Search dblp for Publications

export results for "toc:db/conf/ccc2/ccc2019.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccc2/Agbinya19,
  author       = {Johnson I. Agbinya},
  title        = {Human Palm Geometry Modelling for Biometric Security Systems},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {160--164},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00011},
  doi          = {10.1109/CCC.2019.00011},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/Agbinya19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/AhmedB19,
  author       = {Mohiuddin Ahmed and
                  Abu S. S. M. Barkat Ullah},
  title        = {Performance Analysis of Hard Clustering Techniques for Big IoT Data
                  Analytics},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {62--66},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.000-8},
  doi          = {10.1109/CCC.2019.000-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/AhmedB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/AlagrashAAD19,
  author       = {Yasamin Alagrash and
                  Faisal Alghayadh and
                  Ahmad Alshammari and
                  Debatosh Debnath},
  title        = {Cloud Computing: {A} Framework for Balancing Accountability and Privacy
                  Based on Multi-Agent System},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {6--12},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00-16},
  doi          = {10.1109/CCC.2019.00-16},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/AlagrashAAD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/AldawoodS19,
  author       = {Hussain Aldawood and
                  Geoffrey Skinner},
  title        = {Challenges of Implementing Training and Awareness Programs Targeting
                  Cyber Security Social Engineering},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {111--117},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00004},
  doi          = {10.1109/CCC.2019.00004},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/AldawoodS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/ArisarNSJ19,
  author       = {Muzammil M. K. Arisar and
                  Lianju Ning and
                  Zhongyuan Sun and
                  Imran Ali Jokhio},
  title        = {A Comprehensive Investigation of Telecom Business Models and Strategies},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {129--135},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00007},
  doi          = {10.1109/CCC.2019.00007},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/ArisarNSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/Aziz19,
  author       = {Ahsan Aziz},
  title        = {Coercion-Resistant E-Voting Scheme with Blind Signatures},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {143--151},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00009},
  doi          = {10.1109/CCC.2019.00009},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/Aziz19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/BakkarA19,
  author       = {Mahmoud Bakkar and
                  Ammar Alazab},
  title        = {Designing Security Intelligent Agent for Petrol Theft Prevention},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {123--128},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00006},
  doi          = {10.1109/CCC.2019.00006},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/BakkarA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/BakkarA19a,
  author       = {Mahmoud Bakkar and
                  Ammar Alazab},
  title        = {Information Security: Definitions, Threats and Management in Dubai
                  Hospitals Context},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {152--159},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00010},
  doi          = {10.1109/CCC.2019.00010},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/BakkarA19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/BaralA19,
  author       = {Gitanjali Baral and
                  Nalin Asanka Gamagedara Arachchilage},
  title        = {Building Confidence not to be Phished Through a Gamified Approach:
                  Conceptualising User's Self-Efficacy in Phishing Threat Avoidance
                  Behaviour},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {102--110},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.000-1},
  doi          = {10.1109/CCC.2019.000-1},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/BaralA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/HasanRA019,
  author       = {Walid K. A. Hasan and
                  Yachao Ran and
                  Johnson I. Agbinya and
                  Guiyun Tian},
  title        = {A Survey of Energy Efficient IoT Network in Cloud Environment},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {13--21},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00-15},
  doi          = {10.1109/CCC.2019.00-15},
  timestamp    = {Tue, 11 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/HasanRA019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/HylaP19,
  author       = {Tomasz Hyla and
                  Jerzy Pejas},
  title        = {eHealth Integrity Model Based on a Permissioned Blockchain},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {172--177},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00013},
  doi          = {10.1109/CCC.2019.00013},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/HylaP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/IslamAA19,
  author       = {Nahina Islam and
                  Ammar Alazab and
                  Mamoun Alazab},
  title        = {A Reinforcement Learning Based Algorithm Towards Energy Efficient
                  5G Multi-Tier Network},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {96--101},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.000-2},
  doi          = {10.1109/CCC.2019.000-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/IslamAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/KbarA19,
  author       = {Ghassan Kbar and
                  Ammar Alazab},
  title        = {A Comprehensive Protection Method for Securing the Organization's
                  Network Against Cyberattacks},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {118--122},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00005},
  doi          = {10.1109/CCC.2019.00005},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/KbarA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/Khan0AZ19,
  author       = {Riaz Ullah Khan and
                  Rajesh Kumar and
                  Mamoun Alazab and
                  Xiaosong Zhang},
  title        = {A Hybrid Technique To Detect Botnets, Based on {P2P} Traffic Similarity},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {136--142},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00008},
  doi          = {10.1109/CCC.2019.00008},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/Khan0AZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/KhanZA019,
  author       = {Riaz Ullah Khan and
                  Xiaosong Zhang and
                  Mamoun Alazab and
                  Rajesh Kumar},
  title        = {An Improved Convolutional Neural Network Model for Intrusion Detection
                  in Networks},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {74--77},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.000-6},
  doi          = {10.1109/CCC.2019.000-6},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/KhanZA019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/LiK19,
  author       = {Shumin Li and
                  Rajan Kadel},
  title        = {Design of a Hybrid {RFID-WLAN} Based Smart Parking and Vehicle Finding
                  System},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {56--61},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.000-9},
  doi          = {10.1109/CCC.2019.000-9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/LiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/ManzoorJKJ19,
  author       = {Kulsoom Manzoor and
                  Sana Hoor Jokhio and
                  Tariq Jamil Saifullah Khanzada and
                  Imran Ali Jokhio},
  title        = {Enhanced {TL-LEACH} routing protocol for large-scale {WSN} applications},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {35--39},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00-12},
  doi          = {10.1109/CCC.2019.00-12},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/ManzoorJKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/MurataITH19,
  author       = {Kazuki Murata and
                  Atsushi Ito and
                  Yukitsugu Takahashi and
                  Hiroyuki Hatano},
  title        = {A Study on Growth Stage Classification of Paddy Rice by {CNN} using
                  {NDVI} Images},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {85--90},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.000-4},
  doi          = {10.1109/CCC.2019.000-4},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/MurataITH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/NozakiY19,
  author       = {Yusuke Nozaki and
                  Masaya Yoshikawa},
  title        = {Countermeasure of Lightweight Physical Unclonable Function Against
                  Side-Channel Attack},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {30--34},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00-13},
  doi          = {10.1109/CCC.2019.00-13},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/NozakiY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/PantaASYJBA19,
  author       = {Yuba Raj Panta and
                  Sami Azam and
                  Bharanidharan Shanmugam and
                  Kheng Cher Yeo and
                  Mirjam Jonkman and
                  Friso De Boer and
                  Mamoun Alazab},
  title        = {Improving Accessibility for Mobility Impaired People in Smart City
                  using Crowdsourcing},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {47--55},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00-10},
  doi          = {10.1109/CCC.2019.00-10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/PantaASYJBA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/PatelSF19,
  author       = {Hitendra Patel and
                  Sajan Sheth and
                  S. M. Farhad},
  title        = {Cloud Based Temperature and Humidity Alert System to Prevent Food
                  Poisoning},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00-17},
  doi          = {10.1109/CCC.2019.00-17},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/PatelSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/RAJKP19,
  author       = {Vinayakumar R. and
                  Mamoun Alazab and
                  Alireza Jolfaei and
                  Soman K. P. and
                  Prabaharan Poornachandran},
  title        = {Ransomware Triage Using Deep Learning: Twitter as a Case Study},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {67--73},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.000-7},
  doi          = {10.1109/CCC.2019.000-7},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/RAJKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/SaikrishnaR19,
  author       = {Vidya Saikrishna and
                  Sid Ray},
  title        = {{MML} Inference of Hierarchical Probabilistic Finite State Machine},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {78--84},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.000-5},
  doi          = {10.1109/CCC.2019.000-5},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/SaikrishnaR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/ShehzadAKMAS19,
  author       = {Kamran Shehzad and
                  Muhammad Afrasayab and
                  Murad Khan and
                  Muhammad Azhar Mushtaq and
                  Rana Laique Ahmed and
                  M. Mohsin Saleemi},
  title        = {Use of Blockchain in Internet of things: {A} Systematic Literature
                  Review},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {165--171},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00012},
  doi          = {10.1109/CCC.2019.00012},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/ShehzadAKMAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/ShokeenSKAJA19,
  author       = {Rahul Shokeen and
                  Bharanidharan Shanmugam and
                  Krishnan Kannoorpatti and
                  Sami Azam and
                  Mirjam Jonkman and
                  Mamoun Alazab},
  title        = {Vulnerabilities Analysis and Security Assessment Framework for the
                  Internet of Things},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {22--29},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00-14},
  doi          = {10.1109/CCC.2019.00-14},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccc2/ShokeenSKAJA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/ZarinU19,
  author       = {Adiba Zarin and
                  Jia Uddin},
  title        = {A Hybrid Fake Banknote Detection Model using OCR, Face Recognition
                  and Hough Features},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {91--95},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.000-3},
  doi          = {10.1109/CCC.2019.000-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/ZarinU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccc2/ZhaoSML19,
  author       = {Ning Zhao and
                  Junjie Shen and
                  Xiaolin Ma and
                  Yuhe Liu},
  title        = {Analysis on Nonlinear Characters of Built-in Sensor in Smart Device
                  under the Condition of Voice Actuating},
  booktitle    = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  pages        = {40--46},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCC.2019.00-11},
  doi          = {10.1109/CCC.2019.00-11},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/ZhaoSML19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccc2/2019,
  title        = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne,
                  Australia, May 8-9, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8848308/proceeding},
  isbn         = {978-1-7281-2600-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccc2/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics