Search dblp for Publications

export results for "toc:db/conf/est/est2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/est/AlheetiGM15,
  author       = {Khattab M. Ali Alheeti and
                  Anna Gruebler and
                  Klaus D. McDonald{-}Maier},
  title        = {An Intrusion Detection System against Black Hole Attacks on the Communication
                  Network of Self-Driving Cars},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {86--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.10},
  doi          = {10.1109/EST.2015.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/AlheetiGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/BasilA15,
  author       = {Mustafa Ayoob Basil and
                  Wael Adi},
  title        = {Improving System Reliability by Joint Usage of Hash Function Bits
                  and Error Correction Coding},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.15},
  doi          = {10.1109/EST.2015.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/BasilA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/BasilA15a,
  author       = {Mustafa Ayoob Basil and
                  Wael Adi},
  title        = {Fault Detection and Correction in Processing {AES} Encryption Algorithm},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {7--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.13},
  doi          = {10.1109/EST.2015.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/BasilA15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/FrowdUALEMM15,
  author       = {Charlie D. Frowd and
                  Sade Underwood and
                  Palwinder Athwal and
                  James M. Lampinen and
                  William B. Erickson and
                  Gregory Mahony and
                  John E. Marsh},
  title        = {Facial Stereotypes and Perceived Mental Illness},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {62--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.25},
  doi          = {10.1109/EST.2015.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/FrowdUALEMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/GillhamHK15,
  author       = {Michael Gillham and
                  Gareth Howells and
                  Stephen Kelly},
  title        = {Assistive Trajectories for Human-in-the-Loop Mobile Robotic Platforms},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {56--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.19},
  doi          = {10.1109/EST.2015.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/GillhamHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/IwashitaK15,
  author       = {Yumi Iwashita and
                  Ryo Kurazume},
  title        = {Stable Image Registration for People Tracking from the Sky},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {69--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.14},
  doi          = {10.1109/EST.2015.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/IwashitaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/SaidiBAB15,
  author       = {Marwa Saidi and
                  Oussama Benrhouma and
                  Wael Adi and
                  Safya Belghith},
  title        = {Combined Image Data Hiding Techniques in a Clone-Resistant SoC Environment},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {24--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.20},
  doi          = {10.1109/EST.2015.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/SaidiBAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/SamoilY15,
  author       = {Steven Samoil and
                  Svetlana N. Yanushkevich},
  title        = {Depth Assisted Palm Region Extraction Using the Kinect v2 Sensor},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {74--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.11},
  doi          = {10.1109/EST.2015.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/SamoilY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/ShortallA15,
  author       = {Adam Shortall and
                  M. A. Hannan Bin Azhar},
  title        = {Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {13--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.16},
  doi          = {10.1109/EST.2015.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/ShortallA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/StoicaDIC15,
  author       = {Adrian Stoica and
                  Enrico Dente and
                  Yumi Iwashita and
                  Alessandro Chiolerio},
  title        = {UAVs You Can't See or Hear - {A} Survey of Key Technologies},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {50--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.21},
  doi          = {10.1109/EST.2015.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/StoicaDIC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/TahirTM15,
  author       = {Hasan Tahir and
                  Ruhma Tahir and
                  Klaus D. McDonald{-}Maier},
  title        = {Securing {MEMS} Based Sensor Nodes in the Internet of Things},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {44--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.8},
  doi          = {10.1109/EST.2015.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/TahirTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/XavierPGGSRGT15,
  author       = {Igor R. R. Xavier and
                  M. Pereira and
                  Gilson A. Giraldi and
                  Stuart James Gibson and
                  Christopher J. Solomon and
                  Daniel Rueckert and
                  Duncan Gillies and
                  Carlos E. Thomaz},
  title        = {A Photo-Realistic Generator of Most Expressive and Discriminant Changes
                  in 2D Face Images},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {80--85},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.17},
  doi          = {10.1109/EST.2015.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/XavierPGGSRGT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/YanushkevichESS15,
  author       = {Svetlana N. Yanushkevich and
                  Shawn Eastwood and
                  Steven Samoil and
                  Vlad P. Shmerko and
                  Travis Manderson and
                  Martin Drahansk{\'{y}}},
  title        = {Taxonomy and Modeling of Impersonation in e-Border Authentication},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {38--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.18},
  doi          = {10.1109/EST.2015.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/YanushkevichESS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/YeH15,
  author       = {Bin Ye and
                  Gareth Howells},
  title        = {Integrating Multi-modal Cloud Features within a Multi-dimensional
                  Encryption Space},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {18--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.12},
  doi          = {10.1109/EST.2015.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/YeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/est/ZhaiV15,
  author       = {Xiaojun Zhai and
                  Tanya Vladimirova},
  title        = {Data Aggregation in Wireless Sensor Networks for Lunar Exploration},
  booktitle    = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  pages        = {30--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EST.2015.9},
  doi          = {10.1109/EST.2015.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/est/ZhaiV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/est/2015,
  title        = {Sixth International Conference on Emerging Security Technologies,
                  {EST} 2015, Braunschweig, Germany, September 3-5, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7425427/proceeding},
  isbn         = {978-1-4673-9799-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/est/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}