default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 140 matches
- 2012
- Neda Abdelhamid, Aladdin Ayesh, Fadi A. Thabtah:
An experimental study of three different rule ranking formulas in associative classification. ICITST 2012: 795-800 - Abdullah Abuhussein, Harkeerat Singh Bedi, Sajjan G. Shiva:
Evaluating security and privacy in cloud computing services: A Stakeholder's perspective. ICITST 2012: 388-395 - Abdelrahman AlMahmoud, Maurizio Colombo, Chan Yeob Yeun, Hassan Al-Muhairi:
Smart authentication for real-time business process monitoring. ICITST 2012: 253-258 - Suaad S. Alarifi, Stephen D. Wolthusen:
Detecting anomalies in IaaS environments through virtual machine host system call analysis. ICITST 2012: 211-218 - Khawla Abdulla Alghafli, Andrew Jones, Thomas Anthony Martin:
Forensics data acquisition methods for mobile phones. ICITST 2012: 265-269 - Mafawez T. Alharbi, Amelia Platt, Ali H. Al-Bayatti:
Context-aware Personal Learning Environment. ICITST 2012: 692-697 - Mohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera:
Forensics filesystem with cluster-level identifiers for efficient data recovery. ICITST 2012: 411-415 - Sara Jeza Alotaibi, Mike Wald:
Towards a UTAUT-based model for studying the integrating physical and virtual Identity Access Management Systems in e-government domain. ICITST 2012: 453-458 - Alba Amato, Beniamino Di Martino, Salvatore Venticinque:
Evaluation and brokering of service level agreements for negotiation of cloud infrastructures. ICITST 2012: 144-149 - Ana A. Andrade, Vitor V. Lopes, Augusto Q. Novais:
Quantifying the impact on distrust of e-commerce trust factors: A non-parametric study. ICITST 2012: 356-361 - Hiroyuki Anzai, Hiroaki Kaminaga, Yasuhiko Morimoto, Setsuo Yokoyama, Youzou Miyadera, Shoichi Nakamura:
A system for management of research resources focusing on grasping the polish processes. ICITST 2012: 816-817 - Shunsuke Aoki, Masayuki Iwai, Kaoru Sezaki:
Perturbation for privacy-preserving participatory sensing on mobile. ICITST 2012: 809 - S. N. Arun, W. C. Lam, Kok Kiong Tan:
Innovative solution for a telemedicine application. ICITST 2012: 778-783 - Safwan El Assad:
Chaos Based Information Hiding and Security. ICITST 2012: 67-72 - A. H. Azni, Rabiah Ahmad, Zul Azri Muhamad Noh:
Correlated node behavior in wireless ad hoc networks: An epidemic model. ICITST 2012: 403-410 - Said Rabah Azzam, Shikun Zhou:
Implementation methodology of Rely/Guarantee plug-in for Protégé. ICITST 2012: 710-714 - Said Rabah Azzam, Shikun Zhou:
Assessment of ontology alignment methodology. ICITST 2012: 759-764 - Peter Backs, Steffen Wendzel, Jörg Keller:
Dynamic routing in covert channel overlays based on control protocols. ICITST 2012: 32-39 - Joonsang Baek, Quang Hieu Vu, Andrew Jones, Sameera Al-Mulla, Chan Yeob Yeun:
Smart-frame: A flexible, scalable, and secure information management framework for smart grids. ICITST 2012: 668-673 - Ghada Moussa Bahig, Amr El-Kadi:
Ensuring software safety in safety critical domains. ICITST 2012: 308-312 - Karim Benzidane, Saad Khoudali, Abderrahim Sekkaki:
Autonomous agent-based inspection for inter-VM traffic in a Cloud environment. ICITST 2012: 656-661 - Bruno Alves Pereira Botelho, Emilio Tissato Nakamura, Nelson Uto:
Implementation of tools for brute forcing touch inputted passwords. ICITST 2012: 807-808 - Dawn Carmichael, David Cleave:
How effective is social media advertising? A study of Facebook Social Advertisements. ICITST 2012: 226-229 - Sidney de Castro, Maria das Graças Bruno Marietto, Robson dos Santos França, Wagner Tanaka Botelho:
A Multi-Agent System for information management and augmented reality in asymmetric wars. ICITST 2012: 499-504 - Settachai Chaisanit, Napatwadee Sangboonnum Hongthong, Surachai Suksakulchai, Chuchart Pinpat:
Traditional musical Virtual Reality on M-learning. ICITST 2012: 271-274 - Yury Chemerkin:
Vulnerability elimination by force of new mobile OS Comparative research of security techniques on BlackBerry OS (incl. PlayBook). ICITST 2012: 483-487 - Y. Y. Chen, Shakirah Mohd Taib, Che Sarah Che Nordin:
Determinants of student performance in advanced programming course. ICITST 2012: 304-307 - Maryline Chetto, Hassan Noura, Safwan El Assad, Mousa Farajallah:
How to guarantee secured transactions with QoS and real-time constraints. ICITST 2012: 40-44 - Somsak Choto, Nol Premasathian:
A dynamic fuzzy commitment scheme using ARRSES forecasting. ICITST 2012: 616-619 - Lena Yuryna Connolly, Michael Lang:
Investigation of cultural aspects within information systems security research. ICITST 2012: 105-111
skipping 110 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 07:29 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint