default search action
ICCST 2019: Chennai, India
- Gordon L. Thomas, Mala John:
2019 International Carnahan Conference on Security Technology, ICCST 2019, Chennai, India, October 1-3, 2019. IEEE 2019, ISBN 978-1-7281-1577-1 - Vladimir Smejkal, Boris Oniscenko, Jindrich Kodl, Petr Tesar:
Influence of hypoxia on the stability of the dynamic biometric signature. 1-6 - Daniela Buser, Yanik Sterchi, Adrian Schwaninger:
Effects of Time on Task, Breaks, and Target Prevalence on Screener Performance in an X-ray Image Inspection Task. 1-6 - Heinz Hertlein, Aladdin M. Ariyaeeinia, Zoe Jeffrey, Soodamani Ramalingam:
Effectiveness in the Realisation of Speaker Authentication. 1-5 - Simon Attfield, Nallini Selveraj, Neesha Kodagoda, Peter J. Passmore, Elke Dunke:
Patterns of Life Visualiations for Intelligence Analysis: Exploring Animation with POLAR. 1-6 - Anas Husseis, Judith Liu-Jimenez, Ines Goicoechea-Telleria, Raul Sánchez-Reillo:
A Survey in Presentation Attack and Presentation Attack Detection. 1-13 - Shilpa Thakur, Ajay Singh:
Ergodic Secrecy Capacity in Nakagami-m Fading Channels. 1-3 - Iman Sharafaldin, Arash Habibi Lashkari, Saqib Hakak, Ali A. Ghorbani:
Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. 1-8 - Vasu Sethia, A. Jeyasekar:
Malware Capturing and Analysis using Dionaea Honeypot. 1-4 - T. Nathezhtha, Sangeetha Dhamodaran, Vaidehi V.:
WC-PAD: Web Crawling based Phishing Attack Detection. 1-6 - Laya Taheri, Andi Fitriah Abdul Kadir, Arash Habibi Lashkari:
Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls. 1-8 - Purushotham Parthiban Parthy, Gowthamaraj Rajendran:
Identification and prevention of social engineering attacks on an enterprise. 1-5 - S. Abijah Roseline, A. D. Sasisri, S. Geetha, C. Balasubramanian:
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique. 1-6 - Lucindia Dupak, Subhasish Banerjee:
Role of Bio-Inspired Algorithms for Designing Protocols in MANET-Review. 1-6 - Justin Joseph, Saumya Bhadauria:
Cookie Based Protocol to Defend Malicious Browser Extensions. 1-6 - Miguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte, Réjean Plamondon:
Generating Off-line and On-line Forgeries from On-line Genuine Signatures. 1-6 - Rishu Raj, Soumya Michael, D. Femi:
Forest Monitoring System through RFID and Tensorflow Object Detection. 1-4 - Barbara Corsetti, Raul Sánchez-Reillo, Richard M. Guest, Marco Santopietro:
Face Image Analysis in Mobile Biometric Accessibility Evaluations. 1-5 - N. Divya:
Image Specific Similar Target Detection in Aerial Images Using Gaussian Mixture Model. 1-5 - Ines Goicoechea-Telleria, Kiyoshi Kiyokawa, Anas Husseis, Judith Liu-Jimenez, Raul Sánchez-Reillo:
Fingerprint Presentation Attack Detection: Multispectral imaging with a narrow-band camera using Bag of Features. 1-6 - K. Kirutika, V. Vetri Selvi, Ranjani Parthasarathi, G. Subrahmanya V. R. K. Rao:
Controller Monitoring System In Software Defined Networks Using Random Forest Algorithm. 1-6 - Kwasi Boakye-Boateng, Arash Habibi Lashkari:
Securing GOOSE: The Return of One-Time Pads. 1-8 - M. G. Padmashree, J. S. Arunalatha, K. R. Venugopal:
HPAKE: Hybrid Precocious Authentication and Key Establishment in IoT. 1-6 - Gowthamaraj Rajendran, R. S. Ragul Nivash, Purushotham Parthiban Parthy, S. Balamurugan:
Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures. 1-6 - K. Venkatesh, K. Pratibha, Suganya Annadurai, Lakshmi Kuppusamy:
Reconfigurable Architecture to Speed-up Modular Exponentiation. 1-6 - Dillibabu Shanmugam, Suganya Annadurai, Rajagopalan Vijayasarathy, T. Venkatesh Prasad:
Denial of Service Detection System on various platforms. 1-12 - M. Vincent, P. Arumugam, G. Prabhakara Rao:
Interior Intrusion Detection System. 1-4 - T. A. Mohanaprakash, J. Andrews:
Novel privacy preserving system for Cloud Data security using Signature Hashing Algorithm. 1-6 - Balaraja Lavanya, V. ThamizhThendral:
A novel data ciphering method for secure cloud storage. 1-6 - Bobba Basaveswara Rao, Suneetha Bulla, Gangadhara Rao Kancherla, K. Chandan:
HRF (HTTP Request Filtering): A New Detection Mechanism of EDoS Attack on Cloud. 1-7 - Divyans Mahansaria, Uttam Kumar Roy:
Secure Authentication for ATM transactions using NFC technology. 1-5 - K. B. Sarmila, S. V. Manisekaran:
A Study on Security Considerations in IoT Environment and Data Protection Methodologies for Communication in Cloud Computing. 1-6 - Wendy Ponce-Hernandez, Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Judith Liu-Jimenez:
Template protection approaches: Fuzzy Vault scheme. 1-5 - Sabbir Ahmed, Tamkin Mahmud Tan, Anna Mary Mondol, Zawad Alam, Noshin Nawal, Jia Uddin:
Automated Toll Collection System Based on RFID Sensor. 1-3 - Roopa Ravish, Varun R. Gupta, K. J. Nagesh, Amruth Karnam, Shanta Rangaswamy:
Software Implementation of an Automatic Movable Road Barrier. 1-6 - Raul Garcia-Martin, Raul Sánchez-Reillo, J. Enrique Suarez Pascual:
Wrist Vascular Biometric Capture Using a Portable Contactless System. 1-6 - Michael Rhead, Soodamani Ramalingam, Robert Gurney, William E. Martin, Andrew Jones:
Implications of the Method of Construction of UK Number Plates for Infrared Reflectance and Camera Settings on ANPR System. 1-5 - Manthan Prajapati, Dharmesh Dave:
Host-based Forensic Artefacts of Botnet Infection. 1-4 - Atieh Merikh Nejadasl, Mahmoud Chizari:
Using finger for touchscreen devices; is it safe? 1-3 - K. Shruthi, P. S. Chinmayi:
Android Device or a Privacy Compromise? 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.