernandez and Loreto Gonzalez{-}Hernandez}, title = {A low-distortion {QR} Code watermarking scheme for digital color images robust to gamma correction attack}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {27--32}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856659}, doi = {10.1109/ICITST.2016.7856659}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Guzman-Candelario16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HajjemB16, author = {Lotfi Hajjem and Salah Benabdallah}, title = {An {MMAS-GA} for resource allocation in multi-cloud systems}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {421--426}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856745}, doi = {10.1109/ICITST.2016.7856745}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HajjemB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hernandez-Ardieta16, author = {Jorge Lopez Hernandez{-}Ardieta}, title = {Keynote speaker 2: Cyber ranges: The (r)evolution in cybersecurity training}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {16--17}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856653}, doi = {10.1109/ICITST.2016.7856653}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Hernandez-Ardieta16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HuSCCFC16, author = {Yi Hu and Dustin Sulek and Anthony Carella and Joshua Cox and Allyson Frame and Karen Cipriano}, title = {Employing miniaturized computers for distributed vulnerability assessment}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {57--61}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856666}, doi = {10.1109/ICITST.2016.7856666}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HuSCCFC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JallouliAC16, author = {Ons Jallouli and Safwan El Assad and Maryline Chetto}, title = {Robust chaos-based stream-cipher for secure public communication channels}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {23--26}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856658}, doi = {10.1109/ICITST.2016.7856658}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/JallouliAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JameiiM16, author = {Seyed Mahdi Jameii and Mohsen Maadani}, title = {Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {416--420}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856744}, doi = {10.1109/ICITST.2016.7856744}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JameiiM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KarabeyA16, author = {Isil Karabey and Gamze Akman}, title = {A cryptographic approach for secure client - server chat application using public key infrastructure {(PKI)}}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {442--446}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856750}, doi = {10.1109/ICITST.2016.7856750}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KarabeyA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KassimA16, author = {Murizah Kassim and Nor Azura Ayop}, title = {Adaptive Policing Algorithms on inbound internet traffic using Generalized Pareto model}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {217--222}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856700}, doi = {10.1109/ICITST.2016.7856700}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KassimA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhattakIHSPL16, author = {Asad Masood Khattak and Farkhund Iqbal and Patrick C. K. Hung and Jwo{-}Shiun Sun and Guan{-}Pu Pan and Jing{-}Jie Lin}, title = {Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi {(HAAD)}}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {204--209}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856697}, doi = {10.1109/ICITST.2016.7856697}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/KhattakIHSPL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KumarV016, author = {Sanjay Kumar and Ari Viinikainen and Timo H{\"{a}}m{\"{a}}l{\"{a}}inen}, title = {Machine learning classification model for Network based Intrusion Detection System}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {242--249}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856705}, doi = {10.1109/ICITST.2016.7856705}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KumarV016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KuusijarviSSE16, author = {Jarkko Kuusij{\"{a}}rvi and Reijo Savola and Pekka Savolainen and Antti Evesti}, title = {Mitigating IoT security threats with a trusted Network element}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {260--265}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856708}, doi = {10.1109/ICITST.2016.7856708}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KuusijarviSSE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KvetV16, author = {Michal Kvet and Monika Vajsov{\'{a}}}, title = {Performance study of the index structures in audited environment}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {459--464}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856753}, doi = {10.1109/ICITST.2016.7856753}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KvetV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LawXXDYCK16, author = {Chung Kwan Law and Wen Xie and Zheng Xu and Yi Dou and Chin Ting Yu and Henry C. B. Chan and Daniel Wai Kei Kwong}, title = {System and Protocols for secure Intercloud Communications}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {399--404}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856739}, doi = {10.1109/ICITST.2016.7856739}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/LawXXDYCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LittleO16, author = {Madeline Little and Aspen Olmsted}, title = {Temporal resource scheduling equity}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {297--299}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856716}, doi = {10.1109/ICITST.2016.7856716}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LittleO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LupianaM16, author = {Dennis M. Lupiana and Fredrick Mtenzi}, title = {KiCM: {A} knowledge-intensive context model}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {223--229}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856701}, doi = {10.1109/ICITST.2016.7856701}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/LupianaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MarHLW16, author = {Kheng Kok Mar and ZhengQing Hu and Chee Yong Law and Meifen Wang}, title = {Secure cloud distributed file system}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {176--181}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856692}, doi = {10.1109/ICITST.2016.7856692}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MarHLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Marques-ArpaS16, author = {Tomas Marques{-}Arpa and Jordi Serra{-}Ruiz}, title = {{PRS} signal in acquiring evidence of Digital Chain of Custody}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {273--278}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856711}, doi = {10.1109/ICITST.2016.7856711}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Marques-ArpaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Michalas16, author = {Antonis Michalas}, title = {Sharing in the rain: Secure and efficient data sharing for the Cloud}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {182--187}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856693}, doi = {10.1109/ICITST.2016.7856693}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Michalas16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MichelinZCNO16, author = {Regio A. Michelin and Avelino F. Zorzo and Marcia B. Campos and Charles V. Neu and Alex M. S. Orozco}, title = {Smartphone as a biometric service for web authentication}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {405--408}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856740}, doi = {10.1109/ICITST.2016.7856740}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MichelinZCNO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MillerB16, author = {Sean T. Miller and Curtis Busby{-}Earle}, title = {The role of machine learning in botnet detection}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {359--364}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856730}, doi = {10.1109/ICITST.2016.7856730}, timestamp = {Mon, 08 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MillerB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MoganediMM16, author = {Sophia Moganedi and Njabulo Mkhonto and Jabu Mtsweni}, title = {Evaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing services}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {335--339}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856725}, doi = {10.1109/ICITST.2016.7856725}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MoganediMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MohamedM16, author = {Belghachi Mohamed and Feham Mohamed}, title = {Experimental evaluation of {RPL} protocol}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {455--458}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856752}, doi = {10.1109/ICITST.2016.7856752}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MohamedM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MostefaS16, author = {Benfilali Mostefa and Sofiane Boukli Hacene}, title = {Adaptive image compression in wireless sensor networks}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {437--441}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856749}, doi = {10.1109/ICITST.2016.7856749}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MostefaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MoyoL16, author = {Moses Moyo and Marianne Loock}, title = {South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: {A} literature review}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {250--254}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856706}, doi = {10.1109/ICITST.2016.7856706}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MoyoL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MykhailenkoNH16, author = {Hlib Mykhailenko and Giovanni Neglia and Fabrice Huet}, title = {Which metrics for vertex-cut partitioning?}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {74--79}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856670}, doi = {10.1109/ICITST.2016.7856670}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MykhailenkoNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NakayamaNNMKM16, author = {Hiroki Nakayama and Shoichi Nakamura and Kaname Nozaki and Yasuhiko Morimoto and Hiroaki Kaminaga and Youzou Miyadera}, title = {Learning History Transition Graphs for understanding the programming learning situations}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {476--477}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856758}, doi = {10.1109/ICITST.2016.7856758}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NakayamaNNMKM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NardoneRM16, author = {Roberto Nardone and Ricardo J. Rodr{\'{\i}}guez and Stefano Marrone}, title = {Formal security assessment of Modbus protocol}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {142--147}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856685}, doi = {10.1109/ICITST.2016.7856685}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/NardoneRM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NassarET16, author = {Mohamed A. Nassar and Layla A. A. El{-}Sayed and Yousry Taha}, title = {Efficient parallel Stochastic Gradient Descent for matrix factorization using {GPU}}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {63--68}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856668}, doi = {10.1109/ICITST.2016.7856668}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NassarET16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NawrathFM16, author = {T. Nawrath and Daniel Fischer and Bernd Markscheffel}, title = {Privacy-sensitive data in connected cars}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {392--393}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856736}, doi = {10.1109/ICITST.2016.7856736}, timestamp = {Fri, 22 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/NawrathFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NeuZOM16, author = {Charles V. Neu and Avelino F. Zorzo and Alex M. S. Orozco and Regio A. Michelin}, title = {An approach for detecting encrypted insider attacks on OpenFlow {SDN} Networks}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {210--215}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856698}, doi = {10.1109/ICITST.2016.7856698}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NeuZOM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NiranjanMD16, author = {Niranjan Sivakumar and Maxime Crepel and Dominique Boullier}, title = {Risk management in payment system architectures}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {478}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856759}, doi = {10.1109/ICITST.2016.7856759}, timestamp = {Mon, 04 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NiranjanMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Olmsted16, author = {Aspen Olmsted}, title = {Modeling cloud applications for partition contingency}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {230--234}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856702}, doi = {10.1109/ICITST.2016.7856702}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Olmsted16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Ordonez-AnteVSW16, author = {Leandro Ordo{\~{n}}ez{-}Ante and Thomas Vanhove and Gregory van Seghbroeck and Tim Wauters and Filip De Turck}, title = {Interactive querying and data visualization for abuse detection in social network sites}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {104--109}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856676}, doi = {10.1109/ICITST.2016.7856676}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Ordonez-AnteVSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OrozcoNMZ16, author = {Alex M. S. Orozco and Charles V. Neu and Regio A. Michelin and Avelino F. Zorzo}, title = {Security analysis of forwarding strategies in network time measurements using Openflow}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {148--153}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856686}, doi = {10.1109/ICITST.2016.7856686}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OrozcoNMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OzcanO16, author = {Gozde Ozcan and Sule G{\"{u}}nd{\"{u}}z {\"{O}}g{\"{u}}d{\"{u}}c{\"{u}}}, title = {Applying different classification techniques in reciprocal job recommender system for considering job candidate preferences}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {235--240}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856703}, doi = {10.1109/ICITST.2016.7856703}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OzcanO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RababahASJJ16, author = {Abdullateef Rabab'ah and Mahmoud Al{-}Ayyoub and Mohammed A. Shehab and Yaser Jararweh and Bernard J. Jansen}, title = {Using the Panama Papers to explore the financial networks of the Middle East}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {92--97}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856674}, doi = {10.1109/ICITST.2016.7856674}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RababahASJJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RafiqueAJL16, author = {Aasim Rafique and Shoaib Azam and Moongu Jeon and Sangwook Lee}, title = {Face-deidentification in images using Restricted Boltzmann Machines}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {69--73}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856669}, doi = {10.1109/ICITST.2016.7856669}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RafiqueAJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Rashidibajgan16, author = {Samaneh Rashidibajgan}, title = {A trust structure for detection of sybil attacks in opportunistic networks}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {347--351}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856728}, doi = {10.1109/ICITST.2016.7856728}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Rashidibajgan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SalahZYAA16, author = {Tasneem Salah and M. Jamal Zemerly and Chan Yeob Yeun and Mahmoud Al{-}Qutayri and Yousof Al{-}Hammadi}, title = {The evolution of distributed systems towards microservices architecture}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {318--325}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856721}, doi = {10.1109/ICITST.2016.7856721}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SalahZYAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SalmanA16, author = {Aymen J. Salman and Adil Al{-}Yasiri}, title = {Developing Domain-Specific Language for Wireless Sensor Network application development}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {301--308}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856718}, doi = {10.1109/ICITST.2016.7856718}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/SalmanA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SampedroS16, author = {Andres Paz Sampedro and Shantanu Srivastava}, title = {Cost to serve of large scale online systems}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {395--398}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856738}, doi = {10.1109/ICITST.2016.7856738}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SampedroS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SantosS16, author = {Tiago Santos and Carlos Serr{\~{a}}o}, title = {Secure Javascript Object Notation (SecJSON) Enabling granular confidentiality and integrity of {JSON} documents}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {329--334}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856724}, doi = {10.1109/ICITST.2016.7856724}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SantosS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Sarier16, author = {Neyire Deniz Sarier}, title = {Efficient biometric-based Encryption for fingerprints}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {127--132}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856682}, doi = {10.1109/ICITST.2016.7856682}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Sarier16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SeddikiD16, author = {Nouredine Seddiki and Amel Douli}, title = {Maximizing the wireless sensor networks lifetime}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {309--312}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856719}, doi = {10.1109/ICITST.2016.7856719}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SeddikiD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SethiPW16, author = {Aneesha Sethi and Federica Paci and Gary B. Wills}, title = {EEVi - framework for evaluating the effectiveness of visualization in cyber-security}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {340--345}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856726}, doi = {10.1109/ICITST.2016.7856726}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SethiPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SiddavaatamSC16, author = {Prathap Siddavaatam and Reza Sedaghat and Min Hsuan Cheng}, title = {An adaptive security framework with extensible computational complexity for cipher systems}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {133--140}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856683}, doi = {10.1109/ICITST.2016.7856683}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SiddavaatamSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Spenger016, author = {Gabriele Spenger and J{\"{o}}rg Keller}, title = {Structural improvements of chaotic {PRNG} implementations}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {465--470}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856754}, doi = {10.1109/ICITST.2016.7856754}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Spenger016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Srinivasan16, author = {S. Srinivasan}, title = {Data privacy concerns involving cloud}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {53--56}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856665}, doi = {10.1109/ICITST.2016.7856665}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Srinivasan16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TajanWRA16, author = {Louis Tajan and Dirk Westhoff and Christian A. Reuter and Frederik Armknecht}, title = {Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {162--169}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856690}, doi = {10.1109/ICITST.2016.7856690}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TajanWRA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TawalbehAH16, author = {Lo'ai Ali Tawalbeh and Turki F. Al{-}Somani and Hilal Houssain}, title = {Towards secure communications: Review of side channel attacks and countermeasures on {ECC}}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {87--91}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856673}, doi = {10.1109/ICITST.2016.7856673}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TawalbehAH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TorreKSA16, author = {Ilaria Torre and Frosina Koceva and Odnan Ref Sanchez and Giovanni Adorni}, title = {A framework for personal data protection in the IoT}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {384--391}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856735}, doi = {10.1109/ICITST.2016.7856735}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TorreKSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/UahhabiB16, author = {Zakia El Uahhabi and Hanan El Bakkali}, title = {An approach for evaluating trust in {X.509} certificates}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {196--203}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856696}, doi = {10.1109/ICITST.2016.7856696}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/UahhabiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VarshneyMA16, author = {Gaurav Varshney and Manoj Misra and Pradeep K. Atrey}, title = {Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {365--370}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856731}, doi = {10.1109/ICITST.2016.7856731}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VarshneyMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VasconcelosFM16, author = {Pedro Roger Magalh{\~{a}}es Vasconcelos and Gisele Azevedo de Ara{\'{u}}jo Freitas and Thales Guimaraes Marques}, title = {Virtualization technologies in web conferencing systems: {A} performance overview}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {376--383}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856734}, doi = {10.1109/ICITST.2016.7856734}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VasconcelosFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VeleaG16, author = {Radu Velea and Noel Gordon}, title = {Comparison of color profile gamut coverage for computer monitors}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {287--290}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856714}, doi = {10.1109/ICITST.2016.7856714}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VeleaG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VidalBRB16, author = {Gerard Vidal and Rabei Bechikh and Rhouma Rhouma and Safya Belghith}, title = {A commercial application of a chaos-based-stream cipher: Performance and Security analysis}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {39--44}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856661}, doi = {10.1109/ICITST.2016.7856661}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VidalBRB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VieiraS16, author = {Tiago Vieira and Carlos Serr{\~{a}}o}, title = {Web security in the finance sector}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {255--259}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856707}, doi = {10.1109/ICITST.2016.7856707}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VieiraS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Visser16, author = {Martin Visser}, title = {Keynote speaker 1: Critical Infrastructures {SMART} ready?}, booktitle = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, pages = {15}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICITST.2016.7856652}, doi = {10.1109/ICITST.2016.7856652}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Visser16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2016, title = {11th International Conference for Internet Technology and Secured Transactions, {ICITST} 2016, Barcelona, Spain, December 5-7, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7847254/proceeding}, isbn = {978-1-908320-73-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdounATADK15, author = {Nabil Abdoun and Safwan El Assad and Mohammad AbuTaha and Rima Assaf and Olivier D{\'{e}}forges and Mohamad Khalil}, title = {Hash function based on efficient Chaotic Neural Network}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {32--37}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412051}, doi = {10.1109/ICITST.2015.7412051}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdounATADK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbuTahaAFQD15, author = {Mohammed AbuTaha and Safwan El Assad and Mousa Farajallah and Audrey Queudet and Olivier D{\'{e}}forges}, title = {Chaos-based cryptosystems using dependent diffusion: An overview}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {44--49}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412053}, doi = {10.1109/ICITST.2015.7412053}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbuTahaAFQD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-Fedaghi15, author = {Sabah Al{-}Fedaghi}, title = {Conceptual maps for physical security}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {343--348}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412118}, doi = {10.1109/ICITST.2015.7412118}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-Fedaghi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-Khasawneh15, author = {Ahmad Al{-}Khasawneh}, title = {Toward power consumption in partitioned Wireless Sensors Networks routing technique}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {238--241}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412097}, doi = {10.1109/ICITST.2015.7412097}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-Khasawneh15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-khomsanAAA15, author = {Mashail N. Alkhomsan and Alaa Al{-}Arjan and Abrar Al{-}Amro and Khalid Al{-}Nafjan}, title = {Usability evaluation of Twitter on Android platform for elderly Arab users using morae evaluation tool}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {446--447}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412139}, doi = {10.1109/ICITST.2015.7412139}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-khomsanAAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alazri15, author = {Aisha Suliaman Alazri}, title = {The awareness of social engineering in information revolution: Techniques and challenges}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {198--201}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412088}, doi = {10.1109/ICITST.2015.7412088}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alazri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AldawsariBE15, author = {Bandar Aldawsari and Thar Baker and David England}, title = {Towards a holistic brokerage system for multi-cloud environment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {249--255}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412100}, doi = {10.1109/ICITST.2015.7412100}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AldawsariBE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlkeemYZ15, author = {Ebrahim Al Alkeem and Chan Yeob Yeun and M. Jamal Zemerly}, title = {Security and privacy framework for ubiquitous healthcare IoT devices}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {70--75}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412059}, doi = {10.1109/ICITST.2015.7412059}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlkeemYZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlmutairiPF15, author = {Abdulrazaq Almutairi and David J. Parish and James A. Flint}, title = {Predicting multi-stage attacks based on {IP} information}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {384--390}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412127}, doi = {10.1109/ICITST.2015.7412127}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlmutairiPF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiFC15, author = {Saud Alotaibi and Steven Furnell and Nathan L. Clarke}, title = {Transparent authentication systems for mobile device security: {A} review}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {406--413}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412131}, doi = {10.1109/ICITST.2015.7412131}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlthebyanMYJ15, author = {Qutaibah Althebyan and Rami Mohawesh and Qussai Yaseen and Yaser Jararweh}, title = {Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {226--231}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412094}, doi = {10.1109/ICITST.2015.7412094}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlthebyanMYJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlthobaitiM15, author = {Maha Althobaiti and Pam J. Mayhew}, title = {Usable security of authentication process: New approach and practical assessment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {179--180}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412083}, doi = {10.1109/ICITST.2015.7412083}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlthobaitiM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmanS15, author = {Waqas Aman and Einar Snekkenes}, title = {Managing security trade-offs in the Internet of Things using adaptive security}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {362--368}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412122}, doi = {10.1109/ICITST.2015.7412122}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AouamiSRO15, author = {Rachid Aouami and Essaid Sabir and Mounir Rifi and Mohamed Ouzzif}, title = {Fountain-code-enabled {DCF} for optimazing throughput in wireless sensors}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {431--436}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412136}, doi = {10.1109/ICITST.2015.7412136}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AouamiSRO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AyoungSA15, author = {Azerikatoa D. Ayoung and Boyce Sigweni and Pamela Abbott}, title = {Case-based reasoning system for predicting the sustainability of a telecentre}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {125--130}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412072}, doi = {10.1109/ICITST.2015.7412072}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AyoungSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BaekKA15, author = {Gui{-}hyun Baek and Su{-}kyoung Kim and Ki{-}hong Ahn}, title = {Framework for automatically construct ontology knowledge base from semi-structured datasets}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {152--157}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412077}, doi = {10.1109/ICITST.2015.7412077}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BaekKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BeniwalZL15, author = {Rohit Beniwal and Pavol Zavarsky and Dale Lindskog}, title = {Study of compliance of Apple's location based APIs with recommendations of the {IETF} Geopriv}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {214--219}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412092}, doi = {10.1109/ICITST.2015.7412092}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BeniwalZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CampbellPM15, author = {Ronald M. Campbell and Keshnee Padayachee and Themba Masombuka}, title = {A survey of honeypot research: Trends and opportunities}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {208--212}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412090}, doi = {10.1109/ICITST.2015.7412090}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CampbellPM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Chetto15, author = {Maryline Chetto}, title = {Keynote speaker 5: Issues in energy harvesting cyber-physical systems}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {21}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412046}, doi = {10.1109/ICITST.2015.7412046}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Chetto15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DasMN15, author = {Batsayan Das and Lakshmipadmaja Maddali and Harshita Vani Nallagonda}, title = {Role-based privilege isolation: {A} novel authorization model for Android smart devices}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {220--225}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412093}, doi = {10.1109/ICITST.2015.7412093}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DasMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DelailY15, author = {Buti Al Delail and Chan Yeob Yeun}, title = {Recent advances of smart glass application security and privacy}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {65--69}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412058}, doi = {10.1109/ICITST.2015.7412058}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/DelailY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DennisO15, author = {Richard Dennis and Gareth Owen}, title = {Rep on the block: {A} next generation reputation system based on the blockchain}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {131--138}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412073}, doi = {10.1109/ICITST.2015.7412073}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DennisO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FallahpourM15, author = {Mehdi Fallahpour and David Meg{\'{\i}}as}, title = {Transparent high capacity audio watermarking in wavelet domain}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {242--247}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412098}, doi = {10.1109/ICITST.2015.7412098}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FallahpourM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FarooqKVI15, author = {Ali Farooq and Syed Rameez Ullah Kakakhel and Seppo Virtanen and Jouni Isoaho}, title = {A taxonomy of perceived information security and privacy threats among {IT} security students}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {280--286}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412106}, doi = {10.1109/ICITST.2015.7412106}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/FarooqKVI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FengTM15, author = {Guanyuan Feng and Xuezhi Tan and Lin Ma}, title = {Visual location recognition using smartphone sensors for indoor environment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {426--430}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412135}, doi = {10.1109/ICITST.2015.7412135}, timestamp = {Thu, 28 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FengTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Frein15, author = {Ruair{\'{\i}} de Fr{\'{e}}in}, title = {Load-adjusted video quality prediction methods for missing data}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {314--319}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412111}, doi = {10.1109/ICITST.2015.7412111}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Frein15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Geels15, author = {Frank W. Geels}, title = {Keynote speaker 4: Socio-technical transitions towards sustainability}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {20}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412045}, doi = {10.1109/ICITST.2015.7412045}, timestamp = {Sat, 28 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Geels15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GhauriHI15, author = {Sajjad Ahmed Ghauri and Hasan Humayun and Mobeen Iqbal}, title = {Low complexity linear equalization of doubly selective channel}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {400--405}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412130}, doi = {10.1109/ICITST.2015.7412130}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GhauriHI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HentabliM15, author = {Wahiba Hentabli and Fatiha Merazka}, title = {An extension of RSA{\_}512 to RSA{\_}1024 core under hardware platform based on montgomery powering}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {448--453}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412140}, doi = {10.1109/ICITST.2015.7412140}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HentabliM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HillmannSRR15, author = {Peter Hillmann and Lars Stiemert and Gabi Dreo Rodosek and Oliver Rose}, title = {Dragoon: Advanced modelling of {IP} geolocation by use of latency measurements}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {438--445}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412138}, doi = {10.1109/ICITST.2015.7412138}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HillmannSRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HlyneZB15, author = {Chit Nyi Nyi Hlyne and Pavol Zavarsky and Sergey Butakov}, title = {{SCAP} benchmark for Cisco router security configuration compliance}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {270--276}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412104}, doi = {10.1109/ICITST.2015.7412104}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/HlyneZB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hurley-SmithWA15, author = {Darren Hurley{-}Smith and Jodie Wetherall and Andrew A. Adekunle}, title = {Virtual closed networks: {A} secure approach to autonomous mobile ad hoc networks}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {391--398}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412128}, doi = {10.1109/ICITST.2015.7412128}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Hurley-SmithWA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JallouliACLC15, author = {Ons Jallouli and Safwan El Assad and Maryline Chetto and Ren{\'{e}} Lozi and Daniel Caragata}, title = {A novel chaotic generator based on weakly-coupled discrete skewtent maps}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {38--43}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412052}, doi = {10.1109/ICITST.2015.7412052}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JallouliACLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JilnaDJ15, author = {Payingat Jilna and P. P. Deepthi and U. K. Jayaraj}, title = {Optimized hardware design and implementation of {EC} based key management scheme for {WSN}}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {164--169}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412079}, doi = {10.1109/ICITST.2015.7412079}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JilnaDJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Kim15, author = {Mincheol Kim}, title = {Application of theory of reasoned action in u-health system}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {177--178}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412082}, doi = {10.1109/ICITST.2015.7412082}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Kim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimP15, author = {Min{-}Gu Kim and Sung Bum Pan}, title = {A study on the flame detection and object classification technique using the color information}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {120--123}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412070}, doi = {10.1109/ICITST.2015.7412070}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimakE15, author = {Stefan Kimak and Jeremy Ellman}, title = {The role of {HTML5} IndexedDB, the past, present and future}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {379--383}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412126}, doi = {10.1109/ICITST.2015.7412126}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimakE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KoscinaC15, author = {Mirko Koscina and Daniel Caragata}, title = {Bench-marking of traditional cryptographic algorithms and chaos-based algorithms with {DNA} operations}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {26--31}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412050}, doi = {10.1109/ICITST.2015.7412050}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KoscinaC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KuzeIYCM15, author = {Naomi Kuze and Shu Ishikura and Takeshi Yagi and Daiki Chiba and Masayuki Murata}, title = {Crawler classification using ant-based clustering scheme}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {84--89}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412063}, doi = {10.1109/ICITST.2015.7412063}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/KuzeIYCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LahmerZ15, author = {Ibrahim Lahmer and Ning Zhang}, title = {MapReduce: {A} critical analysis of existing authentication methods}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {302--313}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412110}, doi = {10.1109/ICITST.2015.7412110}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/LahmerZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LebronSL15, author = {David Lebron and Hossain Shahriar and Rubana Yasmin Lupu}, title = {Security concerns and mitigation approaches for MOOC-based applications}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {145--150}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412075}, doi = {10.1109/ICITST.2015.7412075}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LebronSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MahmoudYAZ15, author = {Rwan Mahmoud and Tasneem Yousuf and Fadi A. Aloul and Imran A. Zualkernan}, title = {Internet of things (IoT) security: Current status, challenges and prospective measures}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {336--341}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412116}, doi = {10.1109/ICITST.2015.7412116}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/MahmoudYAZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MakitlaM15, author = {Ishmael Makitla and Jabu Mtsweni}, title = {A generalized web service response time metric to support collaborative and corroborative web service monitoring}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {373--377}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412124}, doi = {10.1109/ICITST.2015.7412124}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MakitlaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MansooriY15, author = {Fatema Al Mansoori and Chan Yeob Yeun}, title = {Emerging new trends of location based systems security}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {158--163}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412078}, doi = {10.1109/ICITST.2015.7412078}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/MansooriY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MarLC15, author = {Kheng Kok Mar and Chee Yong Law and Victoria Chin}, title = {Secure personal cloud storage}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {108--113}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412068}, doi = {10.1109/ICITST.2015.7412068}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MarLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MedberyO15, author = {Clinton Medbery and Aspen Olmsted}, title = {HeartSync: Mobile pacemaker failure detector}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {277--279}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412105}, doi = {10.1109/ICITST.2015.7412105}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MedberyO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MerazkaB15, author = {Fatiha Merazka and Fulvio Babich}, title = {Dynamic forward error correction algorithm over {IP} network services for {ITU-T} {G.722.2} codec}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {369--372}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412123}, doi = {10.1109/ICITST.2015.7412123}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MerazkaB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NtrigkogiasP15, author = {Christos Ntrigkogias and Nineta Polemi}, title = {Assessment of research efforts in surveillance systems}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {288--294}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412108}, doi = {10.1109/ICITST.2015.7412108}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NtrigkogiasP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Olmsted15, author = {Aspen Olmsted}, title = {Keynote speaker 3: Secure software engineering in the cloud}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {19}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412044}, doi = {10.1109/ICITST.2015.7412044}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Olmsted15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Olmsted15a, author = {Aspen Olmsted}, title = {Long running, consistent, web service transactions}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {139--144}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412074}, doi = {10.1109/ICITST.2015.7412074}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Olmsted15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ParvezZK15, author = {Muhammad Parvez and Pavol Zavarsky and Nidal Khoury}, title = {Analysis of effectiveness of black-box web application scanners in detection of stored {SQL} injection and stored {XSS} vulnerabilities}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {186--191}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412085}, doi = {10.1109/ICITST.2015.7412085}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ParvezZK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PetersideZB15, author = {Gabriel Biedima Peterside and Pavol Zavarsky and Sergey Butakov}, title = {Automated security configuration checklist for a cisco IPsec {VPN} router using {SCAP} 1.2}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {355--360}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412120}, doi = {10.1109/ICITST.2015.7412120}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/PetersideZB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PleteaSVP15, author = {Daniel Pletea and Saeed Sedghi and Meilof Veeningen and Milan Petkovic}, title = {Secure distributed key generation in attribute based encryption systems}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {103--107}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412067}, doi = {10.1109/ICITST.2015.7412067}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PleteaSVP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PolemiP15, author = {Nineta Polemi and Spyros Papastergiou}, title = {Current efforts in ports and supply chains risk assessment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {349--354}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412119}, doi = {10.1109/ICITST.2015.7412119}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PolemiP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RahmanA15, author = {Md. Rahatur Rahman and Shamim Akhter}, title = {Bi-directional traffic management support system with decision tree based dynamic routing}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {170--175}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412080}, doi = {10.1109/ICITST.2015.7412080}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/RahmanA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Rehman15, author = {Shafiq ur R{\'{e}}hman}, title = {iBook: An interactive book system}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {233--237}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412096}, doi = {10.1109/ICITST.2015.7412096}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Rehman15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ReshmiR15, author = {G. Reshmi and C. S. Rakshmy}, title = {A survey of authentication methods in mobile cloud computing}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {58--63}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412056}, doi = {10.1109/ICITST.2015.7412056}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ReshmiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SathiyaBalanZLB15, author = {Vimal Kumar SathiyaBalan and Pavol Zavarsky and Dale Lindskog and Sergey Butakov}, title = {Study of applicability of Chinese remainder theorem based group key management for cloud environment}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {114--119}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412069}, doi = {10.1109/ICITST.2015.7412069}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SathiyaBalanZLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SherifFC15, author = {Emad Sherif and Steven Furnell and Nathan L. Clarke}, title = {Awareness, behaviour and culture: The {ABC} in cultivating security compliance}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {90--94}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412064}, doi = {10.1109/ICITST.2015.7412064}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SherifFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SieweA15, author = {Fran{\c{c}}ois Siewe and Ahmed Al{-}alshuhai}, title = {From use case diagrams to executable context-aware ambients}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {263--268}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412102}, doi = {10.1109/ICITST.2015.7412102}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SieweA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SinghMS15, author = {Shirish Kumar Singh and Bharavi Mishra and Saket Singh}, title = {Detecting intelligent malware on dynamic Android analysis environments}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {414--419}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412132}, doi = {10.1109/ICITST.2015.7412132}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SinghMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SoupionisB15, author = {Yannis Soupionis and Thierry Benoist}, title = {Cyber-physical testbed - The impact of cyber attacks and the human factor}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {326--331}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412114}, doi = {10.1109/ICITST.2015.7412114}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SoupionisB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SpengerK15, author = {Gabriele Spenger and J{\"{o}}rg Keller}, title = {Security aspects of PRNGs with large state spaces}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {181--185}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412084}, doi = {10.1109/ICITST.2015.7412084}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SpengerK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TerziTS15, author = {Duygu Sinanc Terzi and Ramazan Terzi and Seref Sagiroglu}, title = {A survey on security and privacy issues in big data}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {202--207}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412089}, doi = {10.1109/ICITST.2015.7412089}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TerziTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Torkura0M15, author = {Kennedy A. Torkura and Feng Cheng and Christoph Meinel}, title = {A proposed framework for proactive vulnerability assessments in cloud deployments}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {51--57}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412055}, doi = {10.1109/ICITST.2015.7412055}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Torkura0M15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Torkura0M15a, author = {Kennedy A. Torkura and Feng Cheng and Christoph Meinel}, title = {Application of quantitative security metrics in cloud computing}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {256--262}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412101}, doi = {10.1109/ICITST.2015.7412101}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Torkura0M15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Valluri15, author = {Abhijit Kiran Valluri}, title = {Equilibrium properties of rate control protocols}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {295--301}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412109}, doi = {10.1109/ICITST.2015.7412109}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Valluri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VatsRA15, author = {Himanshu Vats and Ron Ruhl and Shaun Aghili}, title = {Fingerprint security for protecting {EMV} payment cards}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {95--101}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412065}, doi = {10.1109/ICITST.2015.7412065}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VatsRA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Visser15, author = {Martin Visser}, title = {Keynote speaker 2: Swimming against the current - Dealing with {ICS} cyber threats in the Water Sector}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {17--18}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412043}, doi = {10.1109/ICITST.2015.7412043}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Visser15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Wang15, author = {Frank Zhigang Wang}, title = {Keynote speaker 1: Computer Evolution over the next decade: Fact or fiction?}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {16}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412042}, doi = {10.1109/ICITST.2015.7412042}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Wang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Warwick15, author = {Kevin Warwick}, title = {{ICITST} honorary chair and distinguished keynote speaker: The cyborg experiments}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {15}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412041}, doi = {10.1109/ICITST.2015.7412041}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Warwick15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YamadaMUTT15, author = {Masahiro Yamada and Masanobu Morinaga and Yuki Unno and Satoru Torii and Masahiko Takenaka}, title = {RAT-based malicious activities detection on enterprise internal networks}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {321--325}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412113}, doi = {10.1109/ICITST.2015.7412113}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YamadaMUTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YoonJK15, author = {Soojin Yoon and JongHun Jung and Hwan{-}Kuk Kim}, title = {Attacks on Web browsers with {HTML5}}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {193--197}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412087}, doi = {10.1109/ICITST.2015.7412087}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YoonJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YueW15, author = {Wong Seng Yue and Wong Lai Wan}, title = {The effectiveness of digital game for introductory programming concepts}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {421--425}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412134}, doi = {10.1109/ICITST.2015.7412134}, timestamp = {Wed, 23 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YueW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZainudinRZHI15, author = {Norulzahrah Mohd. Zainudin and Suzaimah Ramli and Tuan Khalisah Tan Zizi and Nor Asiakin Hasbullah and Norazlin Ibrahim}, title = {Facial expression change detection algorithm using optical flow technique}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {332--335}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412115}, doi = {10.1109/ICITST.2015.7412115}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZainudinRZHI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhanZ15, author = {Lifei Zhan and Yuesheng Zhu}, title = {Passive forensics for image splicing based on {PCA} noise estimation}, booktitle = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, pages = {78--83}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICITST.2015.7412062}, doi = {10.1109/ICITST.2015.7412062}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhanZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2015, title = {10th International Conference for Internet Technology and Secured Transactions, {ICITST} 2015, London, United Kingdom, December 14-16, 2015}, publisher = {{IEEE}}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7400833/proceeding}, isbn = {978-1-9083-2052-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AdelolaDB14, author = {Tiwalade Adelola and Ray Dawson and Firat Batmaz}, title = {Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {234--239}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038812}, doi = {10.1109/ICITST.2014.7038812}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AdelolaDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AdityaP0M14, author = {Suresh Kumar Aditya and Kavya Premkumar and R. Anitha and Saswati Mukherjee}, title = {Combined security framework for multi-cloud environment}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {100--105}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038786}, doi = {10.1109/ICITST.2014.7038786}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AdityaP0M14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AjiginiPK14, author = {Olusegun Ademolu Ajigini and John A. van der Poll and Jan H. Kroeze}, title = {Towards a model on security challenges during closed source software to {OSS} migrations}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {274--283}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038820}, doi = {10.1109/ICITST.2014.7038820}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AjiginiPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AkeelWG14, author = {Fatimah Y. Akeel and Gary B. Wills and Andrew M. Gravell}, title = {Exposing data leakage in Data Integration Systems}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {420--425}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038849}, doi = {10.1109/ICITST.2014.7038849}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AkeelWG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-FedaghiM14, author = {Sabah Al{-}Fedaghi and Heba Al Meshari}, title = {Characterizing social networks based on interior processes of nodes}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {215--221}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038808}, doi = {10.1109/ICITST.2014.7038808}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-FedaghiM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlbahliM14, author = {Saleh Albahli and Austin Melton}, title = {ohStore: Ontology hierarchy solution to improve {RDF} data management}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {340--348}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038834}, doi = {10.1109/ICITST.2014.7038834}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlbahliM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AleseADAO14, author = {Boniface Kayode Alese and R. A. Akingbola and Folasade Mojisola Dahunsi and Olumide S. Adewale and T. J. Ogundele}, title = {Improving deception in honeynet: Through data manipulation}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {198--204}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038805}, doi = {10.1109/ICITST.2014.7038805}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AleseADAO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AleseOFIT14, author = {Boniface Kayode Alese and O. Oyebade and A. Osuolale Festus and Otasowie Iyare and Aderonke Favour{-}Bethy Thompson}, title = {Evaluation of information security risks using hybrid assessment model}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {387--395}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038843}, doi = {10.1109/ICITST.2014.7038843}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AleseOFIT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlharbiPD14, author = {Nawaf Sulaiman Alharbi and Maria Papadaki and Paul Dowland}, title = {Security challenges of E-government adoption based on end users' perspective}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {78--82}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038781}, doi = {10.1109/ICITST.2014.7038781}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlharbiPD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlmutairiP14, author = {Abdulrazaq Almutairi and David J. Parish}, title = {Using classification techniques for creation of predictive intrusion detection model}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {223--228}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038810}, doi = {10.1109/ICITST.2014.7038810}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlmutairiP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alomari14, author = {Mohammad Kamel Alomari}, title = {Towards E-democracy in the middle east: E-voting adoption}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {73--77}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038780}, doi = {10.1109/ICITST.2014.7038780}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alomari14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alotaibi14, author = {Fahad M. Alotaibi}, title = {Architectural framework proposed of behavioural classroom simulation based second life environment}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {466--470}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038857}, doi = {10.1109/ICITST.2014.7038857}, timestamp = {Mon, 08 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alotaibi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmankwaLK14, author = {Eric Amankwa and Marianne Loock and Elmarie Kritzinger}, title = {A conceptual analysis of information security education, information security training and information security awareness definitions}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {248--252}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038814}, doi = {10.1109/ICITST.2014.7038814}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AmankwaLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmmarF14, author = {Brika Ammar and Fahima Nader}, title = {Creation of educative content on the web}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {119--124}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038790}, doi = {10.1109/ICITST.2014.7038790}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AmmarF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Aparicio-Navarro14, author = {Francisco J. Aparicio{-}Navarro and Konstantinos G. Kyriakopoulos and David J. Parish}, title = {Empirical study of automatic dataset labelling}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {372--378}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038840}, doi = {10.1109/ICITST.2014.7038840}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Aparicio-Navarro14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Badidi14, author = {Elarbi Badidi}, title = {A context broker federation for QoC-driven selection of cloud-based context services}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {185--190}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038802}, doi = {10.1109/ICITST.2014.7038802}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Badidi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BetzW14, author = {Johann Betz and Dirk Westhoff}, title = {C\({}^{\mbox{3}}\)-Sched - {A} cache covert channel robust cloud computing scheduler}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {54--60}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038775}, doi = {10.1109/ICITST.2014.7038775}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BetzW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BoubakriAB14, author = {Wided Boubakri and Walid Abdallah and Noureddine Boudriga}, title = {A chaos-based authentication and key management scheme for {M2M} communication}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {366--371}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038839}, doi = {10.1109/ICITST.2014.7038839}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BoubakriAB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BurkhardtNRK14, author = {Dirk Burkhardt and Kawa Nazemi and Wilhelm Retz and J{\"{o}}rn Kohlhammer}, title = {Visual explanation of government-data for policy making through open-data inclusion}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {83--89}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038782}, doi = {10.1109/ICITST.2014.7038782}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BurkhardtNRK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Caballero-GilMC14, author = {Pino Caballero{-}Gil and Francisco Mart{\'{\i}}n{-}Fern{\'{a}}ndez and C{\'{a}}ndido Caballero{-}Gil}, title = {Using query frequencies in tree-based revocation for certificateless authentication in VANETs}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {268--273}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038819}, doi = {10.1109/ICITST.2014.7038819}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Caballero-GilMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CaragataAA14, author = {Daniel Caragata and Safwan El Assad and Kassem Ahmad}, title = {Survey of network access security in {UMTS/LTE} networks}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {43--46}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038772}, doi = {10.1109/ICITST.2014.7038772}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CaragataAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChanWP14, author = {Vincent Chan and Tony Hao Wu and Grantham Pang}, title = {Decision support and data mining for direct consumer-to-consumer trading}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {205--208}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038806}, doi = {10.1109/ICITST.2014.7038806}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChanWP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChouhanSCKJ14, author = {Pushpinder{-}Kaur Chouhan and Sakir Sezer and Yangseo Choi and Ikkyun Kim and Chunghwan Jung}, title = {Secure virtualised environment}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {112--117}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038788}, doi = {10.1109/ICITST.2014.7038788}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChouhanSCKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChristianahATOF14, author = {Abikoye Oluwakemi Christianah and Boniface Kayode Alese and Aderonke Favour{-}Bethy Thompson and D. Alowolodu Olufunso and A. Osuolale Festus}, title = {A robust multicast authentication scheme based on asymmetric key signature}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {449--458}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038855}, doi = {10.1109/ICITST.2014.7038855}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ChristianahATOF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DantanarayanaJ14, author = {Gilmini Dantanarayana and Prasad M. Jayaweera}, title = {Value oriented service designing for successful e-Health}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {90--94}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038783}, doi = {10.1109/ICITST.2014.7038783}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/DantanarayanaJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DesnosAAPM14, author = {Karol Desnos and Safwan El Assad and Aurore Arlicot and Maxime Pelcat and Daniel M{\'{e}}nard}, title = {Efficient multicore implementation of an advanced generator of discrete chaotic sequences}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {31--36}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038770}, doi = {10.1109/ICITST.2014.7038770}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DesnosAAPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DjebbarA14, author = {Fatiha Djebbar and Beghdad Ayad}, title = {Image hiding in speech spectrum}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {285--287}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038822}, doi = {10.1109/ICITST.2014.7038822}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DjebbarA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DlaminiEE14, author = {M. T. Dlamini and Jan H. P. Eloff and Mariki M. Eloff}, title = {{CBAC4C:} Conflict Based Allocation Control for Cloud}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {447--448}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038854}, doi = {10.1109/ICITST.2014.7038854}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/DlaminiEE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DresslerFM14, author = {Patrick Dressler and Daniel Fischer and Bernd Markscheffel}, title = {Software solutions for high-security voice and data communication for smartphones}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {327--332}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038830}, doi = {10.1109/ICITST.2014.7038830}, timestamp = {Fri, 22 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/DresslerFM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FaquihSF14, author = {Loubna El Faquih and Hanae Sba{\"{\i}} and Mounia Fredj}, title = {Semantic variability modeling in business processes: {A} comparative study}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {131--136}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038792}, doi = {10.1109/ICITST.2014.7038792}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FaquihSF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FarooqiN14, author = {Norah S. Farooqi and Siobh{\'{a}}n North}, title = {Time cost evaluation of trust based access control for {XML} databases}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {324--326}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038829}, doi = {10.1109/ICITST.2014.7038829}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FarooqiN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hatunic-Webster14, author = {Edina Hatunic{-}Webster and Fredrick Mtenzi and Brendan O'Shea}, title = {Model for analysing Anti-Phishing Authentication Ceremonies}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {144--150}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038795}, doi = {10.1109/ICITST.2014.7038795}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Hatunic-Webster14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HomoliakOGH14, author = {Ivan Homoliak and Daniel Ovsonka and Matej Gr{\'{e}}gr and Petr Han{\'{a}}cek}, title = {{NBA} of obfuscated network vulnerabilities' exploitation hidden into {HTTPS} traffic}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {310--317}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038827}, doi = {10.1109/ICITST.2014.7038827}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HomoliakOGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IyareTA14, author = {Otasowie Iyare and Aderonke Favour{-}Bethy Thompson and Boniface Kayode Alese}, title = {A replication model for students' result processing}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {295--301}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038824}, doi = {10.1109/ICITST.2014.7038824}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IyareTA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JoukovST14, author = {Nikolai Joukov and Vladislav Shorokhov and Dmytro Tantsuyev}, title = {Security audit of data flows across enterprise systems and networks}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {240--247}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038813}, doi = {10.1109/ICITST.2014.7038813}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JoukovST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KacicOHB14, author = {Matej Kacic and Daniel Ovsonka and Petr Han{\'{a}}cek and Maros Barabas}, title = {Traffic generator based on behavioral pattern}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {229--223}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038811}, doi = {10.1109/ICITST.2014.7038811}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KacicOHB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KasiarasZCK14, author = {Dimitrios Kasiaras and Thomas Zafeiropoulos and Nathan L. Clarke and Georgios Kambourakis}, title = {Android forensics: Correlation analysis}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {157--162}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038797}, doi = {10.1109/ICITST.2014.7038797}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KasiarasZCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KatoK14, author = {Keisuke Kato and Vitaly Klyuev}, title = {Large-scale network packet analysis for intelligent DDoS attack detection development}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {360--365}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038838}, doi = {10.1109/ICITST.2014.7038838}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KatoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KohliG14, author = {Shruti Kohli and Ankit Gupta}, title = {Modeling anonymous human behavior using social media}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {409--412}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038846}, doi = {10.1109/ICITST.2014.7038846}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/KohliG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KuboyeAA14, author = {Bamidele Moses Kuboye and Boniface Kayode Alese and Olumide Sunday Adewale}, title = {Multi-level access priority channel allocation strategies in Global System for Mobile communications {(GSM)} networks}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {288--294}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038823}, doi = {10.1109/ICITST.2014.7038823}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KuboyeAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KulkarniSH14, author = {Saurabh Kulkarni and Shayan Saha and Ryler Hockenbury}, title = {Preserving privacy in sensor-fog networks}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {96--99}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038785}, doi = {10.1109/ICITST.2014.7038785}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KulkarniSH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KumarKG14, author = {Rahul Kumar and Indraveni K and Aakash Kumar Goel}, title = {Automation of detection of security vulnerabilities in web services using dynamic analysis}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {334--336}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038832}, doi = {10.1109/ICITST.2014.7038832}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KumarKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LesjakRBHB14, author = {Christian M. Lesjak and Thomas Ruprechter and Holger Bock and Josef Haid and Eugen Brenner}, title = {{ESTADO} - Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {171--177}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038800}, doi = {10.1109/ICITST.2014.7038800}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LesjakRBHB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LeszczynaW14, author = {Rafal Leszczyna and Michal R. Wr{\'{o}}bel}, title = {Security information sharing for smart grids: Developing the right data model}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {163--169}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038798}, doi = {10.1109/ICITST.2014.7038798}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/LeszczynaW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LingY14, author = {Mee Hong Ling and Kok{-}Lim Alvin Yau}, title = {Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {256--261}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038817}, doi = {10.1109/ICITST.2014.7038817}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LingY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MichelinZR14, author = {Regio A. Michelin and Avelino F. Zorzo and C{\'{e}}sar A. F. De Rose}, title = {Mitigating DoS to authenticated cloud {REST} APIs}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {106--111}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038787}, doi = {10.1109/ICITST.2014.7038787}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MichelinZR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MishskyGG14, author = {Igor Mishsky and Nurit Gal{-}Oz and Ehud Gudes}, title = {Computing domains reputation using flow}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {426--431}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038850}, doi = {10.1109/ICITST.2014.7038850}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MishskyGG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MohammadAES14, author = {Omer K. Jasim Mohammad and Safia Abbas and El{-}Sayed M. El{-}Horbaty and Abdel{-}Badeeh M. Salem}, title = {Advanced encryption standard development based quantum key distribution}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {402--408}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038845}, doi = {10.1109/ICITST.2014.7038845}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MohammadAES14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MorrellRMT14, author = {Christopher Morrell and J. Scot Ransbottom and Randy C. Marchany and Joseph G. Tront}, title = {Scaling IPv6 address bindings in support of a moving target defense}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {440--445}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038852}, doi = {10.1109/ICITST.2014.7038852}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MorrellRMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MourSPRGP14, author = {Surabhi Mour and Priyansh Srivastava and Payal Patel and Hari Ram and Bhavesh N. Gohil and Dhiren R. Patel}, title = {Load management model for cloud computing}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {178--184}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038801}, doi = {10.1109/ICITST.2014.7038801}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MourSPRGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Munoz-Hernandez14, author = {Mario Diego Munoz{-}Hernandez and Jose Juan Garcia{-}Hernandez and Miguel Morales{-}Sandoval}, title = {Study on the robustness to retyping attacks of fingerprinted digital documents in the frequential domain}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {25--30}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038769}, doi = {10.1109/ICITST.2014.7038769}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Munoz-Hernandez14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NawazMF14, author = {Omer Nawaz and Tahir Nawaz Minhas and Markus Fiedler}, title = {Optimal {MTU} for realtime video broadcast with packet loss - {A} QoE perspective}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {396--401}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038844}, doi = {10.1109/ICITST.2014.7038844}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NawazMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NwosuTAO14, author = {L. A. Nwosu and Aderonke Favour{-}Bethy Thompson and Boniface Kayode Alese and Olumide Olayinka Obe}, title = {An Attribute-Based Signature using rivest shamir adleman scheme}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {380--386}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038842}, doi = {10.1109/ICITST.2014.7038842}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NwosuTAO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OlmstedS14, author = {Aspen Olmsted and RoxAnn H. Stalvey}, title = {Highly available, consistent, business rule filters}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {125--130}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038791}, doi = {10.1109/ICITST.2014.7038791}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OlmstedS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OmranP14, author = {Osama M. Ben Omran and Brajendra Panda}, title = {A new technique to partition and manage data security in cloud databases}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {191--196}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038803}, doi = {10.1109/ICITST.2014.7038803}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OmranP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OsisanwoAA14, author = {F. Y. Osisanwo and Adebayo O. Adetunmbi and Boniface Kayode Alese}, title = {Barefoot morphology: {A} person unique feature for forensic identification}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {356--359}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038837}, doi = {10.1109/ICITST.2014.7038837}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OsisanwoAA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OstiBU14, author = {Andr{\'{e}} A. Osti and Bruno Alves Pereira Botelho and Nelson Uto}, title = {Implementation aspects of software guards: {A} case study}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {262--267}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038818}, doi = {10.1109/ICITST.2014.7038818}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OstiBU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Pakdeetrakulwong14, author = {Udsanee Pakdeetrakulwong and Pornpit Wongthongtham and Waralak V. Siricharoen}, title = {Recommendation systems for software engineering: {A} survey from software development life cycle phase perspective}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {137--142}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038793}, doi = {10.1109/ICITST.2014.7038793}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Pakdeetrakulwong14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PetrakievaGT14, author = {Simona Petrakieva and Oleg Garasym and Ina Taralova}, title = {G-interval method for secure chaotic synchronization and information transmission}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {37--42}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038771}, doi = {10.1109/ICITST.2014.7038771}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PetrakievaGT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PfaffR14, author = {Oliver Pfaff and Sebastian Ries}, title = {Avoiding security integration pitfalls in the cloud}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {67--70}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038777}, doi = {10.1109/ICITST.2014.7038777}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PfaffR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PolashAS14, author = {Fahad Polash and Abdullah Abuhussein and Sajjan G. Shiva}, title = {A survey of cloud computing taxonomies: Rationale and overview}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {459--465}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038856}, doi = {10.1109/ICITST.2014.7038856}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/PolashAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PruksasriBHT14, author = {Potchara Pruksasri and Jan van den Berg and Wout Hofman and Yao{-}Hua Tan}, title = {Data concealing of supply chain transactions using the Distributed Trust Backbone}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {151--156}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038796}, doi = {10.1109/ICITST.2014.7038796}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PruksasriBHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RanaC14, author = {Antonia Rana and Andrea Ciardulli}, title = {Enabling consumers to self-verify authenticity of products}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {254--255}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038816}, doi = {10.1109/ICITST.2014.7038816}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RanaC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RudolphSJ14, author = {Manuel Rudolph and Reinhard Schwarz and Christian Jung}, title = {Security policy specification templates for critical infrastructure services in the cloud}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {61--66}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038776}, doi = {10.1109/ICITST.2014.7038776}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RudolphSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SadkiB14, author = {Souad Sadki and Hanan El Bakkali}, title = {{PPAMH:} {A} novel privacy-preserving approach for mobile healthcare}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {209--214}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038807}, doi = {10.1109/ICITST.2014.7038807}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SadkiB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShahriarC14, author = {Hossain Shahriar and Victor Clincy}, title = {Detection of repackaged Android Malware}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {349--354}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038835}, doi = {10.1109/ICITST.2014.7038835}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShahriarC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/UllahXBL14, author = {Abrar Ullah and Hannan Xiao and Trevor Barker and Mariana Lilley}, title = {Graphical and text based challenge questions for secure and usable authentication in online examinations}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {302--308}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038825}, doi = {10.1109/ICITST.2014.7038825}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/UllahXBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VasconcelosF14, author = {Pedro Roger Magalh{\~{a}}es Vasconcelos and Gisele Azevedo de Ara{\'{u}}jo Freitas}, title = {Performance analysis of Hadoop MapReduce on an OpenNebula cloud with {KVM} and OpenVZ virtualizations}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {471--476}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038858}, doi = {10.1109/ICITST.2014.7038858}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VasconcelosF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Villalon-Fonseca14, author = {Ricardo Villal{\'{o}}n{-}Fonseca and Braulio J. Solano{-}Rojas and Gabriela Mar{\'{\i}}n Ravent{\'{o}}s}, title = {An applied methodology for information security and assurance: {A} study case for cloud computing}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {432--439}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038851}, doi = {10.1109/ICITST.2014.7038851}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Villalon-Fonseca14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VlajicS14, author = {Natalija Vlajic and Armin Slopek}, title = {Performance and economies of 'bot-less' application-layer DDoS attacks}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {318--323}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038828}, doi = {10.1109/ICITST.2014.7038828}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VlajicS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YangKC14, author = {Seokhwan Yang and Jaechun Kim and Mokdong Chung}, title = {A prediction model based on Big Data analysis using hybrid {FCM} clustering}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {337--339}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038833}, doi = {10.1109/ICITST.2014.7038833}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YangKC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YousufAFW14, author = {Muhammad Ali Yousuf and Fatimah Y. Akeel and Nawfal F. Fadhel and Gary B. Wills}, title = {Resolving coreference and security issues of linked data by focusing on {OWL:} Same As: {A} method for similarity matching score on linked data}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {414--419}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038848}, doi = {10.1109/ICITST.2014.7038848}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YousufAFW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZavaletaUMG14, author = {Zobeida Jezabel Guzman{-}Zavaleta and Claudia Feregrino Uribe and Alejandra Menendez{-}Ortiz and Jose Juan Garcia{-}Hernandez}, title = {A robust audio fingerprinting method using spectrograms saliency maps}, booktitle = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, pages = {47--52}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICITST.2014.7038773}, doi = {10.1109/ICITST.2014.7038773}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ZavaletaUMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2014, title = {9th International Conference for Internet Technology and Secured Transactions, {ICITST} 2014, London, United Kingdom, December 8-10, 2014}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/7018215/proceeding}, isbn = {978-1-908320-39-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdelshafyK13, author = {Mohamed A. Abdelshafy and Peter J. B. King}, title = {Analysis of security attacks on {AODV} routing}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {290--295}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750209}, doi = {10.1109/ICITST.2013.6750209}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdelshafyK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdoDCBP13, author = {Jacques Bou Abdo and Jacques Demerjian and Hakima Chaouchi and Kablan Barbar and Guy Pujolle}, title = {Broker-based Cross-Cloud Federation Manager}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {244--251}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750199}, doi = {10.1109/ICITST.2013.6750199}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdoDCBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbughazalahMM13, author = {Sarah Abughazalah and Konstantinos Markantonakis and Keith Mayes}, title = {A mutual authentication protocol for low-cost {RFID} tags formally verified using CasperFDR and {AVISPA}}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {44--51}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750160}, doi = {10.1109/ICITST.2013.6750160}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbughazalahMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AdedayoBRL13, author = {Love Adedayo and Sergey Butakov and Ron Ruhl and Dale Lindskog}, title = {E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {623--629}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750278}, doi = {10.1109/ICITST.2013.6750278}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AdedayoBRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AkeelWG13, author = {Fatimah Y. Akeel and Gary B. Wills and Andrew M. Gravell}, title = {SecureDIS: {A} framework for secure Data Integration Systems}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {588--593}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750270}, doi = {10.1109/ICITST.2013.6750270}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AkeelWG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AkinbiPB13, author = {Alex Akinbi and Ella Pereira and Chris Beaumont}, title = {Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {162--167}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750183}, doi = {10.1109/ICITST.2013.6750183}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AkinbiPB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AkinsowonA13, author = {O. A. Akinsowon and Boniface Kayode Alese}, title = {Edge detection methods in palm-print identification}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {422--426}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750235}, doi = {10.1109/ICITST.2013.6750235}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AkinsowonA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AkinwonmiA13, author = {Akintoba Emmanuel Akinwonmi and Boniface Kayode Alese}, title = {A prosodic Text-to-Speech system for Yor{\`{u}}b{\'{a}} language}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {630--635}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750279}, doi = {10.1109/ICITST.2013.6750279}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AkinwonmiA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-AssamRJ13, author = {Hisham Al{-}Assam and Rasber Dh. Rashid and Sabah Jassim}, title = {Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {369--374}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750224}, doi = {10.1109/ICITST.2013.6750224}, timestamp = {Fri, 07 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-AssamRJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-KabiAA13, author = {Mohammed Naji Al{-}Kabi and Nawaf A. Abdulla and Mahmoud Al{-}Ayyoub}, title = {An analytical study of Arabic sentiments: Maktoob case study}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {89--94}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750168}, doi = {10.1109/ICITST.2013.6750168}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Al-KabiAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-Shorafat13, author = {Wafa Slaibi Al{-}Shorafat}, title = {Security in software engineering requirement}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {666--673}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750287}, doi = {10.1109/ICITST.2013.6750287}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-Shorafat13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlabdulatifMN13, author = {Abdullah A. Alabdulatif and Xiaoqi Ma and Lars Nolle}, title = {Analysing and attacking the 4-way handshake of {IEEE} 802.11i standard}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {382--387}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750227}, doi = {10.1109/ICITST.2013.6750227}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlabdulatifMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlgarniXCT13, author = {Abdullah Algarni and Yue Xu and Taizan Chan and Yu{-}Chu Tian}, title = {Social engineering in social networking sites: Affect-based model}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {508--515}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750253}, doi = {10.1109/ICITST.2013.6750253}, timestamp = {Wed, 30 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlgarniXCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlhomidiR13, author = {Mohammed A. Alhomidi and Martin J. Reed}, title = {Security risk analysis as a service}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {156--161}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750182}, doi = {10.1109/ICITST.2013.6750182}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlhomidiR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiD13, author = {Fahad M. Alotaibi and Jordan Dimitrov}, title = {Implementation and evaluation of classroom simulation for trainee teacher using second life environments}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {636--643}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750280}, doi = {10.1109/ICITST.2013.6750280}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiW13, author = {Sara Jeza Alotaibi and Mike Wald}, title = {Evaluation of the {UTAUT} model for acceptable user experiences in Identity Access Management Systems}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {232--237}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750197}, doi = {10.1109/ICITST.2013.6750197}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlshehriS13, author = {Abdullah Ali Alshehri and Steve A. Schneider}, title = {Formally defining {NFC} M-coupon requirements, with a case study}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {52--58}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750161}, doi = {10.1109/ICITST.2013.6750161}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlshehriS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmmarF13, author = {Brika Ammar and Fahima Nader}, title = {Pedagogical hyperm{\'{e}}dias systems}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {332--337}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750217}, doi = {10.1109/ICITST.2013.6750217}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AmmarF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArachchilageNM13, author = {Nalin Asanka Gamagedara Arachchilage and Cornelius Namiluko and Andrew P. Martin}, title = {A taxonomy for securely sharing information among others in a trust domain}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {296--304}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750210}, doi = {10.1109/ICITST.2013.6750210}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ArachchilageNM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AtyaK13, author = {Ahmed Osama Fathy Atya and Jilong Kuang}, title = {{RUFC:} {A} flexible framework for reliable {UDP} with flow control}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {276--281}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750205}, doi = {10.1109/ICITST.2013.6750205}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AtyaK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AwadL13, author = {Mohammed Awad and Ernst L. Leiss}, title = {End-to-End cryptographic voting: Potentials and limitations}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {113--118}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750173}, doi = {10.1109/ICITST.2013.6750173}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AwadL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AydinJ13, author = {Mustafa Aydin and Jeremy Jacob}, title = {A comparison of major issues for the development of forensics in cloud computing}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {77--82}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750166}, doi = {10.1109/ICITST.2013.6750166}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AydinJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BattikhABDK13, author = {Dalia Battikh and Safwan El Assad and Bassem Bakhache and Olivier D{\'{e}}forges and Mohamad Khalil}, title = {Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysis}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {20--25}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750155}, doi = {10.1109/ICITST.2013.6750155}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BattikhABDK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BenkhelifaW13, author = {Elhadj Benkhelifa and Thomas Welsh}, title = {A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {142--148}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750179}, doi = {10.1109/ICITST.2013.6750179}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BenkhelifaW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BertolissiR13, author = {Clara Bertolissi and Silvio Ranise}, title = {A methodology to build run-time monitors for security-aware workflows}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {501--502}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750251}, doi = {10.1109/ICITST.2013.6750251}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BertolissiR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BorchertG13, author = {Bernd Borchert and Max G{\"{u}}nther}, title = {Indirect NFC-login}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {204--209}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750192}, doi = {10.1109/ICITST.2013.6750192}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BorchertG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BoukhadraBB13, author = {Adel Boukhadra and Karima Benatchba and Amar Balla}, title = {{DA5DCSWS:} {A} Distributed Architecture for semantic Web services Discovery and Composition}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {182--187}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750188}, doi = {10.1109/ICITST.2013.6750188}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BoukhadraBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Brooks13, author = {Tyson T. Brooks}, title = {{ICITST-2013:} Keynote speaker 3: Blurred nets: Disruption and the risk to future 'Internet of Things' (IoT) architectures}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {15}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750150}, doi = {10.1109/ICITST.2013.6750150}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Brooks13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BrooksKCPM13, author = {Tyson Brooks and Michelle L. Kaarst{-}Brown and Carlos Caicedo and Joon Park and Lee McKnight}, title = {A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {516--523}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750254}, doi = {10.1109/ICITST.2013.6750254}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BrooksKCPM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ByonJEB13, author = {Young{-}Ji Byon and Young{-}Seon Jeong and Said M. Easa and Joonsang Baek}, title = {Feasibility analysis of transportation applications based on APIs of social network services}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {59--64}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750162}, doi = {10.1109/ICITST.2013.6750162}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ByonJEB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CaoSW13, author = {Chongxiao Cao and Fengguang Song and Daniel G. Waddington}, title = {Implementing a high-performance recommendation system using Phoenix++}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {252--257}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750200}, doi = {10.1109/ICITST.2013.6750200}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CaoSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CaragataTL13, author = {Daniel Caragata and Karim Tabia and Mauricio Luduena}, title = {Cryptanalysis of a chaos-based encryption algorithm for distributed systems}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {31--36}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750157}, doi = {10.1109/ICITST.2013.6750157}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CaragataTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CatuognoG13, author = {Luigi Catuogno and Clemente Galdi}, title = {Towards the design of a film-based graphical password scheme}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {388--393}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750228}, doi = {10.1109/ICITST.2013.6750228}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CatuognoG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Chang13, author = {Yoon Seok Chang}, title = {RISC'13 Workshop: Keynote speaker 5}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {17}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750152}, doi = {10.1109/ICITST.2013.6750152}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Chang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChenCSK13, author = {Xian Chen and Meilian Chen and Hyoseop Shin and Eun Yi Kim}, title = {Mining salient images from a large-scale blogosphere}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {132--136}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750177}, doi = {10.1109/ICITST.2013.6750177}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChenCSK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChoiKAB13, author = {Hyun{-}Hwa Choi and Byoung{-}Seob Kim and Shin{-}Young Ahn and Seung{-}Jo Bae}, title = {A workflow for parallel and distributed computing of large-scale genomic data}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {215--218}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750194}, doi = {10.1109/ICITST.2013.6750194}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChoiKAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChoiYCY13, author = {Shiu Hong Choi and Bo Yang and H. H. Cheung and Y. X. Yang}, title = {Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {265--269}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750203}, doi = {10.1109/ICITST.2013.6750203}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChoiYCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ClarkePT13, author = {Charles A. Clarke and Eckhard Pfluegel and Dimitris Tsaptsinos}, title = {Enhanced Virtual Private Social Networks: Implementing user content confidentiality}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {306--312}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750212}, doi = {10.1109/ICITST.2013.6750212}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ClarkePT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CostelloS13, author = {Robert Costello and Nigel Shaw}, title = {Assisted Learning Virtual Support {(ALVS)} for postgraduate students, through the Graduate Virtual Research Environment {(GVRE)}}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {407--410}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750232}, doi = {10.1109/ICITST.2013.6750232}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CostelloS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DammakJB13, author = {Sahar Maalej Dammak and Anis Jedidi and Rafik Bouaziz}, title = {Automation and evaluation of the semantic annotation of Web resources}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {443--448}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750239}, doi = {10.1109/ICITST.2013.6750239}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DammakJB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DzuganFM13, author = {Nicholas Dzugan and Lance Fannin and S. Kami Makki}, title = {A recommendation scheme utilizing Collaborative Filtering}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {96--100}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750170}, doi = {10.1109/ICITST.2013.6750170}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DzuganFM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ElmogazyB13, author = {Huda Elmogazy and Omaima Bamasak}, title = {Towards healthcare data security in cloud computing}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {363--368}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750223}, doi = {10.1109/ICITST.2013.6750223}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ElmogazyB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ElzawiWKP13, author = {Abdussalam Elzawi and Stephen J. Wade and Thuraya Kenan and Crinela Pislaru}, title = {Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the Internet}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {490--493}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750248}, doi = {10.1109/ICITST.2013.6750248}, timestamp = {Wed, 06 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ElzawiWKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EvestiSS13, author = {Antti Evesti and Jani Suomalainen and Reijo Savola}, title = {Security risks in the short-range communication of ubiquitous application}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {612--617}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750275}, doi = {10.1109/ICITST.2013.6750275}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/EvestiSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FawazAFKLD13, author = {Zeinab Fawaz and Safwan El Assad and M. Frajallah and Ayman Khalil and Ren{\'{e}} Lozi and Olivier D{\'{e}}forges}, title = {Lightweight chaos-based cryptosystem for secure images}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {26--30}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750156}, doi = {10.1109/ICITST.2013.6750156}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FawazAFKLD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FischerMS13, author = {Daniel Fischer and Bernd Markscheffel and T. Seyffarth}, title = {Smartphone security: Overview of security software solutions}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {288--289}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750208}, doi = {10.1109/ICITST.2013.6750208}, timestamp = {Fri, 22 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/FischerMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FlorianPT13, author = {Markus Florian and Sarita Paudel and Markus Tauber}, title = {Trustworthy evidence gathering mechanism for multilayer cloud compliance}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {529--530}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750257}, doi = {10.1109/ICITST.2013.6750257}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FlorianPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FujiiT13, author = {Haruhiko Fujii and Yukio Tsuruoka}, title = {{SV-2FA:} Two-factor user authentication with {SMS} and voiceprint challenge response}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {283--287}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750207}, doi = {10.1109/ICITST.2013.6750207}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FujiiT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GabrielAAA13, author = {Arome Junior Gabriel and Boniface Kayode Alese and Adebayo O. Adetunmbi and Olumide S. Adewale}, title = {Post-Quantum Crystography: {A} combination of Post-Quantum Cryptography and Steganography}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {449--452}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750240}, doi = {10.1109/ICITST.2013.6750240}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GabrielAAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GarasymT13, author = {Oleg Garasym and Ina Taralova}, title = {High-speed encryption method based on switched chaotic model with changeable parameters}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {37--42}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750158}, doi = {10.1109/ICITST.2013.6750158}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GarasymT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Geerdink13, author = {Bas Geerdink}, title = {A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technology}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {71--76}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750165}, doi = {10.1109/ICITST.2013.6750165}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Geerdink13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HamdaneSF13, author = {Balkis Hamdane and Ahmed Serhrouchni and Sihem Guemara El Fatmi}, title = {Access control enforcement in Named Data Networking}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {576--581}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750268}, doi = {10.1109/ICITST.2013.6750268}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HamdaneSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HamedAKK13, author = {Asma Hamed and Hella Kaffel{-}Ben Ayed and Mohamed Ali K{\^{a}}afar and Ahmed Kharraz}, title = {Evaluation of third party tracking on the web}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {471--477}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750244}, doi = {10.1109/ICITST.2013.6750244}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/HamedAKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HanXB13, author = {Liangxiu Han and Zheng Xie and Richard A. Baldock}, title = {Automatic data reuse for accelerating data intensive applications in the Cloud}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {596--600}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750272}, doi = {10.1109/ICITST.2013.6750272}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HanXB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IqbalSF13, author = {Saeed Iqbal and Muhammad Shaheen and Fazl{-}e{-}Basit}, title = {A machine learning based method for optimal journal classification}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {259--264}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750202}, doi = {10.1109/ICITST.2013.6750202}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IqbalSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JangJC13, author = {Miyoung Jang and Ara Jo and Jae{-}Woo Chang}, title = {A privacy-aware query authentication index for encrypted database in cloud}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {126--131}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750176}, doi = {10.1109/ICITST.2013.6750176}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JangJC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KaboreSSP13, author = {Kiswendsida K. Kabore and Oumarou Sie and Florence S{\`{e}}des and Andr{\'{e}} P{\'{e}}ninou}, title = {Information Access Assistant Service {(IAAS)}}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {554--557}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750263}, doi = {10.1109/ICITST.2013.6750263}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KaboreSSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Kalman13, author = {Mikl{\'{o}}s K{\'{a}}lm{\'{a}}n}, title = {ProtoML: {A} rule-based validation language for Google Protocol Buffers}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {188--193}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750189}, doi = {10.1109/ICITST.2013.6750189}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Kalman13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KandiraMP13, author = {Muteveri Kandira and Jabu Mtsweni and Keshnee Padayachee}, title = {Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {653--658}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750284}, doi = {10.1109/ICITST.2013.6750284}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KandiraMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KarimiH13, author = {Kamyab Karimi and Carl Hauser}, title = {Internet Unite-and-Conquer architecture}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {219--230}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750195}, doi = {10.1109/ICITST.2013.6750195}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KarimiH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KayodeBI13, author = {Boniface Kayode Alese and Iwasokun Gabriel Babatunde and Haruna Danjuma Israel}, title = {{DGM} approach to network attacker and defender strategies}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {313--320}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750213}, doi = {10.1109/ICITST.2013.6750213}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KayodeBI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KedjarT13, author = {Saadia Kedjar and Abdelkamel Tari}, title = {The hybrid model for web services security access control and information flow control}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {194--202}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750190}, doi = {10.1109/ICITST.2013.6750190}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KedjarT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KenanPER13, author = {Thuraya Kenan and Crinela Pislaru and Abdussalam Elzawi and Maysoun Restoum}, title = {Improving the effectiveness of collaborative learning processes in Libyan Higher Education}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {411--416}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750233}, doi = {10.1109/ICITST.2013.6750233}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KenanPER13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhanOK13, author = {Afnan Ullah Khan and Manuel Oriol and Mariam Kiran}, title = {Threat methodology for securing scalable video in the Cloud}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {428--436}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750237}, doi = {10.1109/ICITST.2013.6750237}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhanOK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhasawnehWAA13, author = {Rawan T. Khasawneh and Heider Wahsheh and Mohammed Al{-}Kabi and Izzat Mahmoud Alsmadi}, title = {Sentiment analysis of arabic social media content: a comparative study}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {101--106}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750171}, doi = {10.1109/ICITST.2013.6750171}, timestamp = {Thu, 10 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/KhasawnehWAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimKA13, author = {Daehee Kim and Sangwook Kang and Sunshin An}, title = {Energy efficient time synchronization for target tracking in heterogeneous sensor networks}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {238--243}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750198}, doi = {10.1109/ICITST.2013.6750198}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimKA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LeeKKH13, author = {Jong{-}Hoon Lee and Jung{-}Tae Kim and Ik{-}Kyun Kim and Ki Jun Han}, title = {Design and implementation of the contents visualization system for social networks}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {479--483}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750246}, doi = {10.1109/ICITST.2013.6750246}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LeeKKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MacDermottSMK13, author = {{\'{A}}ine MacDermott and Qi Shi and Madjid Merabti and Kashif Kifayat}, title = {Considering an elastic scaling model for cloud Security}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {150--155}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750181}, doi = {10.1109/ICITST.2013.6750181}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/MacDermottSMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ManzoorZB13, author = {Umar Manzoor and Maria Zubair and Kanwal Batool}, title = {Using multi-agent systems to solve food distribution problem in disaster area}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {684--689}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750290}, doi = {10.1109/ICITST.2013.6750290}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ManzoorZB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MohammadAES13, author = {Omer K. Jasim Mohammad and Safia Abbas and El{-}Sayed M. El{-}Horbaty and Abdel{-}Badeeh M. Salem}, title = {A comparative study between modern encryption algorithms based on cloud computing environment}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {531--535}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750258}, doi = {10.1109/ICITST.2013.6750258}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MohammadAES13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MsahliAS13, author = {Mounira Msahli and Rached Abdeljaoued and Ahmed Serhrouchni}, title = {Access control in probative value Cloud}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {607--611}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750274}, doi = {10.1109/ICITST.2013.6750274}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MsahliAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MselleK13, author = {Leonard James Mselle and Tabu S. Kondo}, title = {Results on implementing personal learning environments in Tanzanian secondary schools}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {417--421}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750234}, doi = {10.1109/ICITST.2013.6750234}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MselleK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MusaC13, author = {Nadianatra Musa and Bob Clift}, title = {A model of component interaction between Formal, Technical and Informal components within {IS/IT} security governance}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {454--462}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750242}, doi = {10.1109/ICITST.2013.6750242}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MusaC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MusaW13, author = {Ibrahim Kabiru Musa and Stuart D. Walker}, title = {Adaptive market place for converged cloud computing model}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {601--606}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750273}, doi = {10.1109/ICITST.2013.6750273}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MusaW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NakagawaMO13, author = {Yuri Nakagawa and Yuuki Matsuda and Tetsuro Ogi}, title = {Framework for handling personal data proposed system of the self-control on buying information}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {107--112}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750172}, doi = {10.1109/ICITST.2013.6750172}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NakagawaMO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NakayamaOKMYN13, author = {Hiroki Nakayama and Ryo Onuma and Hiroaki Kaminaga and Youzou Miyadera and Setsuo Yokoyama and Shoichi Nakamura}, title = {Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationships}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {563--568}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750265}, doi = {10.1109/ICITST.2013.6750265}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NakayamaOKMYN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NoorafizaMKU13, author = {Matrazali Noorafiza and Hiroshi Maeda and Toshiyuki Kinoshita and Ryuya Uda}, title = {Virtual machine remote detection method using network timestamp in cloud computing}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {375--380}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750225}, doi = {10.1109/ICITST.2013.6750225}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NoorafizaMKU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ObrulZ13, author = {Denis Obrul and Borut Zalik}, title = {Real-time adaptive arrival prediction system for public transport}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {674--677}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750288}, doi = {10.1109/ICITST.2013.6750288}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ObrulZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OestR13, author = {Adam Oest and Manjeet Rege}, title = {Feedback-driven clustering for automated linking of web pages}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {344--349}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750219}, doi = {10.1109/ICITST.2013.6750219}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OestR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OlmstedF13, author = {Aspen Olmsted and Csilla Farkas}, title = {Web Service constraint optimization}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {270--275}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750204}, doi = {10.1109/ICITST.2013.6750204}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OlmstedF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Ontanon-GarciaGCC13, author = {L. J. Ontanon{-}Garcia and M. Garcia{-}Martinez and Eric Campos{-}Cant{\'{o}}n and Sergej Celikovsk{\'{y}}}, title = {Grayscale image encryption using a hyperchaotic unstable dissipative system}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {503--507}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750252}, doi = {10.1109/ICITST.2013.6750252}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Ontanon-GarciaGCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OnumaNKMMN13, author = {Ryo Onuma and Hiroki Nakayama and Hiroaki Kaminaga and Yasuhiko Morimoto and Youzou Miyadera and Shoichi Nakamura}, title = {Methods for strategic accumulation of context information in research activities}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {678--683}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750289}, doi = {10.1109/ICITST.2013.6750289}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OnumaNKMMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PaudelTB13, author = {Sarita Paudel and Markus Tauber and Ivona Brandic}, title = {Security standards taxonomy for Cloud applications in Critical Infrastructure {IT}}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {645--646}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750282}, doi = {10.1109/ICITST.2013.6750282}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PaudelTB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PerettiGSZ13, author = {Chiara Peretti and Paolo Gastaldo and Marco Stramezzi and Rodolfo Zunino}, title = {Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystems}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {394--400}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750229}, doi = {10.1109/ICITST.2013.6750229}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PerettiGSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Prince13, author = {Nwankwo Nonso Prince}, title = {Design and implementation of microcontroller based short message service control system}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {494--499}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750249}, doi = {10.1109/ICITST.2013.6750249}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Prince13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PrungsinchaiKB13, author = {Supakorn Prungsinchai and Fouad Khelifi and Ahmed Bouridane}, title = {{DCT} sign-based robust image hashing}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {401--405}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750230}, doi = {10.1109/ICITST.2013.6750230}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PrungsinchaiKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/QuwaiderJ13, author = {Muhannad Quwaider and Yaser Jararweh}, title = {Cloudlet-based for big data collection in body area networks}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {137--141}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750178}, doi = {10.1109/ICITST.2013.6750178}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/QuwaiderJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RahimM13, author = {Aneel Rahim and Paul Malone}, title = {Intrusion detection system for Wireless Nano sensor Networks}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {327--330}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750215}, doi = {10.1109/ICITST.2013.6750215}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RahimM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RamliAA13, author = {Sofia Najwa Ramli and Rabiah Ahmad and Mohd Faizal Abdollah}, title = {Electrocardiogram {(ECG)} signals as biometrics in securing Wireless Body Area Network}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {536--541}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750259}, doi = {10.1109/ICITST.2013.6750259}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RamliAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RanaeeNJG13, author = {Iman Ranaee and Mahdi Majidi Nia and Reza Jahantigh and Amirhossein Gharib}, title = {Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automata}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {582--587}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750269}, doi = {10.1109/ICITST.2013.6750269}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RanaeeNJG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RehmanE13, author = {Shafiq{-}Ur Rehman and Naveed Ejaz}, title = {Towards an efficient shopping mechanism for M-commerce}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {558--562}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750264}, doi = {10.1109/ICITST.2013.6750264}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/RehmanE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RezaeiKRK13, author = {Abdolazim Rezaei and Zarinah Mohd Kasirun and Vala Ali Rohani and Touraj Khodadadi}, title = {Anomaly detection in Online Social Networks using structure-based technique}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {619--622}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750277}, doi = {10.1109/ICITST.2013.6750277}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RezaeiKRK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RinaldiRMN13, author = {Luciene Cristina Alves Rinaldi and Briseida Dogo de Resende and Rodrigo Bossini Tavares Moreira and M{\'{a}}rcio Lobo Netto}, title = {A system for social network analysis}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {120--125}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750175}, doi = {10.1109/ICITST.2013.6750175}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/RinaldiRMN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SGT13, author = {S. Ananda Kanagaraj and G. Arjun and T. Sree Sharmila}, title = {Pseudo Eye: The next-generation shopping application using Augmented Reality}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {549--553}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750262}, doi = {10.1109/ICITST.2013.6750262}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SahuS13, author = {Hemlal Sahu and Birendra Kumar Sharma}, title = {A new encryption scheme based on hybrid Problems}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {524--527}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750255}, doi = {10.1109/ICITST.2013.6750255}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SahuS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SalemB13, author = {Maher Salem and Ulrich Buehler}, title = {Reinforcing network security by converting massive data flow to continuous connections for {IDS}}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {570--575}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750267}, doi = {10.1109/ICITST.2013.6750267}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/SalemB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SchlessV13, author = {Timo Schless and Harald P. E. Vranken}, title = {Counter botnet activities in the Netherlands a study on organisation and effectiveness}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {437--442}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750238}, doi = {10.1109/ICITST.2013.6750238}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SchlessV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShaheenIF13, author = {Muhammad Shaheen and Saeed Iqbal and Fazl{-}e{-}Basit}, title = {Labeled clustering a unique method to label unsupervised classes}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {210--214}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750193}, doi = {10.1109/ICITST.2013.6750193}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShaheenIF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShahriarNCM13, author = {Hossain Shahriar and Sarah North and Wei{-}Chuen Chen and Edward Mawangi}, title = {Design and development of Anti-XSS proxy}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {484--489}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750247}, doi = {10.1109/ICITST.2013.6750247}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShahriarNCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShandilyaS13, author = {Vivek Shandilya and Sajjan G. Shiva}, title = {Security in the cloud based systems: Structure and breaches}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {542--547}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750260}, doi = {10.1109/ICITST.2013.6750260}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShandilyaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShemailiYZMC13, author = {Mouza Ahmad Bani Shemaili and Chan Yeob Yeun and Mohamed Jamal Zemerly and Khalid Mubarak and Yoon Seok Chang}, title = {Securing E-Seal real time tracking system for Internet of Things}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {65--69}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750163}, doi = {10.1109/ICITST.2013.6750163}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShemailiYZMC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Shoniregun13, author = {Charles A. Shoniregun}, title = {{ICITST-2013:} Keynote speaker 4: Writing a sustainable research paper}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {16}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750151}, doi = {10.1109/ICITST.2013.6750151}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Shoniregun13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SicuranzaE13, author = {Mario Sicuranza and Angelo Esposito}, title = {An access control model for easy management of patient privacy in {EHR} systems}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {463--470}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750243}, doi = {10.1109/ICITST.2013.6750243}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SicuranzaE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SilvaMZ13, author = {Bruno Silva and Paulo Romero Martins Maciel and Armin Zimmermann}, title = {Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systems}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {647--652}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750283}, doi = {10.1109/ICITST.2013.6750283}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/SilvaMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SitaramPVRPJDRPRA13, author = {Dinkar Sitaram and H. L. Phalachandra and Anush Vishwanath and Pramod Ramesh and Meghana Prashanth and Akshay G. Joshi and Anoop R. Desai and Harikrishna Prabhu C. R and Prafulla and Shwetha R and Yashaswini A}, title = {Keystone federated security}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {659--664}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750285}, doi = {10.1109/ICITST.2013.6750285}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SitaramPVRPJDRPRA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Sorensen13, author = {Ove S{\"{o}}rensen}, title = {Zombie-cookies: Case studies and mitigation}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {321--326}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750214}, doi = {10.1109/ICITST.2013.6750214}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Sorensen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Stupples13, author = {David Stupples}, title = {{ICITST-2013:} Keynote speaker 2: Security challenge of {TOR} and the deep web}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {14}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750149}, doi = {10.1109/ICITST.2013.6750149}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Stupples13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VelascoWR13, author = {Margarita Velasco and David While and Pathmeswaran Raju}, title = {Adaptation of Web services using policies}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {338--343}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750218}, doi = {10.1109/ICITST.2013.6750218}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VelascoWR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WesthuizenC13, author = {Charl van der Westhuizen and Marijke Coetzee}, title = {Context-aware RESTful services on mobile devices}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {350--355}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750220}, doi = {10.1109/ICITST.2013.6750220}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WesthuizenC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Wiley13, author = {Jeffrey J. Wiley}, title = {{ICITST-2013:} Keynote speaker 1: Principles of information security risk management}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {13}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750148}, doi = {10.1109/ICITST.2013.6750148}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Wiley13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WillettS13, author = {Melanie Willett and Rossouw von Solms}, title = {A framework for assuring the conformance of cloud-based email}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {168--173}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750184}, doi = {10.1109/ICITST.2013.6750184}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WillettS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YuliantoP13, author = {Aditya Yulianto and Maria Irmina Prasetiyowati}, title = {BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {357--362}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750222}, doi = {10.1109/ICITST.2013.6750222}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YuliantoP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZalmoutG13, author = {Nasser Zalmout and Moustafa Ghanem}, title = {Multidimensional community detection in Twitter}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {83--88}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750167}, doi = {10.1109/ICITST.2013.6750167}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZalmoutG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhaoBB13, author = {Nan Zhao and Lo{\"{\i}}c Baud and Patrick Bellot}, title = {Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1Fichier}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {176--181}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750187}, doi = {10.1109/ICITST.2013.6750187}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhaoBB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2013, title = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, publisher = {{IEEE}}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6745432/proceeding}, isbn = {978-1-908320-20-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdelhamidAT12, author = {Neda Abdelhamid and Aladdin Ayesh and Fadi A. Thabtah}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {An experimental study of three different rule ranking formulas in associative classification}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {795--800}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470929/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AbdelhamidAT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbuhusseinBS12, author = {Abdullah Abuhussein and Harkeerat Singh Bedi and Sajjan G. Shiva}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Evaluating security and privacy in cloud computing services: {A} Stakeholder's perspective}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {388--395}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470836/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbuhusseinBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlMahmoudCYA12, author = {Abdelrahman AlMahmoud and Maurizio Colombo and Chan Yeob Yeun and Hassan Al{-}Muhairi}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Smart authentication for real-time business process monitoring}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {253--258}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470954/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlMahmoudCYA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlarifiW12, author = {Suaad S. Alarifi and Stephen D. Wolthusen}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Detecting anomalies in IaaS environments through virtual machine host system call analysis}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {211--218}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470945/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlarifiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlghafliJM12, author = {Khawla Abdulla Alghafli and Andrew Jones and Thomas Anthony Martin}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Forensics data acquisition methods for mobile phones}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {265--269}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470956/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlghafliJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlharbiPA12, author = {Mafawez T. Alharbi and Amelia Platt and Ali H. Al{-}Bayatti}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Context-aware Personal Learning Environment}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {692--697}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470905/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlharbiPA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlhusseinSW12, author = {Mohammed Alhussein and Avinash Srinivasan and Duminda Wijesekera}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Forensics filesystem with cluster-level identifiers for efficient data recovery}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {411--415}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470840/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlhusseinSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlotaibiW12, author = {Sara Jeza Alotaibi and Mike Wald}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Towards a UTAUT-based model for studying the integrating physical and virtual Identity Access Management Systems in e-government domain}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {453--458}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470849/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlotaibiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmatoMV12, author = {Alba Amato and Beniamino Di Martino and Salvatore Venticinque}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Evaluation and brokering of service level agreements for negotiation of cloud infrastructures}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {144--149}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470932/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmatoMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AndradeLN12, author = {Ana A. Andrade and Vitor V. Lopes and Augusto Q. Novais}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Quantifying the impact on distrust of e-commerce trust factors: {A} non-parametric study}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {356--361}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470830/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AndradeLN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AnzaiKMYMN12, author = {Hiroyuki Anzai and Hiroaki Kaminaga and Yasuhiko Morimoto and Setsuo Yokoyama and Youzou Miyadera and Shoichi Nakamura}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A system for management of research resources focusing on grasping the polish processes}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {816--817}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470826/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AnzaiKMYMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AokiIS12, author = {Shunsuke Aoki and Masayuki Iwai and Kaoru Sezaki}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Perturbation for privacy-preserving participatory sensing on mobile}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {809}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470822/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AokiIS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArunLT12, author = {S. N. Arun and W. C. Lam and Kok Kiong Tan}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Innovative solution for a telemedicine application}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {778--783}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470924/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ArunLT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Assad12, author = {Safwan El Assad}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Chaos Based Information Hiding and Security}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {67--72}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470986/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Assad12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AzniAN12, author = {A. H. Azni and Rabiah Ahmad and Zul Azri Muhamad Noh}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Correlated node behavior in wireless ad hoc networks: An epidemic model}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {403--410}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470839/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AzniAN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AzzamZ12, author = {Said Rabah Azzam and Shikun Zhou}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Implementation methodology of Rely/Guarantee plug-in for Prot{\'{e}}g{\'{e}}}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {710--714}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470909/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AzzamZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AzzamZ12a, author = {Said Rabah Azzam and Shikun Zhou}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Assessment of ontology alignment methodology}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {759--764}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470920/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AzzamZ12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BacksWK12, author = {Peter Backs and Steffen Wendzel and J{\"{o}}rg Keller}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Dynamic routing in covert channel overlays based on control protocols}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {32--39}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470978/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BacksWK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BaekVJAY12, author = {Joonsang Baek and Quang Hieu Vu and Andrew Jones and Sameera Al{-}Mulla and Chan Yeob Yeun}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Smart-frame: {A} flexible, scalable, and secure information management framework for smart grids}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {668--673}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470900/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BaekVJAY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BahigE12, author = {Ghada Moussa Bahig and Amr El{-}Kadi}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Ensuring software safety in safety critical domains}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {308--312}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470966/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BahigE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BenzidaneKS12, author = {Karim Benzidane and Saad Khoudali and Abderrahim Sekkaki}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Autonomous agent-based inspection for inter-VM traffic in a Cloud environment}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {656--661}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470898/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BenzidaneKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BotelhoNU12, author = {Bruno Alves Pereira Botelho and Emilio Tissato Nakamura and Nelson Uto}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Implementation of tools for brute forcing touch inputted passwords}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {807--808}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470821/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BotelhoNU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CarmichaelC12, author = {Dawn Carmichael and David Cleave}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {How effective is social media advertising? {A} study of Facebook Social Advertisements}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {226--229}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470948/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CarmichaelC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CastroMFB12, author = {Sidney de Castro and Maria das Gra{\c{c}}as Bruno Marietto and Robson dos Santos Fran{\c{c}}a and Wagner Tanaka Botelho}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A Multi-Agent System for information management and augmented reality in asymmetric wars}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {499--504}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470859/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CastroMFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChaisanitHSP12, author = {Settachai Chaisanit and Napatwadee Sangboonnum Hongthong and Surachai Suksakulchai and Chuchart Pinpat}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Traditional musical Virtual Reality on M-learning}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {271--274}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470958/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChaisanitHSP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Chemerkin12, author = {Yury Chemerkin}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Vulnerability elimination by force of new mobile {OS} Comparative research of security techniques on BlackBerry {OS} (incl. PlayBook)}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {483--487}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470855/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Chemerkin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChenTN12, author = {Y. Y. Chen and Shakirah Mohd Taib and Che Sarah Che Nordin}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Determinants of student performance in advanced programming course}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {304--307}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470965/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChenTN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChettoNAF12, author = {Maryline Chetto and Hassan Noura and Safwan El Assad and Mousa Farajallah}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {How to guarantee secured transactions with QoS and real-time constraints}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {40--44}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470979/}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ChettoNAF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChotoP12, author = {Somsak Choto and Nol Premasathian}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A dynamic fuzzy commitment scheme using {ARRSES} forecasting}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {616--619}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470890/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChotoP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ConnollyL12, author = {Lena Yuryna Connolly and Michael Lang}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Investigation of cultural aspects within information systems security research}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {105--111}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470994/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ConnollyL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CotL12, author = {L{\'{e}}a D. Cot and Ren{\'{e}} Lozi}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Assessing the security of subsampling process using modified {EKF} and nonlinear least squares methods}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {27--31}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470977/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CotL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CristinaE12, author = {Ana Cristina Dascalescu and Radu Eugen Boriga}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A new method to improve cryptographic properties of chaotic discrete dynamical systems}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {60--65}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470984/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CristinaE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Delgado-GuillenGT12, author = {Lorenzo Antonio Delgado{-}Guillen and Jose Juan Garcia{-}Hernandez and C{\'{e}}sar Torres{-}Huitzil}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Validating the existence of watermarks on digital images using a mobile phone}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {51--55}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470982/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Delgado-GuillenGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ElbadrawyA12, author = {Rehaballah Elbadrawy and Rasha Abdel Aziz}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Mobile banking contexts and prospects in Egypt: {A} framework}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {766--771}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470922/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ElbadrawyA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EldefrawyK12, author = {Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Detecting counterfeit-money using RFID-enabled mobile devices}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {74--79}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470988/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EldefrawyK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Fan12, author = {Limin Fan}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Security management mechanism for composite applications based on hash chains}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {575--577}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470877/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Fan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FarooqiN12, author = {Norah Farooqi and Siobh{\'{a}}n North}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Evaluation of practical trust based access control for {XML} databases}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {336--340}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470972/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FarooqiN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FischerMFB12, author = {Daniel Fischer and Bernd Markscheffel and Sebastian Frosch and Daniela B{\"{u}}ttner}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A survey of threats and security measures for data transmission over {GSM/UMTS} networks}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {477--482}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470854/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FischerMFB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FloodDKM12, author = {Jason Flood and Mark Denihan and Anthony Keane and Fredrick Mtenzi}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Black hat training of white hat resources: The future of security is gaming}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {488--491}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470856/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FloodDKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FranzSH12, author = {Elke Franz and Thomas Springer and Norbert Harder}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Enhancing privacy in social applications with the notion of group context}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {112--118}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470995/}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FranzSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GadelhaFC12, author = {Mikhail Y. R. Gadelha and Cicero Ferreira Fernandes Costa Filho and Marly Guimar{\~{a}}es Fernandes Costa}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Proposal of a cryptography method using gray scale digital images}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {331--335}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470971/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GadelhaFC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GaoK12, author = {Tom Yuan Gao and David Kearney}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A shared secret security broker implementation in a commercial context}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {133--138}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470884/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GaoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GhauriHHS12, author = {Sajjad Ahmed Ghauri and Hasan Humayun and Muhammad Ehsan ul Haq and Farhan Sohail}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Implementation of Convolutional codes on {FPGA}}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {175--178}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470938/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GhauriHHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GhazizadehZMKT12, author = {Eghbal Ghazizadeh and Mazdak Zamani and Jamalul{-}lail Ab Manan and Reza Khaleghparast and Ali Taherian}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A trust based model for federated identity architecture to mitigate identity theft}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {376--381}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470834/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GhazizadehZMKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GonzalezLL12, author = {Carlos R. Jaimez{-}Gonz{\'{a}}lez and Wulfrano Arturo Luna{-}Ram{\'{\i}}rez and Simon M. Lucas}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A web tool for monitoring {HTTP} asynchronous method invocations}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {127--132}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470883/}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GonzalezLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GonzalezSBSC12, author = {Jos{\'{e}} Luis Gonz{\'{a}}lez and Victor Sosa{-}Sosa and Borja Bergua and Luis Miguel S{\'{a}}nchez and Jes{\'{u}}s Carretero}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Fault-tolerant middleware based on multistream pipeline for private storage services}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {548--555}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470871/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GonzalezSBSC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Gordon12, author = {Damian Gordon}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Hackers and Hollywood 2: Considering televisual Cyberthreats in Security Risk Analysis}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {524--527}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470865/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Gordon12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GulAVY12, author = {Omniyah Gul and Mahmoud Al{-}Qutayri and Quang Hieu Vu and Chan Yeob Yeun}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Data integration of electronic health records using artificial neural networks}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {313--317}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470967/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GulAVY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GuoBH12, author = {Yang Guo and Guohua Bai and Yan Hu}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Using Bayes Network for Prediction of Type-2 diabetes}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {471--472}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470852/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GuoBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GuptaSK12, author = {Sanchika Gupta and Anjali Sardana and Padam Kumar}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A light weight centralized file monitoring approach for securing files in Cloud environment}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {382--387}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470835/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GuptaSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HaJ12, author = {JeongMok Ha and Hong Jeong}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Modelsim simulation for real-time stereo matching using {DP} algorithm}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {244--248}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470952/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HaJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Halaoui12, author = {Hatem Fawzi Halaoui}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Uncertainty with {STOS:} Intelligent solution for uncertain navigation problems}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {362--367}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470831/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Halaoui12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HamidAY12, author = {N. Abdul Hamid and M. F. Al A'zhim and M. L. Yap}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {e-Ticketing system for football events in Malaysia}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {556--561}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470872/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HamidAY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HaronMSL12, author = {Galoh Rashidah Haron and Dharmadharshni Maniam and Vijayakumari Sadasivam and Wong Hon Loon}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Re-engineering of web reverse proxy with shibboleth authentication}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {325--330}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470970/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HaronMSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HassaneinG12, author = {Mohamed Sameh Hassanein and Gheorghita Ghinea}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Text fingerprint key generation}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {603--609}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470888/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HassaneinG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HeckmannZMWP12, author = {Benjamin Heckmann and Marcus Zinn and Ronald C. Moore and Christoph Wentzel and Andrew D. Phippen}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Economic efficiency control on data centre resources in heterogeneous cost scenarios}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {675--679}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470902/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HeckmannZMWP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HuLKB12, author = {Yan Hu and Fangjie Lu and Israr Khan and Guohua Bai}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A cloud computing solution for sharing healthcare information}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {465--470}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470851/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HuLKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HuangFCZR12, author = {Xin Huang and Rong Fu and Bangdao Chen and Tingting Zhang and A. W. Roscoe}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {User interactive Internet of things privacy preserved access control}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {597--602}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470887/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HuangFCZR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HuangGCR12, author = {Xin Huang and Shangyuan Guo and Bangdao Chen and A. W. Roscoe}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Bootstrapping body sensor networks using human controlled LED-camera channels}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {433--438}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470845/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HuangGCR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Idzikowska12, author = {Ewa Idzikowska}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A round level approach to fault detection in {PP-2} symmetric block cipher}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {416--419}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470841/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Idzikowska12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IonescuATMS12, author = {Laurentiu Ionescu and Constantin Anton and Ion Tutanescu and Alin Mazare and Gheorghe Serban}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Error correction and detection system based on Hopfield networks}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {541--544}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470868/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IonescuATMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IzidaTMSBF12, author = {Aline Izida and Thiago da Rocha Tedrus and Maria das Gra{\c{c}}as Bruno Marietto and Margarethe Steinberger{-}Elias and Wagner Tanaka Botelho and Robson dos Santos Fran{\c{c}}a}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Emergency care in situations of natural disaster: {A} Multi-Agent approach}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {237--242}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470950/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IzidaTMSBF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JainA12, author = {Ruchi Jain and Nasser S. Abouzakhar}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Hidden Markov Model based anomaly intrusion detection}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {528--533}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470866/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JainA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JungHDKJK12, author = {Markus Jung and Thomas Hofer and Susen D{\"{o}}belt and Georg Kienesberger and Florian Judex and Wolfgang Kastner}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Access control for a Smart Grid {SOA}}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {281--287}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470960/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JungHDKJK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JustA12, author = {Mike Just and David Aspinall}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {On the security and usability of dual credential authentication in {UK} online banking}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {259--264}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470955/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JustA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KarnadN12, author = {Kiran Karnad and Saravanan Nagenthram}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Cloud security: Can the cloud be secured?}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {208--210}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470944/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KarnadN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhalidAPR12, author = {Saneeha Khalid and Haider Abbas and Maruf Pasha and Asad Raza}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Securing Internet Information Services {(IIS)} configuration files}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {726--729}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470913/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhalidAPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhongpitpKS12, author = {Veena Khongpit and Uthairatt Phangphol and M. L. Kulthon Kasemsan and Chonawat Srisa{-}an}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {2D Gun's type classification using edge detection algorithm and {SUSAN} low level image processing}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {521--523}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470864/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhongpitpKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimA12, author = {Sukyoung Kim and Kihong Ahn}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {User-intent custom adaptive search service based on ontology and similar-word retrieval algorithm composition}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {121--126}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470882/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimLDY12, author = {Yongki Kim and Jungmin Lim and Seokjoo Doo and Hyunsoo Yoon}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {The design of adaptive intrusion tolerant system(ITS) based on historical data}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {662--667}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470899/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimLDY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KirkhamDKJAKVE12, author = {Tom Kirkham and Karim Djemame and Mariam Kiran and Ming Jiang and Django Armstrong and George Kousiouris and George Vafiadis and Athanasia Evangelinou}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Risk based {SLA} management in clouds: {A} legal perspective}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {156--160}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470934/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KirkhamDKJAKVE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KulkarniMKG12, author = {Saurabh Kulkarni and Madhumitra Mutalik and Prathamesh Kulkarni and Tarun Gupta}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Honeydoop - a system for on-demand virtual high interaction honeypots}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {743--747}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470917/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KulkarniMKG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KumarD12, author = {V. Anil Kumar and Debabrata Das}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Feedback manipulation flooding attack: Feasibility evaluation and impact quantification on Stream Control Transmission Protocol}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {420--425}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470842/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KumarD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LazouskiMMM12, author = {Aliaksandr Lazouski and Gaetano Mancini and Fabio Martinelli and Paolo Mori}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Usage control in cloud systems}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {202--207}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470943/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LazouskiMMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Lin12, author = {Hsi{-}Chung Lin}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Content Extraction Signatures Revisited}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {447--451}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470847/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Lin12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Ma12, author = {Ji Ma}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Analysis of access control protocols using labelled tableaux}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {610--615}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470889/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Ma12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MalikHC12, author = {Sheheryar Malik and Fabrice Huet and Denis Caromel}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Reliability aware scheduling in cloud computing}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {194--200}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470942/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MalikHC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MalikHC12a, author = {Sheheryar Malik and Fabrice Huet and Denis Caromel}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {{RACS:} {A} framework for Resource Aware Cloud computing}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {680--687}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470903/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MalikHC12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ManzoorEAUKU12, author = {Umar Manzoor and Naveed Ejaz and Nadeem Akhtar and Muhammad Umar and M. Shoaib Khan and Hafsa Umar}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Ontology based image retrieval}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {288--293}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470961/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ManzoorEAUKU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MariettoFSBNS12, author = {Maria das Gra{\c{c}}as Bruno Marietto and Robson dos Santos Fran{\c{c}}a and Margarethe Steinberger{-}Elias and Wagner Tanaka Botelho and Emerson Aguiar Noronha and Vera L{\'{u}}cia da Silva}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Comparing distinct approaches for panic behavior computer simulations: {A} theoretical analysis}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {628--633}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470893/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MariettoFSBNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MariettoSAT12, author = {Maria das Gra{\c{c}}as Bruno Marietto and Margarethe Born Steinberger{-}Elias and Marllon Felipe Muniz De Farias Alves and Rita Vucinic Teles}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {The process of building knowledge and communication of social systems emulated by multiagent systems capable of cause and emerging learning}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {642--647}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470895/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MariettoSAT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MatsumotoYKMN12, author = {Takuya Matsumoto and Tatuya Yamazaki and Hiroaki Kaminaga and Youzou Miyadera and Shoichi Nakamura}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Visualization of Web exploration streams and user's genuine intentions}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {814--815}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470825/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MatsumotoYKMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MbaleMH12, author = {Jameson Mbale and Kauna Mufeti and Victor Hamutenya}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Examining ubiquitous security-capital issues in implementing a Campus-System-as-a-Service(CSaaS) model in the cloud computing age: Case study sub-Saharan region}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {99--104}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470993/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MbaleMH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MedsgerS12, author = {Jeffrey Medsger and Avinash Srinivasan}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {{ERASE-} entropy-based sanitization of sensitive data for privacy preservation}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {427--432}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470844/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MedsgerS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MeeananTHCN12, author = {Laddawan Meeanan and Apichai Trangansri and Pornpipat Hongthai and Settachai Chaisanit and Ratchadawan Nimnual}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {The edutainment of virtual music instrument for Thai xylophone (Ranad-ek)}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {546--547}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470870/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MeeananTHCN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MghawishAAA12, author = {Afif Mghawish and Akram A. AbdelQader and Mahmoud A. Al{-}Jezawi and Mohammad AbuMahfouz}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Multi function control system using {GSM} modem based {SM5100B} Module}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {515--518}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470862/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MghawishAAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MichalasB12, author = {Antonis Michalas and Menelaos Bakopoulos}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {SecGOD Google Docs: Now i feel safer!}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {589--595}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470880/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MichalasB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Miiller12, author = {Greg Miiller}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Issues in inter-organisational encryption systems: The problem with FedLink}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {341--346}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470973/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Miiller12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MilenkoskiK12, author = {Aleksandar Milenkoski and Samuel Kounev}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Towards benchmarking intrusion detection systems for virtualized cloud environments}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {562--563}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470873/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MilenkoskiK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MillerBT12, author = {Brad Miller and Kaitlyn Buck and J. D. Tygar}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Systematic analysis and evaluation of web privacy policies and implementations}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {534--540}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470867/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MillerBT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MirheidariAKJ12, author = {Seyed Ali Mirheidari and Sajjad Arshad and Saeidreza Khoshkdahan and Rasool Jalili}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Two novel server-side attacks against log file in Shared Web Hosting servers}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {318--323}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470968/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MirheidariAKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MohammadTM12, author = {Rami Mustafa A. Mohammad and Fadi A. Thabtah and Lee McCluskey}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {An assessment of features related to phishing websites using an automated technique}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {492--497}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470857/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MohammadTM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MoritaAKMN12, author = {Yusuke Morita and Hiroyuki Anzai and Hiroaki Kaminaga and Youzou Miyadera and Shoichi Nakamura}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Visual support system for semi-automatic generation of spadework of academic paper from presentation slides}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {812--813}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470824/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MoritaAKMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MselleK12, author = {Leonard James Mselle and Tabu S. Kondo}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Deploying Computer-Based Learning under suboptimal conditions}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {94--98}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470992/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MselleK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Mtsweni12, author = {Jabu Mtsweni}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Exploiting {UML} and acceleo for developing Semantic Web Services}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {753--758}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470919/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Mtsweni12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NakayamaKMN12, author = {Hiroki Nakayama and Hiroaki Kaminaga and Youzou Miyadera and Shoichi Nakamura}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Innovative extracting and integrating the potential and subjectively formed context-information}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {810--811}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470823/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NakayamaKMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NawazGF12, author = {Omer Nawaz and Christian Gehrmann and Markus Fiedler}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Secure mobile social networks using {USIM} in a closed environment}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {439--446}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470846/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NawazGF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Negron12, author = {Martin A. Negron}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A Bayesian Belief Network analysis of the Internet governance conflict}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {621--627}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470892/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Negron12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NimnualC12, author = {Ratchadawan Nimnual and Settachai Chaisanit}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {M-learning for Eco-Packaging using {KM}}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {793--794}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470928/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NimnualC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Odat12, author = {Ahmad Mousa Odat}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {E-Government in developing countries: Framework of challenges and opportunities}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {578--582}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470878/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Odat12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OjamaaD12, author = {Andres Ojamaa and Karl D{\"{u}}{\"{u}}na}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Assessing the security of Node.js platform}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {348--355}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470829/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OjamaaD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OlajideSAT12, author = {Funminiyi Olajide and Nick Savage and Galyna A. Akmayeva and Richard Trafford}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Forensic memory evidence of windows application}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {715--718}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470910/}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/OlajideSAT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OlmstedF12, author = {Aspen Olmsted and Csilla Farkas}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {High volume web service resource consumption}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {275--280}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470959/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OlmstedF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PhangpholCPKK12, author = {Uthairatt Phangphol and Settachai Chaisanit and Tau{-}tong Puangsuwan and Veena Khongpit and Parichat Kunpluem}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Community {OTOP} Web Portal for Eastern Region of Thailand}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {513--514}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470861/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PhangpholCPKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PhuongOLT12, author = {Tran Thao Phuong and Kazumasa Omote and Nguyen Gia Luyen and Nguyen Dinh Thuc}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Improvement of multi-user searchable encrypted data scheme}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {396--401}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470837/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PhuongOLT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PourghomiG12, author = {Pardis Pourghomi and Gheorghita Ghinea}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Challenges of managing secure elements within the {NFC} ecosystem}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {720--725}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470912/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PourghomiG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PourghomiG12a, author = {Pardis Pourghomi and Gheorghita Ghinea}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Managing {NFC} payment applications through cloud computing}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {772--777}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470923/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PourghomiG12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PovedaWI12, author = {Geovanny Poveda and Adam Westerski and Carlos Angel Iglesias}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Application of semantic search in Idea Management Systems}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {230--236}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470949/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PovedaWI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/QayumK12, author = {Abdul Qayum and Prakash Kumar}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {{QR} decomposition-based cryptography: Via image generation {(QR-CRYPT)}}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {179--184}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470939/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/QayumK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RathKMT12, author = {Ashwini Rath and Sanjay Kumar and Sanjay Mohapatra and Rahul Thakurta}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Decision points for adoption cloud computing in small, medium enterprises (SMEs)}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {688--691}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470904/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RathKMT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RixonF12, author = {Daphne Rixon and Mary Furey}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Learning from oversight by telecommunications regulatory agencies}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {368--374}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470832/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RixonF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaeedW12, author = {Muhammad Qasim Saeed and Colin D. Walter}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Off-line {NFC} Tag Authentication}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {730--735}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470914/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SaeedW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShemailiYMZ12, author = {Mouza Ahmad Bani Shemaili and Chan Yeob Yeun and Khalid Mubarak and Mohamed Jamal Zemerly}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A new lightweight hybrid cryptographic algorithm for the internet of things}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {87--92}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470990/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShemailiYMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SlamanigH12, author = {Daniel Slamanig and Christian Hanser}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {On cloud storage and the cloud of clouds approach}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {649--655}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470897/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SlamanigH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SobhyEE12, author = {Dalia Sobhy and Yasser El{-}Sonbaty and Mohamad Abou El{-}Nasr}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {MedCloud: Healthcare cloud computing system}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {161--166}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470935/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SobhyEE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SomaliG12, author = {Zawlikhah Al Somali and Gheorghita Ghinea}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Investigation of factors affecting growth of e-banking services in Saudi Arabia}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {583--588}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470879/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SomaliG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/StirparoK12, author = {Pasquale Stirparo and Ioannis Kounelis}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {The mobileak project: Forensics methodology for mobile application privacy assessment}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {297--303}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470964/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/StirparoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/StulmanLS12, author = {Ariel Stulman and Jonathan Lahav and Avraham Shmueli}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {{MANET} secure key exchange using spraying diffie-hellman algorithm}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {249--252}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470953/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/StulmanLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SurSS12, author = {Chiranjib Sur and Sanjeev Sharma and Anupam Shukla}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Analysis {\&} modeling multi-breeded Mean-Minded ant colony optimization of agent based Road Vehicle Routing Management}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {634--641}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470894/}, timestamp = {Mon, 02 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SurSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SusakulchaiKC12, author = {Surachai Suksakulchai and Wacheerapan Kaewprapan and Settachai Chaisanit}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Making of {DAISY} Talking book on mobile phone: {A} concept and architecture}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {791--792}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470927/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SusakulchaiKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TahirHGMH12, author = {Ruhma Tahir and Huosheng Hu and Dongbing Gu and Klaus D. McDonald{-}Maier and Gareth Howells}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A scheme for the generation of strong cryptographic key pairs based on ICMetrics}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {168--174}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470937/}, timestamp = {Fri, 15 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TahirHGMH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TaqieddinS12, author = {Eyad Taqieddin and Jagannathan Sarangapani}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Vulnerability analysis of two ultra-lightweight {RFID} authentication protocols: {RAPP} and gossamer}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {80--86}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470989/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TaqieddinS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TaralovaLA12, author = {Ina Taralova and Ren{\'{e}} Lozi and Safwan El Assad}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Chaotic generator synthesis: Dynamical and statistical analysis}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {56--59}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470983/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TaralovaLA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TataruAD12, author = {Relu Laurentiu Tataru and Safwan El Assad and Olivier D{\'{e}}forges}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Improved blind {DCT} watermarking by using chaotic sequences}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {46--50}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470981/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TataruAD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TeuflZKL12, author = {Peter Teufl and Thomas Zefferer and Sandra Kreuzhuber and Christian M. Lesjak}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Trusted Location Based Services}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {185--192}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470940/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TeuflZKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TrojahnM12, author = {Matthias Trojahn and Philipp Marcus}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Towards coupling user and device locations using biometrical authentication on smartphones}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {736--741}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470915/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TrojahnM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/UllahXLB12, author = {Abrar Ullah and Hannan Xiao and Mariana Lilley and Trevor Barker}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Usability of profile based student authentication and traffic light system in online examinations}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {220--225}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470947/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/UllahXLB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/UpadhyaySB12, author = {Alok Upadhyay and Jajati Keshari Sahoo and Vibhor Bajpai}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {A novel architecture for secure communications in mobile systems}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {801--805}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470930/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/UpadhyaySB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VidovicK12, author = {Maja Vidovic and Josip Kolic}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Are contemporary trade unions utilizing the opportunities for revival presented by internet technology? {A} comparison of Croatian, {UK} and {USA} practice}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {569--574}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470876/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VidovicK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WalshRF12, author = {Jerry Walsh and Donogh Roche and Franclin S. Foping}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {NitroScript: {A} {PHP} template engine for customizing of e-commerce applications}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {459--464}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470850/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WalshRF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WangLCC12, author = {Zhe Wang and Xiaodong Liu and Kevin Chalmers and Guojian Cheng}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Evolution pattern for Service Evolution in Clouds}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {704--709}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470908/}, timestamp = {Mon, 30 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WangLCC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WileyC12, author = {Jeffrey J. Wiley and Frank P. Coyle}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Semantic hedgehog for log analysis}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {748--752}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470918/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WileyC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/XuSS12, author = {Junfeng Xu and Bo Sun and Chengxiang Si}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {The survey of cache management in the shared storage environment}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {139--142}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470885/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/XuSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YkhlefA12, author = {Mourad Ykhlef and Abeer AlDayel}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Query paraphrasing using genetic approach for intelligent information retrieval}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {699--703}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470907/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YkhlefA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YoshidaW12, author = {Kotaro Yoshida and Yodai Watanabe}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Security of audio secret sharing scheme encrypting audio secrets}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {294--295}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470962/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YoshidaW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YusofS12, author = {Rozita Mohd Yusof and Norrozila Sulaiman}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Multi-probes fusion framework for matching simultaneous latent impressions}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {564--567}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470874/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YusofS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZaniBA12, author = {Tafta Zani and Ari Moesriami Barmawi and Maman Abdurohman}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Securing Elliptic Curve based El-Gamal against Pollard Rho attack using Elliptic Curve based Diffie-Hellman Key Exchange}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {505--512}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470860/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZaniBA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhangCS12, author = {Gaozheng Zhang and Mengdong Chen and Mou Shen}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Authorization model of {SSO} for a distributed environment based on the attributes}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {784--789}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470925/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhangCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZwattendorferT12, author = {Bernd Zwattendorfer and Arne Tauber}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {Secure cross-cloud single sign-on {(SSO)} using eIDs}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {150--155}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470933/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZwattendorferT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2012, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6459616/proceeding}, isbn = {978-1-4673-5325-0}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbbadiN11, author = {Imad M. Abbadi and Cornelius Namiluko}, title = {Dynamics of trust in Clouds - Challenges and research agenda}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {110--115}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148362/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbbadiN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbbadiNM11, author = {Imad M. Abbadi and Cornelius Namiluko and Andrew P. Martin}, title = {Insiders analysis in Cloud computing focusing on home healthcare system}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {350--357}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148464/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbbadiNM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdelhalimEAE11, author = {Mohamed B. Abdelhalim and Mohamed S. El{-}Mahallawy and M. Ayyad and Adel ElHennawy}, title = {Implementation of a modified lightweight cryptographic {TEA} algorithm in {RFID} system}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {509--513}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148491/}, timestamp = {Sun, 27 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdelhalimEAE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdlrudhaN11, author = {Hadi H. Abdlrudha and Qassim Nasir}, title = {Low complexity high security image encryption based on Nested {PWLCM} Chaotic Map}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {220--225}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148381/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdlrudhaN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdouliBY11, author = {Ameera Salem Abdouli and Joonsang Baek and Chan Yeob Yeun}, title = {Survey on computationally hard problems and their applications to cryptography}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {46--52}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148358/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdouliBY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Abyaneh11, author = {Mohammad Reza Sohizadeh Abyaneh}, title = {On the privacy of two tag ownership transfer protocols for RFIDs}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {683--688}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148420/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Abyaneh11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AhmadBACC11, author = {Kassem Ahmad and Bassem Bakhache and Safwan El Assad and Daniel Caragata and Maryline Chetto}, title = {Multicast security protocol over satellite {DVB} based on chaotic sequences}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {97--102}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148377/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AhmadBACC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AkramTK11, author = {Muhammad Usman Akram and Anam Tariq and Shoab Ahmad Khan}, title = {Retinal recognition: Personal identification using blood vessels}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {180--184}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148446/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AkramTK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-DuwairiKA11, author = {Basheer Al{-}Duwairi and I. Khater and Omar M. Al{-}Jarrah}, title = {Texture Analysis-Based Image Spam Filtering}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {288--293}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148459/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-DuwairiKA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-HamadiYZAG11, author = {Hussam M. N. Al Hamadi and Chan Yeob Yeun and Mohamed Jamal Zemerly and Mahmoud Al{-}Qutayri and Amjad Gawanmeh}, title = {Formal modeling and verification of {DLK} protocol}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {578--583}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148402/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-HamadiYZAG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-SomaniH11, author = {Turki F. Al{-}Somani and Hilal Houssain}, title = {Implementation of GF(2\({}^{\mbox{m}}\)) Elliptic Curve cryptoprocessor on a Nano {FPGA}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {7--12}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148351/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-SomaniH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlMarashdaASM11, author = {Khalfan AlMarashda and Yousuf Alsalami and Khaled Salah and Thomas Martin}, title = {On the security of inclusion or omission of MixColumns in {AES} cipher}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {34--39}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148356/}, timestamp = {Wed, 26 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlMarashdaASM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlShamsiAS11, author = {Amna AlDahak AlShamsi and M. AlMarzouqi and Lakmal D. Seneviratne}, title = {Evaluating USARSim for use in fire search and rescue}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {556--561}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148398/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlShamsiAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlahmadZHWAS11, author = {Mahmoud A. Alahmad and Muhammad F. Zulfiqar and Hosen Hasna and Timothy Wisnieski and Nasser A. Aljuhaishi and Hamid Sharif}, title = {Technologies enabling sustainability in the built environment}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {701--706}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148423/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlahmadZHWAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlbalooshiMA11, author = {Noora Albalooshi and Nader Mohamed and Jameela Al{-}Jaroodi}, title = {The challenges of Arabic language use on the Internet}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {378--382}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148469/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlbalooshiMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlipourSN11, author = {Hadiseh Seyyed Alipour and Mehdi Sabbari and Eslam Nazemi}, title = {A policy based access control model for web services}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {472--477}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148484/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlipourSN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmeiriS11, author = {Faisal Al Ameiri and Khaled Salah}, title = {Evaluation of popular application sandboxing}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {358--362}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148465/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmeiriS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmeiriZM11, author = {Faisal Al Ameiri and Mohamed Jamal Zemerly and Mohamed Al Marzouqi}, title = {Mobile Arabic sign language}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {363--367}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148466/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmeiriZM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AminARNSA11, author = {Asjad Amin and Haseeb Ahmed and Abubakar Rafique and Muhammad Junaid Nawaz and Muhammad Salahudin and Zulfiqar Ahmed}, title = {Designing a hierarchical {DHCP} server's model to automatically provide dedicated {IP} address anywhere in the world with mobility}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {250--253}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148452/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AminARNSA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AminQJHA11, author = {Asjad Amin and Haseeb Ahmad Qureshi and Muhammad Junaid Nawaz and Muhammad Yasir Habib and Waqas Anjum}, title = {Modified run length encoding scheme with introduction of bit stuffing for efficient data compression}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {668--672}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148417/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AminQJHA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AnghelescuII11, author = {Petre Anghelescu and Silviu Ionita and Vasile{-}Gabriel Iana}, title = {{FPGA} implementation of cellular automata based encryption algorithm for internet communications}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {208--213}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148379/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AnghelescuII11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArakawaS11, author = {Jumpei Arakawa and Koichi Sasada}, title = {A decentralized access control mechanism using authorization certificate for distributed file systems}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {148--153}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148371/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ArakawaS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AsllaniA11, author = {Arben Asllani and Amjad Ali}, title = {Securing information systems in airports: {A} practical approach}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {314--318}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148385/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AsllaniA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AyedG11, author = {Ghazi Ben Ayed and Solange Ghernaouti{-}Helie}, title = {Privacy requirements specification for digital identity management systems implementation: Towards a digital society of privacy}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {602--607}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148406/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AyedG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BassilEKC11, author = {Ramzi Bassil and Wissam El{-}Beaino and Ayman I. Kayssi and Ali Chehab}, title = {A PUF-based ultra-lightweight mutual-authentication {RFID} protocol}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {495--499}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148488/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BassilEKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BavafaHN11, author = {M. Bavafa and Zahra Taheri Hanjani and N. Navidi}, title = {A survey on space-time {\&} high-rate redundant}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {154--158}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148372/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BavafaHN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BazarganYZ11, author = {Fatma Ahmad Bazargan and Chan Yeob Yeun and Mohamed Jamal Zemerly}, title = {Understanding the security challenges of virtualized environments}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {67--72}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148441/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BazarganYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BelaqzizFAP11, author = {Salwa Belaqziz and Abdelaziz El Fazziki and Mohammed El Adnani and Michel Le Page}, title = {An Agent-Based Modeling approach for decision-making in Gravity Irrigation Systems}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {673--680}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148418/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BelaqzizFAP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BenferhatBO11, author = {Salem Benferhat and Khalid Bouriche and Mohamed Ouzarf}, title = {Encoding default-based SELinux-security policy in Organization-Based Access Control Model}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {608--613}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148407/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BenferhatBO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Bilski11, author = {Tomasz Bilski}, title = {Security-functionality tradeoffs in {IP} transition phase}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {632--638}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148411/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Bilski11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BoschM11, author = {Thomas Bosch and Brigitte Mathiak}, title = {{XSLT} transformation generating {OWL} ontologies automatically based on {XML} Schemas}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {660--667}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148416/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BoschM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BoudguigaL11, author = {Aymen Boudguiga and Maryline Laurent}, title = {An {EAP} ID-based authentication method for wireless networks}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {232--239}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148383/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BoudguigaL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CaragataASA11, author = {Daniel Caragata and Safwan El Assad and Charles A. Shoniregun and Galyna A. Akmayeva}, title = {{UMTS} security: Enhancement of identification, authentication and key agreement protocols}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {278--282}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148457/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CaragataASA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChettoGC11, author = {Maryline Chetto and Hussein El Ghor and Rafic Hage Chehade}, title = {Real-time scheduling for energy harvesting sensors}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {396--402}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148472/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChettoGC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Choudhary11, author = {Abdur Rahim Choudhary}, title = {Policy rule-sets for policy based systems}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {572--577}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148401/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Choudhary11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CotB11, author = {L{\'{e}}a D. Cot and Christian B{\`{e}}s}, title = {Study of the robustness of an enhanced {CSK} system by using the Extended Kalman Filter}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {202--207}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148378/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CotB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DaikporA11, author = {Michael Naseimo Daikpor and Oluwole Adegbenro}, title = {Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithm}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {797--804}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148440/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DaikporA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DeMottEP11, author = {Jared D. DeMott and Richard J. Enbody and William F. Punch III}, title = {Towards an automatic exploit pipeline}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {323--329}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148387/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DeMottEP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EbriBY11, author = {Noura Al Ebri and Joonsang Baek and Chan Yeob Yeun}, title = {Study on Secret Sharing Schemes {(SSS)} and their applications}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {40--45}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148357/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EbriBY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EkbergYL11, author = {Jarkko Ekberg and Jorma Ylinen and Pekka Loula}, title = {Network behaviour anomaly detection using Holt-Winters algorithm}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {627--631}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148410/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EkbergYL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ElmoghanyDKKSS11, author = {Mohamed Elmoghany and Mohamed Diab and Moustafa Kassem and Mustafa Khairallah and Omar El Shahat and Wael Sharkasy}, title = {{FPGA} implementation of high speed {XTS-AES} for data storage devices}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {25--28}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148354/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ElmoghanyDKKSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Eswari11, author = {P. R. Lakshmi Eswari}, title = {A process framework for securing an e-Learning ecosystem}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {403--407}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148473/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Eswari11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FarooqiN11, author = {Norah Farooqi and Siobh{\'{a}}n North}, title = {Trust-based access control for {XML} databases}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {764--765}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148434/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FarooqiN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FattahEIA11, author = {Amr Sayed Abdel Fattah and Salwa H. El{-}Ramly and Magdy M. Ibrahim and Ahmed Abdel{-}Hafez}, title = {Synchronization recovery of chaotic signal through imperfect channel using optimization approach}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {73--78}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148442/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FattahEIA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FattahEIA11a, author = {Amr Sayed Abdel Fattah and Salwa H. El{-}Ramly and Magdy M. Ibrahim and Ahmed Abdel{-}Hafez}, title = {Denoising algorithm for noisy chaotic signal by using wavelet transform: Comprehensive study}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {79--85}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148443/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FattahEIA11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Fournier-PrunaretCG11, author = {Daniele Fournier{-}Prunaret and Pascal Charg{\'{e}} and Laura Gardini}, title = {Chaos generation from 1D or 2D circuits including switches}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {86--90}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148375/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Fournier-PrunaretCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Francis11, author = {Tina Francis}, title = {Proximity aware overlays in peer-to-peer networks}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {341--344}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148462/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Francis11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GahiGGE11, author = {Youssef Gahi and Mouhcine Guennoun and Zouhair Guennoun and Khalil El{-}Khatib}, title = {Encrypted processes for oblivious data retrieval}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {514--518}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148390/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GahiGGE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GarmehiA11, author = {Mehran Garmehi and Morteza Analoui}, title = {An economical mechanism for multicasting of content among servers of Hybrid {CDN-P2P} networks}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {566--571}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148400/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GarmehiA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GawanmehT11, author = {Amjad Gawanmeh and Sofi{\`{e}}ne Tahar}, title = {Modeling and verification of firewall configurations using domain restriction method}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {642--647}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148413/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GawanmehT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GruberFTSG11, author = {Markus Gruber and Florian Fankhauser and Stefan Taber and Christian Schanes and Thomas Grechenig}, title = {Trapping and analyzing malicious VoIP traffic using a honeynet approach}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {442--447}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148479/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GruberFTSG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GuelpeliGB11, author = {Marcus Vinicius Carvalho Guelpeli and Ana Cristina Bicharra Garcia and Ant{\'{o}}nio Horta Branco}, title = {The process of summarization in the pre-processing stage in order to improve measurement of texts when clustering}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {388--395}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148471/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GuelpeliGB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HalboobAA11, author = {Waleed Halboob and Muhammad Abulaish and Khaled Alghathbar}, title = {Quaternary privacy-levels preservation in computer forensics investigation process}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {777--782}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148437/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HalboobAA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HanafyNA11, author = {Ayman A. Hanafy and Sherif Hazem Noureldin and Marianne A. Azer}, title = {Immunizing the {SAODV} protocol against routing information disclosure}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {330--334}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148388/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HanafyNA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HaronN11, author = {Galoh Rashidah Haron and Kang Siong Ng}, title = {Extrapolating security requirements to an established software process: Version 1.0}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {752--757}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148432/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HaronN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HasselbachA11, author = {Jens Hasselbach and Patrick Aichroth}, title = {Access control and content authentication for hybrid {DVB-T2/P2P} broadcasting}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {448--453}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148480/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HasselbachA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hildmann11, author = {Hanno Hildmann}, title = {Behavioural game {AI} - {A} theoretical approach}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {550--555}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148397/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Hildmann11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HildmannNS11, author = {Hanno Hildmann and Sebastien Nicolas and Fabrice Saffre}, title = {Critical infrastructure protection through distributed reactive demand-side management}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {294--301}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148460/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HildmannNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HildmannNS11a, author = {Hanno Hildmann and Sebastien Nicolas and Fabrice Saffre}, title = {Demand-side management for air conditioning}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {519--524}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148391/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HildmannNS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HirschN11, author = {Benjamin Hirsch and Jason W. P. Ng}, title = {Education beyond the cloud: Anytime-anywhere learning in a smart campus environment}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {718--723}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148426/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HirschN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HousaniBY11, author = {Hajer Al Housani and Joonsang Baek and Chan Yeob Yeun}, title = {Survey on certificateless public key cryptography}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {53--58}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148359/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HousaniBY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HoussainBA11, author = {Hilal Houssain and Mohamad Badra and Turki F. Al{-}Somani}, title = {Hardware implementations of Elliptic Curve Cryptography in Wireless Sensor Networks}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {1--6}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148350/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HoussainBA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HuSWRL11, author = {Xin Hu and Yonglin Sun and Yongjun Wang and Zhanrui Ren and Jie Liu}, title = {Two algorithms for Network Security Gradient marking}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {142--147}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148370/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HuSWRL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HughesAH11, author = {G. Hughes and Dhiya Al{-}Jumeily and Abir Jaafar Hussain}, title = {Research, design and development review of the Cloud Computing Management System {(CCMS)}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {128--131}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148365/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HughesAH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IonescuATMS11, author = {Laurentiu Ionescu and Constantin Anton and Ion Tutanescu and Alin Mazare and Gheorghe Serban}, title = {Reed-Muller decoder with associative memories}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {274--277}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148456/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IonescuATMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IrfanYH11, author = {Nazish Irfan and Mustapha C. E. Yagoub and Khelifa Hettak}, title = {Redundant reader elimination for directional antenna in {RFID} systems}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {695--700}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148422/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IrfanYH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JeyalathaV11, author = {S. Jeyalatha and B. Vijayakumar}, title = {Design and implementation of a web structure mining algorithm using breadth first search strategy for academic search application}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {648--654}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148414/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JeyalathaV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JungKGUK11, author = {Markus Jung and Georg Kienesberger and Wolfgang Granzer and Martin Unger and Wolfgang Kastner}, title = {Privacy enabled web service access control using {SAML} and {XACML} for home automation gateways}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {584--591}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148403/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JungKGUK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JuniorTTN11, author = {Fl{\'{a}}vio Dumortout de Mendon{\c{c}}a J{\'{u}}nior and Daniela Gorski Trevisan and Thiago Cortat Tavares and Jos{\'{e}} Luiz Thomaselli Nogueira}, title = {A-CitizenMobile: {A} case study for blind users}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {713--717}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148425/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JuniorTTN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhanK11, author = {Maleika Heenaye{-}Mamode Khan and Naushad Mamode Khan}, title = {Dorsal hand vein biometric using Independent Component Analysis {(ICA)}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {191--195}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148448/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhanK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhonjiIJ11, author = {Mahmoud Khonji and Youssef Iraqi and Andrew Jones}, title = {Mitigation of spear phishing attacks: {A} Content-based Authorship Identification framework}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {416--421}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148475/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhonjiIJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhonjiIJ11a, author = {Mahmoud Khonji and Youssef Iraqi and Andrew Jones}, title = {Lexical {URL} analysis for discriminating phishing and legitimate e-mail messages}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {422--427}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148476/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhonjiIJ11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimC11, author = {Woo Ram Kim and Yoon Seok Chang}, title = {A study on {RFID} code structure for traceability system of electric vehicle batteries}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {490--494}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148487/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimLLP11, author = {Jung{-}Tae Tae Kim and Jong{-}Hoon Hoon Lee and HeeKyung Lee and Eui{-}Hyun H. Paik}, title = {Location-based personalized social media service for the Smart Phone: Distributed social contents sharings}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {655--659}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148415/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimLLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Kuba11, author = {Martin Kuba}, title = {Automated trust negotiation in identity federations using OWL-based abduction of missing credentials}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {164--169}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148374/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Kuba11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LailaSI11, author = {Umm{-}e Laila and Syed Zain Ali Shah and Nadia Ishaque}, title = {Using Keystroke-Level Model to analyze {IOS} optimization techniques}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {373--377}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148468/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LailaSI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LeeKLP11, author = {Jong{-}Hoon Hoon Lee and Jung{-}Tae Tae Kim and HeeKyung Lee and Eui{-}Hyun H. Paik}, title = {Design and implementation of the Geo-Context Engine for semantic social media service}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {383--387}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148470/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LeeKLP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LimC11, author = {Hun{-}lung Lim and Tai{-}Myoung Myoung Chung}, title = {Performace evaluation of relative positioning based on low-cost {GPS} and {VANET}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {542--543}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148395/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LimC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LingL11, author = {Lezhen Ling and Junguo Liao}, title = {Anonymous electronic voting protocol with traceability}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {59--66}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148360/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LingL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LoRW11, author = {Nai{-}Wei Lo and Shiou{-}Huei Ruan and Tzong{-}Chen Wu}, title = {Ownership transfer protocol for {RFID} objects using lightweight computing operators}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {484--489}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148486/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LoRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LozhnikovC11, author = {Pavel Lozhnikov and Oksana Chernikova}, title = {Handwriting dynamics as a means of authentication}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {176--179}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148445/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LozhnikovC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LoziC11, author = {Ren{\'{e}} Lozi and Estelle Cherrier}, title = {Noise-resisting ciphering based on a chaotic multi-stream pseudo-random number generator}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {91--96}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148376/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LoziC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MahmoodD11, author = {Ahmed B. Mahmood and Robert D. Dony}, title = {Segmentation based encryption method for medical images}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {596--601}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148405/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MahmoodD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MalikH11, author = {Sheheryar Malik and Fabrice Huet}, title = {Virtual Cloud: Rent Out the Rented Resources}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {536--541}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148394/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MalikH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MamaghaniM11, author = {Ali Safari Mamaghani and Mohammad Reza Meybodi}, title = {An application of Imperialist Competitive Algorithm to solve the quadratic assignment problem}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {562--565}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148399/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MamaghaniM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Mar11, author = {Kheng Kok Mar}, title = {Secured Virtual Diffused File System for the cloud}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {116--121}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148363/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Mar11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MarkscheffelBF11, author = {Bernd Markscheffel and Daniela B{\"{u}}ttner and Daniel Fischer}, title = {Desktop search engines - {A} state of the art comparison}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {707--712}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148424/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MarkscheffelBF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MarzouqiSAY11, author = {Hamad Marzouqi and Khaled Salah and Mahmoud Al{-}Qutayri and Chan Yeob Yeun}, title = {A unified countermeasure against side channel attacks on cryptographic {RFID}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {13--18}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148352/}, timestamp = {Fri, 17 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/MarzouqiSAY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MazroueiN11, author = {Maitha Salem Al Mazrouei and Sundaravalli Narayanaswami}, title = {Mobile adhoc networks: {A} simulation based security evaluation and intrusion prevention}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {308--313}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148384/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MazroueiN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MehrnejadBHT11, author = {Maryam Mehrnejad and Abbas Ghaemi Bafghi and Ahad Harati and Ehsan Toreini}, title = {Multiple {SEIMCHA:} Multiple semantic image {CAPTCHA}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {196--201}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148449/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MehrnejadBHT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MiC11, author = {Bo Mi and Jianqiu Cao}, title = {A novel key establishment scheme for wireless sensor networks based on complex network synchronization}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {137--141}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148369/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MiC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MouradOYB11, author = {Azzam Mourad and Hadi Otrok and Hamdi Yahyaoui and Lama Baajour}, title = {Toward an abstract language on top of {XACML} for web services security}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {254--259}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148453/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MouradOYB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MukaddamE11, author = {Ayman Mukaddam and Imad H. Elhajj}, title = {Hop count variability}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {240--244}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148450/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MukaddamE11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MutawaABM11, author = {Noora Al Mutawa and Ibtesam Al Awadhi and Ibrahim M. Baggili and Andrew Marrington}, title = {Forensic artifacts of Facebook's instant messaging service}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {771--776}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148436/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MutawaABM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NarhimeneM11, author = {Boustia Narhimene and A{\"{\i}}cha Mokhtari}, title = {Temporal context in multilevel access control model}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {758--763}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148433/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NarhimeneM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NassrS11, author = {Nezar Nassr and Eric Steegmans}, title = {A parameterized {RBAC} access control model for {WS-BPEL} orchestrated composite web services}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {122--127}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148364/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NassrS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NoponenSSK11, author = {Sami Noponen and Jarno Salonen and Hanna{-}Miina Sihvonen and Taina A. Kurki}, title = {Systematic literature review of virtual role}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {738--743}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148430/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NoponenSSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NouraAVC11, author = {Hassan Noura and Safwan El Assad and Calin Vladeanu and Daniel Caragata}, title = {An efficient and secure {SPN} cryptosystem based on chaotic control parameters}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {226--231}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148382/}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/NouraAVC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ObaidliI11, author = {Hanan Al Obaidli and Asif Iqbal}, title = {Digital forensics education in {UAE}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {766--770}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148435/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ObaidliI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Oreku11, author = {George S. Oreku}, title = {Key complication procedure in data driven ciphers based on controlled substitution-permutation networks}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {368--372}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148467/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Oreku11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PoonO11, author = {Kin Fai Poon and Anis Ouali}, title = {A {MILP} based design tool for {FTTH} access networks with consideration of demand growth}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {544--549}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148396/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PoonO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RahimiaslA11, author = {Farshad Rahimiasl and Reza Azmi}, title = {SeKMAC: {A} secure model for key management and access control in cryptographic file system}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {732--737}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148429/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RahimiaslA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RochaSN11, author = {Eduardo Rocha and Paulo Salvador and Ant{\'{o}}nio Manuel Duarte Nogueira}, title = {A real-time traffic classification approach}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {620--626}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148409/}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RochaSN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaabIKCG11, author = {Soulaf Saab and Wassim Itani and Ayman I. Kayssi and Ali Chehab and Cesar Ghali}, title = {Secure delay-tolerant communications in the presence of oppressive governments}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {302--307}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148461/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SaabIKCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaabKC11, author = {Salwa Adriana Saab and Ayman I. Kayssi and Ali Chehab}, title = {A decentralized energy-aware key management scheme for Wireless Sensor Networks}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {504--508}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148490/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SaabKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SabeehL11, author = {Ahmed A. Sabeeh and Arash Habibi Lashkari}, title = {Users' perceptions on mobile devices security awareness in Malaysia}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {428--435}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148477/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SabeehL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Sadok11, author = {Hicham Sadok}, title = {E-Banking in Morocco: Study of some specifying factors}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {726--731}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148428/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Sadok11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaeedW11, author = {Muhammad Qasim Saeed and Colin D. Walter}, title = {A Record Composition/Decomposition attack on the {NDEF} Signature Record Type Definition}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {283--287}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148458/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SaeedW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaetentVC11, author = {Jane Saetent and Nattawut Vejkanchana and Suphamit Chittayasothorn}, title = {A thin client application development using {OCL} and conceptual schema}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {260--265}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148454/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SaetentVC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SafkhaniBN11, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {Vulnerabilities in a new {RFID} access control protocol}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {500--503}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148489/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SafkhaniBN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SafkhaniBNS11, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi and Somitra Kumar Sanadhya}, title = {Security analysis of LMAP\({}^{\mbox{++}}\), an {RFID} authentication protocol}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {689--694}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148421/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SafkhaniBNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaidGMA11, author = {Huwida Said and M{\'{a}}rio A. M. Guimar{\~{a}}es and Noora Al Mutawa and Ibtesam Al Awadhi}, title = {Forensics and war-driving on unsecured wireless network}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {19--24}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148353/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SaidGMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SalahAASB11, author = {Khaled Salah and M. Al{-}Saba and M. Akhdhor and O. Shaaban and M. I. Buhari}, title = {Performance evaluation of popular Cloud IaaS providers}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {345--349}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148463/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SalahAASB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SalehiSD11, author = {Mahmood Salehi and Hamed Samavati and Mehdi Dehghan}, title = {Performance assessment of {OLSR} protocol under routing attacks}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {791--796}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148439/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SalehiSD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ScottB11, author = {Kris Scott and Rachid Benlamri}, title = {Context-aware real-time framework for local collaboration}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {531--535}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148393/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ScottB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShaikhH11, author = {Farhan Bashir Shaikh and Sajjad Haider}, title = {Security threats in cloud computing}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {214--219}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148380/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShaikhH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShakeriB11, author = {Hassan Shakeri and Abbas Ghaemi Bafghi}, title = {Propagation of trust and confidence using intervals}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {436--441}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148478/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShakeriB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Shamseldin11, author = {Ramez Shamseldin}, title = {Dynamically complex system using adaptive simulation for interconnected nodes}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {266--273}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148455/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Shamseldin11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShehhiBY11, author = {Muna Abdulla Al Shehhi and Joonsang Baek and Chan Yeob Yeun}, title = {The use of Boolean functions in stream ciphers}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {29--33}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148355/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShehhiBY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShinKI11, author = {SeongHan Shin and Kazukuni Kobara and Hideki Imai}, title = {A secure public cloud storage system}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {103--109}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148361/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShinKI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShresthaHMPS11, author = {Pradhumna Shrestha and Michael Hempel and Tao Ma and Dongming Peng and Hamid Sharif}, title = {A general attack method for steganography removal using Pseudo-CFA re-interpolation}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {454--459}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148481/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShresthaHMPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SoldatoLMV11, author = {Arianna Del Soldato and Pasquale Lazzareschi and Maurizio Martinelli and Giuseppe Vasarelli}, title = {The use of detection systems to improve the quality of the Italian Public Administration}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {724--725}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148427/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SoldatoLMV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SouthernOS11, author = {Eric Southern and Abdelkader H. Ouda and Abdallah Shami}, title = {Solutions to security issues with legacy integration of {GSM} into {UMTS}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {614--619}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148408/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SouthernOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SunWHRL11, author = {Yonglin Sun and Yongjun Wang and Xin Hu and Zhanrui Ren and Jie Liu}, title = {A new perspective of network vulnerability analysis using Network Security Gradient}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {159--163}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148373/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SunWHRL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SureshM11, author = {Nitha Rachel Suresh and Suresh V. Mathew}, title = {Security concerns for cloud computing in aircraft data networks}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {132--136}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148366/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SureshM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TaheriZ11, author = {Mohammad Moein Taheri and Kamran Zamanifar}, title = {2-phase optimization method for energy aware scheduling of virtual machines in cloud data centers}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {525--530}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148392/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TaheriZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TairZAL11, author = {Hend Al Tair and Mohamed Jamal Zemerly and Mahmoud Al{-}Qutayri and Marcello Leida}, title = {Pro-active multi-agent recommender system for travelers}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {466--471}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148483/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TairZAL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TariqAK11, author = {Anam Tariq and Muhammad Usman Akram and Shoab Ahmad Khan}, title = {An automated system for fingerprint classification using singular points for biometric security}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {170--175}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148444/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TariqAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ToreiniM11, author = {Ehsan Toreini and Maryam Mehrnejad}, title = {A novel method in fuzzy data clustering based on chaotic {PSO}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {335--340}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148389/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ToreiniM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Tripathi11, author = {Devendra Mani Tripathi}, title = {A note on modified {SET} protocol for mobile payment}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {639--641}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148412/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Tripathi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TsenovMT11, author = {Georgi T. Tsenov and Valeri M. Mladenov and Ina Taralova}, title = {Synchronization of Sigma Delta Modulators}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {319--322}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148386/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TsenovMT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Tzouramanis11, author = {Theodoros Tzouramanis}, title = {A robust watermarking scheme for relational databases}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {783--790}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148438/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Tzouramanis11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WangN11, author = {Gang Wang and Kunming Nie}, title = {A framework of VI-based ranking and recommendation of web services}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {478--483}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148485/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WangN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WillemsKRCM11, author = {Christian Willems and Thomas Klingbeil and Lukas Radvilavicius and Antanas Cenys and Christoph Meinel}, title = {A distributed virtual laboratory architecture for cybersecurity training}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {408--415}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148474/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WillemsKRCM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YamamuraOFI11, author = {Chigusa Yamamura and Kazuhiro Otsuki and Arisa Fujii and Kiyohiko Ishikawa}, title = {Identity management architecture for integrated personalized service on {TV}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {681--682}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148419/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YamamuraOFI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Yoshimura11, author = {Hiroyuki Yoshimura}, title = {Fingerprint templates with high recognition accuracy and high security generated by discrete fractional sine transform}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {185--190}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148447/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Yoshimura11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZayedODC11, author = {Mohamed Zayed and Asma Ouari and Meriem Derraschouk and Youcef Chibani}, title = {An effective hybrid thresholding technique for degraded documents images binarization}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {460--465}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148482/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZayedODC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhangLD11, author = {Xian Zhang and Martin Leucker and Wei Dong}, title = {An event pattern language for runtime monitoring based on {AOP}}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {744--751}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148431/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhangLD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Zineddine11, author = {Mhamed Zineddine}, title = {Automated healthcare information privacy and security: {UAE} case}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {592--595}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148404/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Zineddine11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZisiadisKVT11, author = {Dimitris Zisiadis and Spyros Kopsidas and Argyris Varalis and Leandros Tassiulas}, title = {Mailbook: {A} social network against spamming}, booktitle = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, pages = {245--249}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/document/6148451/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZisiadisKVT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2011, title = {6th International Conference for Internet Technology and Secured Transactions, {ICITST} 2011, Abu Dhabi, UAE, December 11-14, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://ieeexplore.ieee.org/xpl/conhome/6141531/proceeding}, isbn = {978-1-908320-00-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbdelhaqAAA10, author = {Abdelhaq Belkadi and Abdelaziz El Fazziki and Ait Ouahman Abdallah and Ibourk Aomar}, title = {Toward an agent based approach for decisional systems modeling}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678115/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbdelhaqAAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AhmadAA10, author = {Iftikhar Ahmad and Azween Vitra Abdullah and Abdullah Sharaf Alghamdi}, title = {Remote to Local attack detection using supervised neural network}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678110/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AhmadAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AkgunGC10, author = {Mete Akg{\"{u}}n and Ali {\"{O}}zhan G{\"{u}}rel and Mehmet Ufuk {\c{C}}aglayan}, title = {Attacks to a lightweight {RFID} mutual authentication protocol}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678039/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AkgunGC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-AssamSJ10, author = {Hisham Al{-}Assam and Harin Sellahewa and Sabah Jassim}, title = {On security of multi-factor biometric authentication}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678012/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-AssamSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-Fedaghi10, author = {Sabah S. Al{-}Fedaghi}, title = {Diagrammatical framework for information system attacks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678533/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-Fedaghi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-WabilAAA10, author = {Areej Al{-}Wabil and Ebtisam Alabdulqader and Latifa Al{-}Abdulkarim and Nora Al{-}Twairesh}, title = {Measuring the user experience of digital books with children: An eyetracking study of interaction with digital libraries}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678025/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-WabilAAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alaraj10, author = {Abdullah Mohammed Alaraj}, title = {Ownership transfer protocol}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678022/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alaraj10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlghafliY10, author = {Khawla Alghafli and Chan Yeob Yeun}, title = {New authentication protocol for {IP} {CAS} of {IPTV}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678535/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlghafliY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AliSK10, author = {Safdar Ali and Waseem Shahzad and Farrukh Aslam Khan}, title = {Remote-to-Local attacks detection using incremental genetic algorithm}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678024/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AliSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Aloul10, author = {Fadi A. Aloul}, title = {Information security awareness in {UAE:} {A} survey paper}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678046/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Aloul10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlrouhAG10, author = {Bachar Alrouh and Adel Almohammad and Gheorghita Ghinea}, title = {{SOAP} message-based steganography}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678538/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlrouhAG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlzomaiAJ10, author = {Mohammed Alzomai and Bander AlFayyadh and Audun J{\o}sang}, title = {Display security for online transactions: SMS-based authentication scheme}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678536/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlzomaiAJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmanK10, author = {Aini Aman and Hasmiah Kasimin}, title = {E-government evaluation: The case of e-procurement in Malaysia government}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678549/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmanK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Ayodele10, author = {Taiwo Ayodele}, title = {Unsupervised email vector space model {(UEVSM)}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678093/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Ayodele10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BenelliP10, author = {Giuliano Benelli and Alessandro Pozzebon}, title = {An automated payment system for car parks based on Near Field Communication technology}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678029/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BenelliP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BicaTG10, author = {Ion Bica and Mihai Togan and Stefan{-}Vladimir Ghita}, title = {Gossip membership protocol for peer-to-peer streaming overlay construction}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678028/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BicaTG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BurghouwtSS10, author = {Pieter Burghouwt and Marcel E. M. Spruit and Henk J. Sips}, title = {Detection of botnet collusion by degree distribution of domains}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678103/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BurghouwtSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CaragataRAA10, author = {Daniel Caragata and Anca{-}Livia Radu and Safwan El Assad and Cristian{-}Gabriel Apostol}, title = {Chaos based fragile watermarking algorithm for {JPEG} images}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678064/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CaragataRAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChovanecKW10, author = {Peter Chovanec and Michal Kr{\'{a}}tk{\'{y}} and Jir{\'{\i}} Walder}, title = {Lossless R-tree compression using variable-length codes}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678116/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChovanecKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CulverhouseGRW10, author = {Mark E. Culverhouse and Bogdan V. Ghita and Paul L. Reynolds and Xingang Wang}, title = {Optimising Quality of Service through the controlled aggregation of traffic}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678553/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CulverhouseGRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DominikusAK10, author = {Sandra Dominikus and Manfred Josef Aigner and Stefan Kraxberger}, title = {Passive {RFID} technology for the internet of things}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678037/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DominikusAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DucKY10, author = {Dang Nguyen Duc and Kwangjo Kim and Chan Yeob Yeun}, title = {Reconsidering Ryu-Takagi {RFID} authentication protocol}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678044/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DucKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EdelmanDS10, author = {Paul T. Edelman and Michael J. Donahoo and David B. Sturgill}, title = {Secure group communications for Delay-Tolerant Networks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678120/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EdelmanDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ElDahshanL10, author = {Kamal A. ElDahshan and Hany M. S. Lala}, title = {Mining uncertain data warehouse}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678108/}, timestamp = {Sun, 29 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ElDahshanL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ElahiKY10, author = {Najeeb Elahi and Randi Karlsen and Waqas Younas}, title = {Semantic image annotation with social context}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678026/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ElahiKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EmeboDA10, author = {Onyeka Emebo and Olawande J. Daramola and Charles Ayo}, title = {A Grid-based e-learning model for Open Universities}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678119/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EmeboDA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EpiphaniouMSN10, author = {Gregory Epiphaniou and Carsten Maple and Paul Sant and Peter Norrington}, title = {The effects of encryption on VoIP streams under the code-excited linear prediction coder {G.729}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678023/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EpiphaniouMSN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EzzatiNCH10, author = {Saeed Ezzati and Hamid Reaza Naji and Amir Chegini and Payam Habibimehr}, title = {A new method of hardware firewall implementation on {SOC}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678545/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/EzzatiNCH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FeldhoferABHPW10, author = {Martin Feldhofer and Manfred Josef Aigner and Thomas Baier and Michael Hutter and Thomas Plos and Erich Wenger}, title = {Semi-passive {RFID} development platform for implementing and attacking security tags}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678040/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FeldhoferABHPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GalanAOA10, author = {Elena Castro Gal{\'{a}}n and Almudena Alcaide and Agust{\'{\i}}n Orfila and Jorge Blasco Al{\'{\i}}s}, title = {A multi-agent scanner to detect stored-XSS vulnerabilities}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678543/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GalanAOA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GarridoMRG10, author = {Pilar Castro Garrido and Guillermo Matas Miraz and Irene Luque Ruiz and Miguel {\'{A}}ngel G{\'{o}}mez{-}Nieto}, title = {Near Field Communication in the development of ubiquitous games}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678018/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GarridoMRG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Habib10, author = {Muhammad Asif Habib}, title = {Mutual exclusion and role inheritance affecting least privilege in {RBAC}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678530/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Habib10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HadiMN10, author = {Fazl{-}e Hadi and Fahad Bin Muhaya and Atif R. Naseer}, title = {Secure multimedia communication in wireless mesh networks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678528/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HadiMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HanMS10, author = {Kyusuk Han and Hyeran Mun and Taeshik Shon}, title = {Design of secure key agreement protocol for pairing in {RF4CE}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678042/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HanMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HatimBB10, author = {Hamid Hatim and Hanane El Bakkali and Ilham Berrada}, title = {Workflow access control: From role engineering to task engineering}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678532/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HatimBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HinaAJ10, author = {Saman Hina and Eric Atwell and Owen A. Johnson}, title = {Secure information extraction from clinical documents using {SNOMED} {CT} gazetteer and natural language processing}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678112/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HinaAJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hooper10, author = {Emmanuel Hooper}, title = {Strategic and intelligent smart grid systems engineering}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678118/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Hooper10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IonescuATMS10, author = {Laurentiu Ionescu and Constantin Anton and Ion Tutanescu and Alin Mazare and Gheorghe Serban}, title = {On a {FPGA} implementation of {BCH} codes}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678091/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IonescuATMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/IskandarS10, author = {Manar Iskandar and Noor Akma Mohd Salleh}, title = {{IT} governance in e-commerce environment: Cases from airline industry}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678016/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/IskandarS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JafariMOFO10, author = {Said Jafari and Fredrick Mtenzi and Ciaran O'Driscoll and Ronan Fitzpatrick and Brendan O'Shea}, title = {Privacy metrics in ubiquitous computing applications}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--2}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678048/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JafariMOFO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JangCKJN10, author = {Dae{-}il Jang and Kang{-}yu Cho and Minsoo Kim and Hyun{-}Chul Jung and Bong{-}Nan Noh}, title = {Evasion technique and detection of malicious botnet}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678101/}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/JangCKJN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JayahkudyT10, author = {Usha Jayahkudy and Chong Eng Tan}, title = {Link signal strength based path selection scheme for ad hoc networks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678551/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JayahkudyT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Johnson10, author = {Robert E. Johnson III}, title = {Survey of {SCADA} security challenges and potential attack vectors}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678102/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Johnson10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhanAASM10, author = {Zeeshan Shafi Khan and Nabila Akram and Khaled Alghathbar and Muhammad Sher and Rashid Mehmood}, title = {Secure single packet {IP} Traceback mechanism to identify the source}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678105/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhanAASM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KimKJ10, author = {Young Sam Kim and Seung{-}Hyun Hyun Kim and Seung{-}Hun Hun Jin}, title = {SRS-based automatic secure device pairing on audio channels}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678019/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KimKJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KrizkaK10, author = {Filip Krizka and Michal Kr{\'{a}}tk{\'{y}}}, title = {On the efficient indexing of ordered multidimensional tuples}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678117/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KrizkaK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KusetogullariYLH10, author = {Huseyin Kusetogullari and Amir Yavariabdi and Mark S. Leeson and Evor L. Hines}, title = {Genetic algorithm based rainbow network flow optimization for multiple description coding in lossy network}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678113/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KusetogullariYLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LavarackC10, author = {Tristan Lavarack and Marijke Coetzee}, title = {A Web Services security policy assistant}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678032/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LavarackC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LeicherSSC10, author = {Andreas Leicher and Andreas U. Schmidt and Yogendra Shah and Inhyok Cha}, title = {Trusted Computing enhanced OpenID}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678097/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LeicherSSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LivaniA10, author = {Mohammad Ahmadi Livani and Mahdi Abadi}, title = {Distributed PCA-based anomaly detection in wireless sensor networks}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678106/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LivaniA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LupianaMOO10, author = {Dennis M. Lupiana and Fredrick Mtenzi and Ciaran O'Driscoll and Brendan O'Shea}, title = {Strictly alphanumeric data: Improving privacy in smart environments}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--3}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678045/}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/LupianaMOO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LutzLMHS10, author = {David J. Lutz and Dominik Lamp and Patrick Mandic and Fabio Victora Hecht and Burkhard Stiller}, title = {Charging of SAML-based federated VoIP services}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--8}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678547/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LutzLMHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ManamonM10, author = {Conor Mc Manamon and Fredrick Mtenzi}, title = {Defending privacy: The development and deployment of a darknet}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678544/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ManamonM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MishraM10, author = {Ravi Bhushan Mishra and Bireshwar Dass Mazumdar}, title = {Cognitive parameters based seller agent selection in {B2C} E-Commerce}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--3}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678015/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MishraM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MohammedCVHB10, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Eihab Bashier}, title = {Fast and accurate detection for polymorphic worms}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678546/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MohammedCVHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MoritzSM10, author = {Franka Moritz and Maria Siebert and Christoph Meinel}, title = {Improving community rating in the tele-lecturing context}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678013/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MoritzSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MunYHC10, author = {Hyeran Mun and Chan Yeob Yeun and Kyusuk Han and Byung{-}Ho Chung}, title = {Enhancement of anonymous authentication scheme in wireless sensor network}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678041/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MunYHC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NadiSJ10, author = {Shiva Nadi and Mohamadhosein Hussein Saraee and Mohamad Davarpanah Jazi}, title = {A fuzzy recommender system for dynamic prediction of user's behavior}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678109/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NadiSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NarhimeneM10, author = {Boustia Narhimene and A{\"{\i}}cha Mokhtari}, title = {A contextual multilevel access control model with default and exception description logic}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678531/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NarhimeneM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ODriscollD10, author = {Ciaran O'Driscoll and Paul Doyle}, title = {The cost of security for a completely private ubiquitous environment}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--2}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678047/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ODriscollD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OmaryMWO10, author = {Zanifa Omary and Fredrick Mtenzi and Bing Wu and Ciaran O'Driscoll}, title = {Accessing sensitive patient information in ubiquitous healthcare systems}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--3}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678051/}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/OmaryMWO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OthmanHM10, author = {Hanunah Othman and Habibah Hashim and Jamalul{-}lail Ab Manan}, title = {A conceptual framework providing Direct Anonymous Attestation {(DAA)} protocol in trusted location-based services {(LBS)}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678526/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OthmanHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OzdenizciACK10, author = {Busra Ozdenizci and Mehmet N. Aydin and Vedat Coskun and Kerem Ok}, title = {Design science in {NFC} research}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678014/}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OzdenizciACK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OzdenizciCAK10, author = {Busra Ozdenizci and Vedat Coskun and Mehmet N. Aydin and Kerem Ok}, title = {{NFC} loyal: {A} beneficial model to promote loyalty on smart cards of mobile devices}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678068/}, timestamp = {Thu, 09 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OzdenizciCAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Pathak10, author = {Vivek Pathak}, title = {Combating web plagiarism and improving internet safety by authenticating web content}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678095/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Pathak10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Peris-LopezMLE10, author = {Pedro Peris{-}Lopez and Enrique San Mill{\'{a}}n and Jan C. A. van der Lubbe and Luis Entrena}, title = {Cryptographically secure pseudo-random bit generator for {RFID} tags}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678035/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Peris-LopezMLE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PonnusamyA10, author = {Vasaki Ponnusamy and Azween Vitra Abdullah}, title = {A bio-inspired framework for wireless sensor network using mobile sensors}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678122/}, timestamp = {Mon, 28 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PonnusamyA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RaghavendraCK10, author = {Prakash S. Raghavendra and Shreya Roy Chowdhury and Srilekha Vedula Kameswari}, title = {Comparative study of neural networks and k-means classification in web usage mining}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678107/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RaghavendraCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ReddySD10, author = {V. Siva RamaKrishna Reddy and Durvasula V. L. N. Somayajulu and Ajay R. Dani}, title = {Sentiment Classification of text reviews using novel feature selection with reduced over-fitting}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--2}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678555/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ReddySD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ReillyWB10, author = {Denis J. Reilly and Chris Wren and Tom Berry}, title = {Cloud computing: Forensic challenges for law enforcement}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--7}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678033/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ReillyWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RezaeiMNA10, author = {Masoud Rezaei and Nafise Sadat Moosavi and Hamed Nemati and Reza Azmi}, title = {TCvisor: {A} hypervisor level secure storage}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--9}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678529/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RezaeiMNA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RonnigerFSG10, author = {Maximilian Ronniger and Florian Fankhauser and Christian Schanes and Thomas Grechenig}, title = {A robust and flexible test environment for VoIP security tests}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678010/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RonnigerFSG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SiebertMHM10, author = {Maria Siebert and Franka Moritz and Frank Hambach and Christoph Meinel}, title = {Enriching E-Learning meta data with user generated playlists}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678550/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SiebertMHM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SingaraveluV10, author = {Pradheepkumar Singaravelu and Shekhar Verma}, title = {Viability of multivariate cryptosystems for {WSN}}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678098/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SingaraveluV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SinghL10, author = {Parminder Singh and G. S. Lehal}, title = {Statistical syllables selection approach for the preparation of Punjabi speech database}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--4}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678557/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SinghL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/StarnbergerFG10, author = {Guenther Starnberger and Lorenz Froihofer and Karl M. G{\"{o}}schka}, title = {Distributed timestamping with smart cards using efficient overlay routing}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678034/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/StarnbergerFG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TolnaiS10, author = {Annette Tolnai and Sebastiaan H. von Solms}, title = {A Virtualized Environment Security {(VES)} model for a secure virtualized environment}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678027/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TolnaiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/VcelckKR10, author = {P. Vcelck and Jana Kleckov{\'{a}} and Vladimir Rohan}, title = {Cerebrovascular diseases research based on heterogeneous medical data mining and knowledge base}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678542/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/VcelckKR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WangPWP10, author = {Jie Wang and Raphael Chung{-}Wei Phan and John N. Whitley and David J. Parish}, title = {Quality of detectability (QoD) and QoD-aware AAT-based attack detection}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678009/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WangPWP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WaqarK10, author = {Mohannmad Waqar and Zeeshan Shafi Khan}, title = {Web 2.0 content extraction}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--3}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678554/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WaqarK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WoodP10, author = {Katie Wood and Ella Pereira}, title = {An investigation into cloud configuration and security}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678036/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WoodP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YoonPKHY10, author = {Yeojeong Yoon and Chanil Park and Pyung Kim and Seongoun Hwang and Hyunsoo Yoon}, title = {An efficient identity-based proxy signcryption for secure broadcast}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678017/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YoonPKHY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhaoLX10, author = {Fuchun Zhao and Hong Ling and Zhengchuan Xu}, title = {Inter-organizational trust and supply chain Flexibility: From a relational view of the firm}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5678100/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhaoLX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2010, title = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5672505/proceeding}, isbn = {978-1-4244-8862-9}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AbbasiMS09, author = {Abdul Ghafoor Abbasi and Sead Muftic and Gernot Schm{\"{o}}lzer}, title = {A model and design of a security provider for Java applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402592}, doi = {10.1109/ICITST.2009.5402592}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbbasiMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-SharafatN09, author = {Wafa S. Al{-}Sharafat and Reyadh Naoum}, title = {Significant of features selection for detecting network intrusions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402584}, doi = {10.1109/ICITST.2009.5402584}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-SharafatN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alghathbar09, author = {Khaled Alghathbar}, title = {Low power design for silent pass authentication system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402634}, doi = {10.1109/ICITST.2009.5402634}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alghathbar09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlghathbarM09, author = {Khaled Alghathbar and Hanan A. Mahmoud}, title = {Noisy password security technique}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402537}, doi = {10.1109/ICITST.2009.5402537}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlghathbarM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AliSS09, author = {Ghulam Ali and Noor Ahmed Shaikh and Zubair Ahmed Shaikh}, title = {Towards development of a trust grid to balance between organization's interests and employee's privacy}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402637}, doi = {10.1109/ICITST.2009.5402637}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AliSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlimANR09, author = {Sophia Alim and Ruqayya Abdulrahman and Daniel Neagu and Mick J. Ridley}, title = {Data retrieval from online social network profiles for social engineering applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402568}, doi = {10.1109/ICITST.2009.5402568}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlimANR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AllisonYC09, author = {David S. Allison and Hany F. El Yamany and Miriam A. M. Capretz}, title = {Privacy and trust policies within {SOA}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402540}, doi = {10.1109/ICITST.2009.5402540}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AllisonYC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlomariSW09, author = {Mohammad Kamel Alomari and Kuldeep Sandhu and Peter Woods}, title = {E-government adoption in the Hashemite Kingdom of Jordan: Factors from social perspectives}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402528}, doi = {10.1109/ICITST.2009.5402528}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlomariSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlwiF09, author = {Najwa Hayaati Mohd Alwi and Ip{-}Shing Fan}, title = {Information security management in e-learning}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402507}, doi = {10.1109/ICITST.2009.5402507}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlwiF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlzaabiBZ09, author = {Mohammed Alzaabi and Jawad Berri and Mohamed Jamal Zemerly}, title = {On the fly generation of mobile learning structured multimedia content from the web}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402636}, doi = {10.1109/ICITST.2009.5402636}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlzaabiBZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmirtahmasebiJK09, author = {Kasra Amirtahmasebi and Seyed Reza Jalalinia and Saghar Khadem}, title = {A survey of {SQL} injection defense mechanisms}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402604}, doi = {10.1109/ICITST.2009.5402604}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmirtahmasebiJK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmranPP09, author = {Ahmad Roshidi Amran and Raphael C.{-}W. Phan and David J. Parish}, title = {Metrics for network forensics conviction evidence}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402640}, doi = {10.1109/ICITST.2009.5402640}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmranPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AnandPH09, author = {Ankit Anand and Xiao{-}Hong Peng and Richard Haywood}, title = {Efficient information retrieval via proxy caching mechanisms within a lossy environment}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402566}, doi = {10.1109/ICITST.2009.5402566}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AnandPH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AnandarajaSKSV09, author = {Nallusamy Anandaraja and Nagappan Sriram and C. Kathiresan and Shibi Sebastian and E. Vadivel}, title = {Web cum mobile based dynamic market information support for Agri-Horti produces: Linking the farmers with market}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402541}, doi = {10.1109/ICITST.2009.5402541}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AnandarajaSKSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AntonITMS09, author = {Constantin Anton and Laurentiu Ionescu and Ion Tutanescu and Alin Mazare and Gheorghe Serban}, title = {Detecting errors in digital communications with {CRC} codes implemented with {FPGA}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402630}, doi = {10.1109/ICITST.2009.5402630}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AntonITMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ApampaWA09, author = {Kikelomo Maria Apampa and Gary B. Wills and David Argles}, title = {Towards security goals in summative e-assessment security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402505}, doi = {10.1109/ICITST.2009.5402505}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ApampaWA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArapinisCRR09, author = {Myrto Arapinis and Tom Chothia and Eike Ritter and Mark Ryan}, title = {Untraceability in the applied pi-calculus}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402514}, doi = {10.1109/ICITST.2009.5402514}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ArapinisCRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AreerachakulS09, author = {Sirilak Areerachakul and Siripun Sanguansintukul}, title = {Water quality classification using neural networks: Case study of canals in Bangkok, Thailand}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402577}, doi = {10.1109/ICITST.2009.5402577}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AreerachakulS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArefiA09, author = {Mahmoodreza Arefi and Amir Masoud Amini}, title = {The elements influencing the online price dispersion on Iranian electronic retailers}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402531}, doi = {10.1109/ICITST.2009.5402531}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ArefiA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AyadiMZ09, author = {Rami Ayadi and Mohsen Maraoui and Mounir Zrigui}, title = {Intertextual distance for Arabic texts classification}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402564}, doi = {10.1109/ICITST.2009.5402564}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AyadiMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AyodeleZK09, author = {Taiwo Ayodele and Shikun Zhou and Rinat Khusainov}, title = {Email classification: Solution with back propagation technique}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402583}, doi = {10.1109/ICITST.2009.5402583}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AyodeleZK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AyodeleZK09a, author = {Taiwo Ayodele and Shikun Zhou and Rinat Khusainov}, title = {Intelligent email prediction system {(IEPS)}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402580}, doi = {10.1109/ICITST.2009.5402580}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AyodeleZK09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AzenaborDSI09, author = {Cyril Ehijie Azenabor and Mohammad Dastbaz and Charles A. Shoniregun and Chris Imafidon}, title = {The society and electronic government usage}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402522}, doi = {10.1109/ICITST.2009.5402522}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AzenaborDSI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AzevedoGSRFS09, author = {Ryan Ribeiro de Azevedo and Eric Rommel Dantas Galv{\~{a}}o and Rubean Caitano dos Santos and Cleyton M{\'{a}}rio de Oliveira Rodrigues and Fred Freitas and Marcelo J. Siqueira}, title = {An autonomic multiagent system ontology-based for management of security of information}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402615}, doi = {10.1109/ICITST.2009.5402615}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AzevedoGSRFS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BarchettiGM09, author = {Ugo Barchetti and Anna Lisa Guido and Luca Mainetti}, title = {A conceptual framework for business driven integration}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402527}, doi = {10.1109/ICITST.2009.5402527}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BarchettiGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BaruahMS09, author = {Siddhartha Baruah and Anjana Kakoty Mahanta and Kanak Chandra Sarma}, title = {A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parameters}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402544}, doi = {10.1109/ICITST.2009.5402544}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BaruahMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BarzegarSK09, author = {Siamak Barzegar and Mohammad Shojafar and Mohammad Reza Keyvanpour}, title = {User interface in virtual learning environment}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402572}, doi = {10.1109/ICITST.2009.5402572}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BarzegarSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BatistaMBFK09, author = {Andr{\'{e}} Filipe de Moraes Batista and Maria das Gra{\c{c}}as Bruno Marietto and Gislene Cristina de O. Barbosa and Robson dos Santos Fran{\c{c}}a and Guiou Kobayashi}, title = {Multi-agent systems to build a computational middleware: {A} chatterbot case study}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402586}, doi = {10.1109/ICITST.2009.5402586}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BatistaMBFK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BeranS09, author = {Peter Paul Beran and Erich Schikuta}, title = {An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402518}, doi = {10.1109/ICITST.2009.5402518}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BeranS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BiggsV09, author = {Stephen Biggs and Stilianos Vidalis}, title = {Cloud Computing: The impact on digital forensic investigations}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402561}, doi = {10.1109/ICITST.2009.5402561}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BiggsV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BoldyrevOBTPL09, author = {Sergey Boldyrev and Ian Oliver and Ronald Brown and Juha{-}Matti Tuupola and Arto Palin and Antti Lappetel{\"{a}}inen}, title = {Network and content aware information management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402569}, doi = {10.1109/ICITST.2009.5402569}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BoldyrevOBTPL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BoumhamdiJ09, author = {Kaouthar Boumhamdi and Zahi Jarir}, title = {Yet another approach for dynamic web service composition}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5435098}, doi = {10.1109/ICITST.2009.5435098}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/BoumhamdiJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BrescianiB09, author = {Riccardo Bresciani and Andrew Butterfield}, title = {A formal security proof for the {ZRTP} Protocol}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402595}, doi = {10.1109/ICITST.2009.5402595}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BrescianiB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CaragataATS09, author = {Daniel Caragata and Safwan El Assad and Ion Tutanescu and Emil Sofron}, title = {Secure {TCP/IP} communications over {DVB-S/DVB-RCS} using chaotic sequences}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402591}, doi = {10.1109/ICITST.2009.5402591}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CaragataATS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChanSA09, author = {Yi{-}Tung F. Chan and Charles A. Shoniregun and Galyna A. Akmayeva}, title = {Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402621}, doi = {10.1109/ICITST.2009.5402621}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChanSA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChanSAA09, author = {Yi{-}Tung F. Chan and Charles A. Shoniregun and Galyna A. Akmayeva and Ali Al{-}Dahoud}, title = {Applying semantic web and user behavior analysis to enforce the intrusion detection system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402616}, doi = {10.1109/ICITST.2009.5402616}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChanSAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChangMM09, author = {Chee Er Chang and Faisal Mohd{-}Yasin and Azhar Kassim Mustapha}, title = {RBStreX: Hardware {XML} parser for embedded system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402548}, doi = {10.1109/ICITST.2009.5402548}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChangMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChehabA09, author = {Maya I. Chehab and Ali E. Abdallah}, title = {Architectures for identity management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402603}, doi = {10.1109/ICITST.2009.5402603}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChehabA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CokusluHE09, author = {Deniz Cokuslu and Abdelkader Hameurlain and Kayhan Erciyes}, title = {Grid resource discovery based on web services}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402543}, doi = {10.1109/ICITST.2009.5402543}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CokusluHE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DammakKRA09, author = {Hajer Ben Mahmoud Dammak and Raouf Ketata and Taieb Ben Romdhane and Samir Ben Ahmed}, title = {Modeling Quality Management System: {A} multi-agent approach}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402578}, doi = {10.1109/ICITST.2009.5402578}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DammakKRA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DucLKK09, author = {Dang Nguyen Duc and Hyunrok Lee and Divyan M. Konidala and Kwangjo Kim}, title = {Open issues in {RFID} security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402510}, doi = {10.1109/ICITST.2009.5402510}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DucLKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Efstathopoulos09, author = {Petros Efstathopoulos}, title = {Practical study of a defense against low-rate TCP-targeted DoS attack}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402593}, doi = {10.1109/ICITST.2009.5402593}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Efstathopoulos09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EgiSO09, author = {Hironori Egi and Hiroshi Shigeno and Ken{-}ichi Okada}, title = {Grasping contextual awareness inside aworkspace at the entrance to support group interaction}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5435099}, doi = {10.1109/ICITST.2009.5435099}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/EgiSO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FanBV09, author = {Junfeng Fan and Lejla Batina and Ingrid Verbauwhede}, title = {Light-weight implementation options for curve-based cryptography: {HECC} is also ready for {RFID}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402516}, doi = {10.1109/ICITST.2009.5402516}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FanBV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FanHGSE09, author = {Xinxin Fan and Honggang Hu and Guang Gong and Eric M. Smith and Daniel W. Engels}, title = {Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402515}, doi = {10.1109/ICITST.2009.5402515}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FanHGSE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FaresW09, author = {Rasha Fares and Mike Woodward}, title = {A new algorithm for controlling the mean queue length in a buffer with time varying arrival rate}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402596}, doi = {10.1109/ICITST.2009.5402596}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FaresW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FazzikiNS09, author = {Aziz El Fazziki and Sana Nouzri and Mohammed Sadgal}, title = {A multi-agent development approach based on the {MDA} for modelling information systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402555}, doi = {10.1109/ICITST.2009.5402555}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FazzikiNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Fernando09, author = {Juanita I. Fernando}, title = {The elephant in the room: Health information system security and the user-level environment}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402503}, doi = {10.1109/ICITST.2009.5402503}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Fernando09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FingerMRH09, author = {Andreas Finger and Holger Meyer and Tim Rieger and Andreas Heuer}, title = {Transactions and service level agreements for online music distribution}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402524}, doi = {10.1109/ICITST.2009.5402524}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FingerMRH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FioreNA09, author = {Sandro Fiore and Alessandro Negro and Giovanni Aloisio}, title = {Data virtualization in grid environments through the GRelC Data Access and Integration Service}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402520}, doi = {10.1109/ICITST.2009.5402520}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FioreNA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FirminoBGV09, author = {Macedo Firmino and Glaucio B. Brandao and Ana M. G. Guerreiro and Ricardo Alexsandro de Medeiros Valentim}, title = {Neural cryptography applied to key management protocol with mutual authentication in {RFID} systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402512}, doi = {10.1109/ICITST.2009.5402512}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FirminoBGV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FischerM09, author = {Daniel Fischer and Bernd Markscheffel}, title = {State of the art in wireless {LAN} security - Results and implications of an empirical study concerning German companies and federal authorities}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402585}, doi = {10.1109/ICITST.2009.5402585}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FischerM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FrancisHMM09, author = {Lishoy Francis and Gerhard P. Hancke and Keith Mayes and Konstantinos Markantonakis}, title = {Potential misuse of {NFC} enabled mobile phones with embedded security elements as contactless attack platforms}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402513}, doi = {10.1109/ICITST.2009.5402513}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FrancisHMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GajdosR09, author = {Petr Gajdos and Michal Radeck{\'{y}}}, title = {Web visualization support for disaster management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402608}, doi = {10.1109/ICITST.2009.5402608}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GajdosR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GallardoB09, author = {Justo Carracedo Gallardo and Emilia P{\'{e}}rez Belleboni}, title = {Use of the new Smart Identity Card to reinforce electronic voting guarantees}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402529}, doi = {10.1109/ICITST.2009.5402529}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GallardoB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GamloB09, author = {Amina Gamlo and Omaima Bamasak}, title = {Towards securing e-transactions in e-government systems of Saudi Arabia}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402546}, doi = {10.1109/ICITST.2009.5402546}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GamloB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GiambrunoSML09, author = {Alessandro Giambruno and Muhammad Awais Shibli and Sead Muftic and Antonio Lioy}, title = {MagicNET: {XACML} authorization policies for mobile agents}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402600}, doi = {10.1109/ICITST.2009.5402600}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GiambrunoSML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GoncalvesF09, author = {Joel Mana Gon{\c{c}}alves and Fabio Neves Fernandes}, title = {The impact of information security on Latin America}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402535}, doi = {10.1109/ICITST.2009.5402535}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GoncalvesF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GrobertSW09, author = {Felix Gr{\"{o}}bert and Ahmad{-}Reza Sadeghi and Marcel Winandy}, title = {Software distribution as a malware infection vector}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402538}, doi = {10.1109/ICITST.2009.5402538}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GrobertSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GronliG09, author = {Tor{-}Morten Gr{\o}nli and George Ghinea}, title = {Web 2.0 integration in a context-aware mobile {PIM} application}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402613}, doi = {10.1109/ICITST.2009.5402613}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GronliG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GuineeB09, author = {Richard A. Guinee and Marta Blaszczyk}, title = {A novel true random binary sequence generator based On a chaotic double scroll oscillator combination with a pseudo random generator for cryptographic applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402536}, doi = {10.1109/ICITST.2009.5402536}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GuineeB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GyongyosiI09, author = {Laszlo Gyongyosi and S{\'{a}}ndor Imre}, title = {Unduplicable quantum data medium based secret decryption and verification}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402590}, doi = {10.1109/ICITST.2009.5402590}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GyongyosiI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HabibP09, author = {Muhammad Asif Habib and Christian Praher}, title = {Object based dynamic separation of duty in {RBAC}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402642}, doi = {10.1109/ICITST.2009.5402642}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HabibP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HammamiS09, author = {Nacereddine Hammami and Mokhtar Sellam}, title = {Tree distribution classifier for automatic spoken Arabic digit recognition}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--4}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402575}, doi = {10.1109/ICITST.2009.5402575}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HammamiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HansenG09, author = {Jarle Hansen and Gheorghita Ghinea}, title = {Multi-platform Bluetooth remote control}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402609}, doi = {10.1109/ICITST.2009.5402609}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HansenG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HaqPA09, author = {Muhammad Ehsan ul Haq and Muhammad Raza Perwaz and Kabeer Ahmed Bhatti}, title = {Compact and user-friendly representation of IPv6 addressing approach and masking}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402594}, doi = {10.1109/ICITST.2009.5402594}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/HaqPA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HarbBG09, author = {Ali Harb and Michel Beigbeder and Jean{-}Jacques Girardot}, title = {Evaluation of question classification systems using differing features}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402567}, doi = {10.1109/ICITST.2009.5402567}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HarbBG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HewettK09, author = {Rattikorn Hewett and Phongphun Kijsanayothin}, title = {On securing privacy in composite web service transactions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402545}, doi = {10.1109/ICITST.2009.5402545}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HewettK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hooper09, author = {Emmanuel Hooper}, title = {Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402581}, doi = {10.1109/ICITST.2009.5402581}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Hooper09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HourdinTLRR09, author = {Vincent Hourdin and Jean{-}Yves Tigli and Stephane Lavirotte and Ga{\"{e}}tan Rey and Michel Riveill}, title = {Context-sensitive authorization for asynchronous communications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402550}, doi = {10.1109/ICITST.2009.5402550}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HourdinTLRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JafariMFO09, author = {Said Jafari and Fredrick Mtenzi and Ronan Fitzpatrick and Brendan O'Shea}, title = {An approach for developing comparative security metrics for healthcare organizations}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402504}, doi = {10.1109/ICITST.2009.5402504}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JafariMFO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JainJRP09, author = {Abhimanyu Jain and Ashish Jain and Aditya Raj and Tushar Pahwa}, title = {Sequenced picture captcha: generation and its strength analysis}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5435097}, doi = {10.1109/ICITST.2009.5435097}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JainJRP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JalalBM09, author = {Samir Kumar Jalal and Subal Chandra Biswas and Parthasarathi Mukhopadhyay}, title = {Webometric analysis of Central Universities in India: {A} study}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402605}, doi = {10.1109/ICITST.2009.5402605}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JalalBM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JomsriSC09, author = {Pijitra Jomsri and Siripun Sanguansintukul and Worasit Choochaiwattana}, title = {A comparison of search engine using "tag title and abstract" with CiteULike - An initial evaluation}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402563}, doi = {10.1109/ICITST.2009.5402563}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JomsriSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Juels09, author = {Ari Juels}, title = {Power games in {RFID} security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402509}, doi = {10.1109/ICITST.2009.5402509}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Juels09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KanyameeS09, author = {Kanokwan Kanyamee and Chanboon Sathitwiriyawong}, title = {A simple high-availability multiple-agent key recovery system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402606}, doi = {10.1109/ICITST.2009.5402606}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KanyameeS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KaramiF09, author = {Mohammad Karami and Mohammad Fathian}, title = {A robust trust establishment framework using Dempster-Shafer theory for MANETs}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402628}, doi = {10.1109/ICITST.2009.5402628}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KaramiF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KarimRH09, author = {Zakaria Karim and Karim Mohammed Rezaul and Aliar Hossain}, title = {Towards secure information systems in online banking}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402619}, doi = {10.1109/ICITST.2009.5402619}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KarimRH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KaufmannS09, author = {Sascha Kaufmann and Christoph Schommer}, title = {e-Conviviality in web systems by the wisdom of crowds}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402530}, doi = {10.1109/ICITST.2009.5402530}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KaufmannS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhanN09, author = {Khaisar Muneebulla Khan and Umesha Naik}, title = {Open source software for personal information managers and personal knowledge management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--12}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402558}, doi = {10.1109/ICITST.2009.5402558}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhanN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KharazmiNA09, author = {Sadegh Kharazmi and Ali Farahmand Nejad and Hassan Abolhassani}, title = {Freshness of Web search engines: Improving performance of Web search engines using data mining techniques}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402607}, doi = {10.1109/ICITST.2009.5402607}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KharazmiNA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KirkhamDCSW09, author = {Thomas Kirkham and Ingo Dahn and David W. Chadwick and Marc Santos and Sandra Winfield}, title = {Aggregating policies in user centric, real-time and distributed applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402553}, doi = {10.1109/ICITST.2009.5402553}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KirkhamDCSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KirkhamKGLJ09, author = {Tom Kirkham and Kleopatra Konstanteli and Julian R. Gallop and Constantinos Lalos and Ian J. Johnson}, title = {Identity management in a mobile service orientated grid}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402547}, doi = {10.1109/ICITST.2009.5402547}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KirkhamKGLJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KoR09, author = {Hoon Ko and Carlos Ramos}, title = {A study on Security Status Matrix {(SSM)} in Urban Computing}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402573}, doi = {10.1109/ICITST.2009.5402573}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KoR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KretschmerG09, author = {Mathias Kretschmer and Gheorghita Ghinea}, title = {Seamless integration of unidirectional broadcast links into QoS-constrained broadband Wireless Mesh Access Networks}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402587}, doi = {10.1109/ICITST.2009.5402587}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KretschmerG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LexSGJ09, author = {Elisabeth Lex and Christin Seifert and Michael Granitzer and Andreas Juffinger}, title = {Cross-domain classification: Trade-off between complexity and accuracy}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402559}, doi = {10.1109/ICITST.2009.5402559}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LexSGJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LimT09, author = {Boon Hoi Lim and Chong Eng Tan}, title = {Simplified link reliability enhancement schemes for wireless networks}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402599}, doi = {10.1109/ICITST.2009.5402599}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LimT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Lin09, author = {Wen{-}Shan Lin}, title = {An integrated framework For modelling the adoptive behaviour of online product recommendations}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402552}, doi = {10.1109/ICITST.2009.5402552}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Lin09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LioudakisGAMVK09, author = {Georgios V. Lioudakis and Fotios Gogoulos and Anna Antonakopoulou and Aziz S. Mousas and Iakovos S. Venieris and Dimitra I. Kaklamani}, title = {An access control approach for privacy-preserving passive network monitoring}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402632}, doi = {10.1109/ICITST.2009.5402632}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LioudakisGAMVK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Liu09, author = {Chenglian Liu}, title = {Improvement of authentication of anycast communication}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--3}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402618}, doi = {10.1109/ICITST.2009.5402618}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Liu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LuP09, author = {Zheng Lu and Taoxin Peng}, title = {The VoIP intrusion detection through a LVQ-based neural network}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402626}, doi = {10.1109/ICITST.2009.5402626}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LuP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Maalouf09, author = {Hoda W. Maalouf}, title = {Managing trade-offs between information loss and latency in real-time distributed systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402614}, doi = {10.1109/ICITST.2009.5402614}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Maalouf09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MarieBB09, author = {Rashiq Rafiq Marie and Jonathan M. Blackledge and Helmut E. Bez}, title = {On the fractal characteristics of Internet network traffic and its utilization in covert communications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402542}, doi = {10.1109/ICITST.2009.5402542}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MarieBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MondalRB09, author = {Arpita Mondal and Kaushik Roy and Prabir Bhattacharya}, title = {Secure biometric system for accessing home appliances via Internet}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402631}, doi = {10.1109/ICITST.2009.5402631}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MondalRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MujtabaP09, author = {Ghulam Mujtaba and David J. Parish}, title = {Detection of applications within encrypted tunnels using packet size distributions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402624}, doi = {10.1109/ICITST.2009.5402624}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MujtabaP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MwakalingaKY09, author = {Jeffy Mwakalinga and Stewart Kowalski and Louise Yngstr{\"{o}}m}, title = {Secure e-learning using a holistic and immune security framework}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402508}, doi = {10.1109/ICITST.2009.5402508}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MwakalingaKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NanCC09, author = {Nan Lu and Chunguang Zhou and Laizhong Cui}, title = {The application of association rules algorithm on web search engine}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402610}, doi = {10.1109/ICITST.2009.5402610}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NanCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Nehinbe09, author = {Joshua Ojo Nehinbe}, title = {Critical analyses of alerts swamping and intrusion redundancy}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402617}, doi = {10.1109/ICITST.2009.5402617}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Nehinbe09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NiweS09, author = {Moses Niwe and Janis Stirna}, title = {Pattern approach to business-to-business transactions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402523}, doi = {10.1109/ICITST.2009.5402523}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NiweS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NormanY09, author = {Azah Anir Norman and Norizan Mohd Yasin}, title = {An analysis of Information Systems Security Management {(ISSM):} The hierarchical organizations vs. emergent organization}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402551}, doi = {10.1109/ICITST.2009.5402551}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NormanY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OSheaBC09, author = {Karen O'Shea and Zuhair Bandar and Keeley A. Crockett}, title = {A semantic-based conversational agent framework}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402582}, doi = {10.1109/ICITST.2009.5402582}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OSheaBC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OliveiraO09, author = {Frederico Guilherme {\'{A}}lvares de Oliveira J{\'{u}}nior and Jos{\'{e}} Maria Parente de Oliveira}, title = {A heuristic-based runtime ranking for service composition}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402539}, doi = {10.1109/ICITST.2009.5402539}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OliveiraO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OmaryM09, author = {Zanifa Omary and Fredrick Mtenzi}, title = {Dataset threshold for the performance estimators in supervised machine learning experiments}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402500}, doi = {10.1109/ICITST.2009.5402500}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OmaryM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OmaryMW09, author = {Zanifa Omary and Fredrick Mtenzi and Bing Wu}, title = {How does politics affect electronic healthcare adoption}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402502}, doi = {10.1109/ICITST.2009.5402502}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/OmaryMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PatelB09, author = {Alkesh Patel and Ajit Balakrishnan}, title = {Generic framework for recommendation system using collective intelligence}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402612}, doi = {10.1109/ICITST.2009.5402612}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PatelB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PatelMP09, author = {Samir B. Patel and Tejas B. Mehta and Shrikant N. Pradhan}, title = {A novel approach using transformation techniques and decision tree algorithm on images for performing Digital Watermarking}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402565}, doi = {10.1109/ICITST.2009.5402565}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PatelMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PereraANS09, author = {Indika Perera and Colin Allison and Ross Nicoll and Thomas Sturgeon}, title = {Towards successful 3D virtual learning - a case study on teaching human computer interaction}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5435085}, doi = {10.1109/ICITST.2009.5435085}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/PereraANS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PickeringG09, author = {J. Adrian Pickering and Christopher Gutteridge}, title = {A networked registration scheme for enhancing trust}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402620}, doi = {10.1109/ICITST.2009.5402620}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PickeringG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PinkasK09, author = {Petr Pinkas and Jana Kleckov{\'{a}}}, title = {The composite algebraic structure over capabilities and actions of a system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402562}, doi = {10.1109/ICITST.2009.5402562}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PinkasK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PontesG09, author = {Elvis Pontes and Adilson Eduardo Guelfi}, title = {{IDS} 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402622}, doi = {10.1109/ICITST.2009.5402622}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PontesG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PrangchumpolST09, author = {Dulyawit Prangchumpol and Siripun Sanguansintukul and Panjai Tantasanawong}, title = {Server virtualization by user behaviour model using a data mining technique - {A} preliminary study}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402611}, doi = {10.1109/ICITST.2009.5402611}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PrangchumpolST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/QadeerMW09, author = {Abdul Qadeer and Waqar Mahmood and Abdul Waheed}, title = {The website census}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402623}, doi = {10.1109/ICITST.2009.5402623}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/QadeerMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RadeckyG09, author = {Michal Radeck{\'{y}} and Petr Gajdos}, title = {Traffic simulation and intelligent agents}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402576}, doi = {10.1109/ICITST.2009.5402576}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RadeckyG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RahimiMR09, author = {Arian Rahimi and Sharhriar Mohammadi and Rozita Rahimi}, title = {An efficient Iris authentication using chaos theory-based cryptography for e-commerce transactions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402532}, doi = {10.1109/ICITST.2009.5402532}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RahimiMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RahmanRH09, author = {Mohammad Rahman and Karim Mohammed Rezaul and Aliar Hossain}, title = {Finding an effective and secured information system in e-commerce environment}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402521}, doi = {10.1109/ICITST.2009.5402521}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RahmanRH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RaufAA09, author = {Bilal Rauf and M. Faisal Amjad and Kabeer Ahmed Bhatti}, title = {Performance evaluation of {IEEE} 802.11 {DCF} in comparison with {IEEE} 802.11e {EDCA}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402597}, doi = {10.1109/ICITST.2009.5402597}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/RaufAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RekikKBF09, author = {Wiem Rekik and Maher Khemakhem and Abdelfettah Belghith and Jacques Fayolle}, title = {{PKI} and {UDDI} based trust centre: An attempt to improve web service security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--4}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402549}, doi = {10.1109/ICITST.2009.5402549}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/RekikKBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RixonF09, author = {Daphne Rixon and Mary Furey}, title = {Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402589}, doi = {10.1109/ICITST.2009.5402589}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RixonF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RomliC09, author = {Awanis M. Romli and Arnidcha P. Cha}, title = {An expert system for stress management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402579}, doi = {10.1109/ICITST.2009.5402579}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RomliC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaadSZ09, author = {Saidah Saad and Naomie Salim and Hakim Zainal}, title = {Islamic knowledge ontology creation}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402635}, doi = {10.1109/ICITST.2009.5402635}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/SaadSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SarantisA09, author = {Demetrios Sarantis and Dimitris Askounis}, title = {A project management ontology as a reference for e-Government projects}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402526}, doi = {10.1109/ICITST.2009.5402526}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SarantisA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShaikhD09, author = {A. R. Rizwana Shaikh and Satish Devane}, title = {Verification of security properties of payment protocol using {AVISPA}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402598}, doi = {10.1109/ICITST.2009.5402598}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShaikhD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShemailiYZ09, author = {Mouza Ahmad Bani Shemaili and Chan Yeob Yeun and Mohamed Jamal Zemerly}, title = {{RFID} lightweight mutual authentication using shrinking generator}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402511}, doi = {10.1109/ICITST.2009.5402511}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShemailiYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShiZY09, author = {Peipei Shi and Bo Zhu and Amr M. Youssef}, title = {A rotary {PIN} entry scheme resilient to shoulder-surfing}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402625}, doi = {10.1109/ICITST.2009.5402625}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShiZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShriramVVS09, author = {Shriram K. Vasudevan and K. Venkateshwaran and V. Vaithiyanathan and Subashri Vasudevan}, title = {Design of analog to digital converter for {SDR} (Software Defined Radio)}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402602}, doi = {10.1109/ICITST.2009.5402602}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShriramVVS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SidorovaB09, author = {Julia Sidorova and Toni Badia}, title = {Syntactic learning for ESEDA.1, a tool for enhanced speech emotion detection and analysis}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402574}, doi = {10.1109/ICITST.2009.5402574}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SidorovaB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/StephanWB09, author = {Jean Stephan and Nagi Wakim and Youakim Badr}, title = {E-profile-based security for critical transactions in web applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402525}, doi = {10.1109/ICITST.2009.5402525}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/StephanWB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/StillerRA09, author = {Carsten Stiller and Fred Ro{\ss} and Christoph Ament}, title = {Towards spatial awareness in recommender systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402633}, doi = {10.1109/ICITST.2009.5402633}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/StillerRA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SukumaranS09, author = {Sanath Sukumaran and M. V. Shetty}, title = {Knowledge Management {(KM)} in automobile: Application of a value chain {(VC)} approach using {KM} tools}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402554}, doi = {10.1109/ICITST.2009.5402554}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SukumaranS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Tabatabaei09, author = {Shayesteh Tabatabaei}, title = {Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402627}, doi = {10.1109/ICITST.2009.5402627}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Tabatabaei09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TahajodID09, author = {Maryam Tahajod and Azadeh Iranmehr and Mohammad Reza Darajeh}, title = {A roadmap to develop enterprise security architecture}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402639}, doi = {10.1109/ICITST.2009.5402639}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TahajodID09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TinaboMO09, author = {Rose Tinabo and Fredrick Mtenzi and Brendan O'Shea}, title = {Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402501}, doi = {10.1109/ICITST.2009.5402501}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TinaboMO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TolnaiS09, author = {Annette Tolnai and Sebastiaan H. von Solms}, title = {Solving security issues using Information Security Awareness Portal}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402560}, doi = {10.1109/ICITST.2009.5402560}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TolnaiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Vasilescu09, author = {Rares Vasilescu}, title = {Architectural model for a high performance content management system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402570}, doi = {10.1109/ICITST.2009.5402570}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Vasilescu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ViscontiT09, author = {Andrea Visconti and Hooman Tahayori}, title = {Detecting misbehaving nodes in {MANET} with an artificial immune system based on type-2 fuzzy sets}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402588}, doi = {10.1109/ICITST.2009.5402588}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ViscontiT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WangY09, author = {Tzong{-}I Wang and Ting Yuan Yeh}, title = {A fault-tolerant mechanism for reducing pollution attacks in peer-to-peer networks}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402601}, doi = {10.1109/ICITST.2009.5402601}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WangY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WilkinsN09, author = {Rebecca Wilkins and Abel Nyamapfene}, title = {Usability driven website design - An equine sports case study}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402571}, doi = {10.1109/ICITST.2009.5402571}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WilkinsN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WillemsDKM09, author = {Christian Willems and Wesam Dawoud and Thomas Klingbeil and Christoph Meinel}, title = {Security in Tele-Lab - Protecting an online virtual lab for security training}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402506}, doi = {10.1109/ICITST.2009.5402506}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WillemsDKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WohrerLB09, author = {Alexander W{\"{o}}hrer and Thomas Lustig and Peter Brezany}, title = {Scalable relational query results handling in service oriented architectures}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402517}, doi = {10.1109/ICITST.2009.5402517}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WohrerLB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WongthongthamKK09, author = {Pornpit Wongthongtham and Natsuda Kasisopha and Surasak Komchaliaw}, title = {Community-oriented software engineering ontology evolution}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--4}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402557}, doi = {10.1109/ICITST.2009.5402557}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WongthongthamKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WongthongthamZ09, author = {Pornpit Wongthongtham and Behrang Zadjabbari}, title = {Signifying ontology complexity for knowledge sharing}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402638}, doi = {10.1109/ICITST.2009.5402638}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WongthongthamZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WuL09, author = {Tsang{-}Hung Wu and Shyh{-}Chang Liu}, title = {A research on the establishment of enterprise information architecture}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402556}, doi = {10.1109/ICITST.2009.5402556}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WuL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YiXD09, author = {Gao Yi and Lin Xinda and Wang Dong}, title = {A computer based strategy design for automobile spare part logistics network optimization}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402534}, doi = {10.1109/ICITST.2009.5402534}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YiXD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZamaniMAJTZ09, author = {Mazdak Zamani and Azizah Bt Abdul Manaf and Rabiah Bt Ahmad and Farhang Jaryani and Hamed Taherdoost and Akram M. Zeki}, title = {A secure audio steganography approach}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402644}, doi = {10.1109/ICITST.2009.5402644}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZamaniMAJTZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhengO09, author = {Xianghan Zheng and Vladimir A. Oleshchuk}, title = {Trust-based framework for security enhancement of {P2PSIP} communication systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402533}, doi = {10.1109/ICITST.2009.5402533}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhengO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhouKP09, author = {Wei Zhou and Gaurav Kapoor and Selwyn Piramuthu}, title = {Modified Slotted {ALOHA} protocol for {RFID} tag collisions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402629}, doi = {10.1109/ICITST.2009.5402629}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhouKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZolfagharBM09, author = {Kiyana Zolfaghar and Arash Barfar and Shahriar Mohammadi}, title = {A framework for online counter terrorism}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402641}, doi = {10.1109/ICITST.2009.5402641}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZolfagharBM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2009, title = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST15451.2009}, doi = {10.1109/ICITST15451.2009}, isbn = {978-1-4244-5648-2}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.