default search action
ICCST 2017: Madrid, Spain
- International Carnahan Conference on Security Technology, ICCST 2017, Madrid, Spain, October 23-26, 2017. IEEE 2017, ISBN 978-1-5386-1585-0
- Fernando Ibanez Urzaiz, Alvaro Duque de Quevedo, Javier Gismero-Menoyo, Alberto Asensio-Lopez:
Design of radio frequency subsystems of a ubiquitous radar in X band. 1-5 - Belén Ríos-Sánchez, Miguel Viana-Matesanz, Carmen Sanchez-Avila:
A comparative study of palmprint feature extraction methods for contact-less biometrics under different environmental conditions. 1-6 - Ines Goicoechea-Telleria, Judith Liu-Jimenez, Helga C. Quiros-Sandoval, Raul Sánchez-Reillo:
Analysis of the attack potential in low cost spoofing of fingerprints. 1-6 - Rafael Martin Nieto, Jesus Molina Merchan, Álvaro García-Martín, José M. Martínez:
Generation and evaluation of synthetic models for training people detectors. 1-6 - Michael Dymshits, Benjamin Myara, David Tolpin:
Process monitoring on sequences of system call count vectors. 1-5 - Jason R. Hamlet, Mitchell T. Martin, Nathan J. Edwards:
Unique signatures from printed circuit board design patterns and surface mount passives. 1-6 - Majid Hatamian, Jetzabel M. Serna:
ARM: ANN-based ranking model for privacy and security analysis in smartphone ecosystems. 1-6 - Vladimir Smejkal, Jindrich Kodl, Ladislav Sieger, Frantisek Hortai, Petr Tesar:
Stability of a dynamic biometric signature created on various devices. 1-5 - Pierre Poitevin, Michel Pelletier, Patrick Lamontagne:
Challenges in detecting UAS with radar. 1-6 - Ada Pozo, Julian Fiérrez, Marcos Martinez-Diaz, Javier Galbally, Aythami Morales:
Exploring a statistical method for touchscreen swipe biometrics. 1-4 - Mayra Zurbarán, Pedro M. Wightman:
VoKA: Voronoi K-aggregation mechanism for privacy in location-based information systems. 1-6 - Gabriel C. Birch, Bryana L. Woo, Charles F. LaCasse, Jaclynn J. Stubbs, Amber L. Dagel:
Computational optical physical unclonable functions. 1-6 - Sung Choi, Adrian R. Chavez, Marcos Torres, Cheolhyeon Kwon, Inseok Hwang:
Trustworthy design architecture: Cyber-physical system. 1-9 - Iman Sharafaldin, Amirhossein Gharib, Arash Habibi Lashkari, Ali A. Ghorbani:
BotViz: A memory forensic-based botnet detection and visualization approach. 1-8 - Arash Habibi Lashkari, Amy Seo, Gerard Drapper Gil, Ali A. Ghorbani:
CIC-AB: Online ad blocker for browsers. 1-7 - Patrick Schuch, Simon-Daniel Schulz, Christoph Busch:
Minutia-based enhancement of fingerprint samples. 1-6 - Mauro Gambetti, Fabio Garzia, Jesús Francisco Vargas-Bonilla, Davide Ciarlariello, Miguel A. Ferrer, Sergio Fusetti, Mara Lombardi, Soodamani Ramalingam, Mahalingam Ramasamy, Simone Sacerdoti, Andrea Sdringola, Devi Thirupati, Marcos Faúndez-Zanuy:
The new communication network for an internet of everything based security/safety/general management/visitor's services for the Papal Basilica and Sacred Convent of Saint Francis in Assisi, Italy. 1-6 - Jozef Ristvej, Lubomira Sokolova, Jana Starackova, Roman Ondrejka, Maros Lacinák:
Experiences with implementation of information systems within preparation to deal with crisis situations in terms of crisis management and building resilience in the Slovak Republic. 1-6 - Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
Encrypted computing: Speed, security and provable obfuscation against insiders. 1-6 - M. Fahim Ferdous Khan, Ken Sakamura:
A tamper-resistant digital token-based rights management system. 1-6 - David Querencias-Uceta, Belén Ríos-Sánchez, Carmen Sanchez-Avila:
Principal component analysis for ear-based biometric verification. 1-6 - Paloma Tirado-Martin, Ramon Blanco-Gonzalo, Alba Alvarez-Nieto, Alvaro Romero-Diaz:
Image processing techniques for improving vascular hand biometrics. 1-5 - Alicia Aglio-Caballero, Belén Ríos-Sánchez, Carmen Sanchez-Avila, Maria Jose Melcon De Giles:
Analysis of local binary patterns and uniform local binary patterns for palm vein biometric recognition. 1-6 - Andrea Tundis, Max Mühlhäuser:
A multi-language approach towards the identification of suspicious users on social networks. 1-6 - Tomás Lovecek, Anton Siser, Ladislav Maris:
Use case of waterwork physical protection system robustness evaluation as a part of Slovak critical infrastructure. 1-5 - Juan C. SanMiguel, José M. Martínez, Luis Caro Campos:
Object-size invariant anomaly detection in video-surveillance. 1-6 - Pablo Fernández López, Jorge Sanchez-Casanova, Judith Liu-Jimenez, Carlos Morcillo-Marin:
Influence of walking in groups in gait recognition. 1-6 - Attaullah Buriro, Zahid Akhtar, Bruno Crispo, Sandeep Gupta:
Mobile biometrics: Towards a comprehensive evaluation methodology. 1-6 - Chaima Bensaci, Youcef Zennir, Denis Pomorski, El-Arkam Mechhoud:
Complex safety study of intelligent multi-robot navigation in risk's environment. 1-6 - Derlin Morocho, Aythami Morales, Julian Fiérrez, Javier Ortega-Garcia:
Humans in the loop: Study of semi-automatic signature recognition based on attributes. 1-5 - Fatma Al Maqbali, Chris J. Mitchell:
AutoPass: An automatic password generator. 1-6 - Chiara Lunerti, Richard M. Guest, Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Jon Baker:
Environmental effects on face recognition in smartphones. 1-6 - Wai-Kong Lee, Xian-Fu Wong, Bok-Min Goi, Raphael C.-W. Phan:
CUDA-SSL: SSL/TLS accelerated by GPU. 1-6 - Alvaro Duque de Quevedo, Fernando Ibanez Urzaiz, Javier Gismero-Menoyo, Alberto Asensio-Lopez:
X-band ubiquitous radar system: First experimental results. 1-6 - Pedro Moura, Paulo A. P. Fazendeiro, Pedro Marques, Ana Ferreira:
SoTRAACE - Socio-technical risk-adaptable access control model. 1-6 - Gregorio Pitolli, Leonardo Aniello, Giuseppe Laurenza, Leonardo Querzoni, Roberto Baldoni:
Malware family identification with BIRCH clustering. 1-6 - Faraz Fatemi Moghaddam, Philipp Wieder, Ramin Yahyapour:
Token-based policy management (TBPM): A reliable data classification and access management schema in clouds. 1-6 - Patrick Bours, Sukanya Brahmanpally:
Language dependent challenge-based keystroke dynamics. 1-6 - Matteo Di Pirro, Mauro Conti, Riccardo Lazzeretti:
Ensuring information security by using Haskell's advanced type system. 1-6 - Samar Muslah Albladi, George R. S. Weir:
Competence measure in social networks. 1-6 - Nasser Mohammed Al-Fannah:
One leak will sink a ship: WebRTC IP address leaks. 1-5 - M. Ugur Aksu, M. Hadi Dilek, Emin Islam Tatli, Kemal Bicakci, H. Ibrahim Dirik, Mustafa Umut Demirezen, Tayfun Aykir:
A quantitative CVSS-based cyber security risk assessment methodology for IT systems. 1-8 - Jimmy Anderson Florez Zuluaga, Jesús Francisco Vargas-Bonilla:
Detection of convective clouds using meteorological data fusion for aviation safety support. 1-8 - Robert Fischer, Kevin Lamshoft, Jana Dittmann, Claus Vielhauer:
Advanced issues in wireless communication security: Towards a security-demonstrator for smart-home environments. 1-6 - Bryana L. Woo, Gabriel C. Birch, Jaclynn J. Stubbs, Camron G. Kouhestani:
Unmanned aerial system detection and assessment through temporal frequency analysis. 1-5 - Luis Menezes, Roland Wismüller:
Detecting information leaks in Android applications using a hybrid approach with program slicing, instrumentation and tagging. 1-6 - Jaclynn J. Stubbs, Gabriel C. Birch, Bryana L. Woo, Camron G. Kouhestani:
Physical security assessment with convolutional neural network transfer learning. 1-6 - Federica Bisio, Salvatore Saeli, Pierangelo Lombardo, Davide Bernardi, Alan Perotti, Danilo Massa:
Real-time behavioral DGA detection through machine learning. 1-6 - Yanik Sterchi, Nicole Hättenschwiler, Stefan Michel, Adrian Schwaninger:
Relevance of visual inspection strategy and knowledge about everyday objects for X-ray baggage screening. 1-6 - Andrej Vel'as, Milan Kutaj, Martin Durovec:
Influence of changing the parameters of the camera system on video-based motion detection. 1-5 - Jorge Sanchez-Casanova, Antonio Miranda-Escalada, Raul Sánchez-Reillo, Pablo Bartolome-Molina:
ECG biosignals in biometric recognition. 1-6 - Alexander W. Miranda, Steven Goldsmith:
Cyber-physical risk management for PV photovoltaic plants. 1-8 - Rubén Vera-Rodríguez, Patricia Marin-Belinchon, Ester Gonzalez-Sosa, Pedro Tome, Javier Ortega-Garcia:
Exploring automatic extraction of body-based soft biometrics. 1-6 - Gianmarco Baldini, Gary Steri, Irene Amerini, Roberto Caldelli:
The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprints. 1-6 - Selvakumar Ramachandran, Andrea Dimitri, Maulahikmah Galinium, Muhammad Tahir, Indirajith Viji Ananth, Christian H. Schunck, Maurizio Talamo:
Understanding and granting android permissions: A user survey. 1-6 - Iwen Coisel, Ignacio Sanchez, Javier Galbally:
Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing process. 1-6 - Luis Vergara, Addisson Salazar, Jordi Belda, Gonzalo Safont, Santiago Moral, Sergio Iglesias:
Signal processing on graphs for improving automatic credit card fraud detection. 1-6 - Francisco-Javier Romero-Paisano, Félix Pérez-Martínez, Susan Martínez-Cordero, Jaime Calvo-Gallego:
Accurate multi-target surveillance system over wide areas. 1-6 - Moisés Díaz Cabrera, Miguel A. Ferrer:
Assessing the common authorship of a set of questioned signature images. 1-5 - Hakar Mohsin Saber, Nawzad Kamaran Al-Salihi:
IoT: Secured and automated house. 1-6 - Patrick Bours, Adrian Evensen:
The Shakespeare experiment: Preliminary results for the recognition of a person based on the sound of walking. 1-6 - Gianmarco Baldini, Gary Steri, Raimondo Giuliani, Claudio Gentile:
Imaging time series for internet of things radio frequency fingerprinting. 1-6 - Vincent E. Urias, William M. S. Stout, Jean-Luc Watson, Cole Grim, Lorie M. Liebrock, Monzy Merza:
Technologies to enable cyber deception. 1-6 - Brian P. Van Leeuwen, John Eldridge, Vincent Urias:
Cyber analysis emulation platform for wireless communication network protocols. 1-6 - Cheng-Ta Hsieh, Chin-Chuan Han, Chang-Hsing Lee, Kuo-Chin Fan:
Person authentication using nearest feature line embedding transformation and biased discriminant analysis. 1-5 - Ilias Chamatidis, Aggeliki Katsika, Georgios P. Spathoulas:
Using deep learning neural networks for ECG based authentication. 1-6 - Tomasz Sikora, Lukasz Osuchowski, Miroslaw Maziejuk, Wieslaw Lisowski:
Mobile device for detection of biological threat. 1-4 - Fabio Garzia, Mara Lombardi, Soodamani Ramalingam:
An integrated internet of everything - Genetic algorithms controller - Artificial neural networks framework for security/safety systems management and support. 1-6 - Marcelo Antonio de Carvalho, Paulo Bandiera-Paiva:
Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling. 1-8 - Rawabi Alsedais, Richard M. Guest:
Person re-identification from CCTV silhouettes using generic fourier descriptor. 1-6 - Stefan Michel, Nicole Hättenschwiler, Melina Zeballos, Adrian Schwaninger:
Comparing e-learning and blended learning for threat detection in airport security X-ray screening. 1-6 - Oscar Miguel-Hurtado, Richard M. Guest, Chiara Lunerti:
Voice and face interaction evaluation of a mobile authentication platform. 1-6 - Raul Sánchez-Reillo, Ines Ortega-Fernandez, Wendy Ponce-Hernandez, Helga C. Quiros-Sandoval:
How to implement EU data protection regulation for R&D on personal data. 1-7 - Belén Ríos-Sánchez, Miguel Viana-Matesanz, Carmen Sanchez-Avila:
Curvelets for contact-less hand biometrics under varied environmental conditions. 1-6 - Adrián Tomé, Luis Salgado:
Detection of anomalies in surveillance scenarios using mixture models. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.