default search action
Search dblp for Publications
export results for "toc:db/conf/est/est2015.bht:"
@inproceedings{DBLP:conf/est/AlheetiGM15, author = {Khattab M. Ali Alheeti and Anna Gruebler and Klaus D. McDonald{-}Maier}, title = {An Intrusion Detection System against Black Hole Attacks on the Communication Network of Self-Driving Cars}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {86--91}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.10}, doi = {10.1109/EST.2015.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/AlheetiGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/BasilA15, author = {Mustafa Ayoob Basil and Wael Adi}, title = {Improving System Reliability by Joint Usage of Hash Function Bits and Error Correction Coding}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.15}, doi = {10.1109/EST.2015.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/BasilA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/BasilA15a, author = {Mustafa Ayoob Basil and Wael Adi}, title = {Fault Detection and Correction in Processing {AES} Encryption Algorithm}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {7--12}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.13}, doi = {10.1109/EST.2015.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/BasilA15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/FrowdUALEMM15, author = {Charlie D. Frowd and Sade Underwood and Palwinder Athwal and James M. Lampinen and William B. Erickson and Gregory Mahony and John E. Marsh}, title = {Facial Stereotypes and Perceived Mental Illness}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {62--68}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.25}, doi = {10.1109/EST.2015.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/FrowdUALEMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/GillhamHK15, author = {Michael Gillham and Gareth Howells and Stephen Kelly}, title = {Assistive Trajectories for Human-in-the-Loop Mobile Robotic Platforms}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {56--61}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.19}, doi = {10.1109/EST.2015.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/GillhamHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/IwashitaK15, author = {Yumi Iwashita and Ryo Kurazume}, title = {Stable Image Registration for People Tracking from the Sky}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {69--73}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.14}, doi = {10.1109/EST.2015.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/IwashitaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/SaidiBAB15, author = {Marwa Saidi and Oussama Benrhouma and Wael Adi and Safya Belghith}, title = {Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {24--29}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.20}, doi = {10.1109/EST.2015.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/SaidiBAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/SamoilY15, author = {Steven Samoil and Svetlana N. Yanushkevich}, title = {Depth Assisted Palm Region Extraction Using the Kinect v2 Sensor}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {74--79}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.11}, doi = {10.1109/EST.2015.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/SamoilY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/ShortallA15, author = {Adam Shortall and M. A. Hannan Bin Azhar}, title = {Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {13--17}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.16}, doi = {10.1109/EST.2015.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/ShortallA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/StoicaDIC15, author = {Adrian Stoica and Enrico Dente and Yumi Iwashita and Alessandro Chiolerio}, title = {UAVs You Can't See or Hear - {A} Survey of Key Technologies}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {50--55}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.21}, doi = {10.1109/EST.2015.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/StoicaDIC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/TahirTM15, author = {Hasan Tahir and Ruhma Tahir and Klaus D. McDonald{-}Maier}, title = {Securing {MEMS} Based Sensor Nodes in the Internet of Things}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {44--49}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.8}, doi = {10.1109/EST.2015.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/TahirTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/XavierPGGSRGT15, author = {Igor R. R. Xavier and M. Pereira and Gilson A. Giraldi and Stuart James Gibson and Christopher J. Solomon and Daniel Rueckert and Duncan Gillies and Carlos E. Thomaz}, title = {A Photo-Realistic Generator of Most Expressive and Discriminant Changes in 2D Face Images}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {80--85}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.17}, doi = {10.1109/EST.2015.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/XavierPGGSRGT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/YanushkevichESS15, author = {Svetlana N. Yanushkevich and Shawn Eastwood and Steven Samoil and Vlad P. Shmerko and Travis Manderson and Martin Drahansk{\'{y}}}, title = {Taxonomy and Modeling of Impersonation in e-Border Authentication}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {38--43}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.18}, doi = {10.1109/EST.2015.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/YanushkevichESS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/YeH15, author = {Bin Ye and Gareth Howells}, title = {Integrating Multi-modal Cloud Features within a Multi-dimensional Encryption Space}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {18--23}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.12}, doi = {10.1109/EST.2015.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/YeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/est/ZhaiV15, author = {Xiaojun Zhai and Tanya Vladimirova}, title = {Data Aggregation in Wireless Sensor Networks for Lunar Exploration}, booktitle = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, pages = {30--37}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EST.2015.9}, doi = {10.1109/EST.2015.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/est/ZhaiV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/est/2015, title = {Sixth International Conference on Emerging Security Technologies, {EST} 2015, Braunschweig, Germany, September 3-5, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7425427/proceeding}, isbn = {978-1-4673-9799-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/est/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.