default search action
ICCST 2022: Valeč u Hrotovic, Czech Republic
- IEEE International Carnahan Conference on Security Technology, ICCST 2022, Valeč u Hrotovic, Czech Republic, September 7-9, 2022. IEEE 2022, ISBN 978-1-6654-9363-5
- Petr Ilgner, Radek Fujdiak:
Fuzzing ICS Protocols: Modbus Fuzzer Framework. 1-6 - Ashhadul Islam, Samir Brahim Belhaouari:
Analysing keystroke dynamics using wavelet transforms. 1-5 - Yuri Bespalov, Lyudmila Kovalchuk, Hanna Nelasa, Roman Oliynykov, Alberto Garoffolo:
Game theory analysis of incentive distribution for prompt generation of the proof tree in zk-SNARK based sidechains. 1-7 - Adam Malatinský, Martin Hromada:
Evaluation of the most important fire threats of the building. 1-6 - Wiktor Sedkowski, Karol Bierczynski:
Perceived severity of vulnerability in cybersecurity: cross linguistic variegation. 1-4 - Mimi Enakome Oka, Martin Hromada:
Analysis of Current Preventive Approaches in the Context of Cybersecurity. 1-5 - Soodamani Ramalingam, William E. Martin, Michael Rhead, Robert Gurney:
Electronic Number Plate Generation for Performance Evaluation. 1-6 - Hemin Akram Muhammad, Martin Hromada:
Proposing an E-Government Stage Model in Terms of Personal Information Security in Developing Countries. 1-5 - Robert Gurney, Michael Rhead, William E. Martin:
The Effect of Number Plate Layout and Design on Automated Recognition. 1-6 - Eva Holasova, Radek Fujdiak:
Deep Neural Networks for Industrial Protocol Recognition and Cipher Suite Used. 1-7 - David Kohout, Petr Mlynek:
Testing Smart Meters with Custom Application. 1-6 - Tomás Lovecek, Jakub Durica, Katarína Kampová, Katarína Petrlová:
Biometric Identity Verification as Part of Physical Protection Systems. 1-7 - Kaspar Kaufmann, Thomas Wyssenbach, Adrian Schwaninger:
Exploring the effects of segmentation when learning with Virtual Reality and 2D displays: a study with airport security officers. 1 - Stanislav Kovar, Jan Valouch, Jan Nemec:
Objective Method for Object Security Evaluation. 1-4 - Dora Kotkova, Lukas Kotek, Martin Hromada:
Educational Platform for Personal and Community Protection Situations from the Perspective of Soft Targets - Self-defense part. 1-5 - Katarína Kampová, Katarína Mäkká, Katarína Petrlová:
Economic Evaluation of Cost and Benefits of Implementing Monitoring and Tracking System of Persons in Medical Facilitates. 1-6 - Michael Coole, Deborah Evans, David Brooks:
A Framework for the Analysis of Security Technology Vulnerabilities: Defeat Evaluation of an Electronic Access Control Locking System. 1-6 - Fabio Garzia, Francesco Borghini, Ekaterina Makshanova, Mara Lombardi, Soodamani Ramalingam:
Emotional analysis of safeness and risk perception of cybersecurity attacks during the COVID-19 pandemic. 1-6 - Lucie Flynnova, Frantisek Paulus, Jarmil Valasek:
Threats and Resilience: Methodology in the Area of Railway Infrastructure. 1-5 - Fabio Garzia, Roberto Cusani, Andrea Chiarella:
A new hybdrid steganographic technique for images. 1-6 - Lukas Kotek, Martin Hromada, Dora Kotkova:
Online Interactive Education of People in the Field of Protection of Soft Targets. 1-5 - Lindemberg Naffah Ferreira, Rogério Zupo Braga, Bruno Meira Tenório D'Albuquerque, Bruno Eduardo Abreu de Oliveira, Carlos Augusto Lisboa da Silva, Guilherme Couto Soares, Alex Discacciati Neves, Pierre Julião Pimentel, Marcelo Maximiliano Maciel, Eufrásio Alves Cambuí Júnior, Carlos Renato Machado Confar, Aline Chevrand Campos, Alessandro Márcio de Moraes Zebral, José Roberto Miranda, Ricardo Petrini de Morais, Adriano Araújo Campolina, Osvaldo Lage Scavazza, Luiz Cláudio Fernandes L. Gomes:
Secure Tax State Line: a Brazilian State Platform for Monitoring Roads, Designed to Support Tax Enforcement and Compliance. 1-6 - Carrie Gardner, William R. Clacyomb:
Applying Text Analytics to Insider Risk Analysis: A Case Study on Keyword Generation. 1-7 - Gabriela Králícková, Petra Dostálová:
Analysis of insurance conditions as a tool to ensure physical protection in the Czech Republic. 1-4 - Andrej Vel'as, Zuzana Zvaková, Martin Boros:
Physical Protection and Guarding Service in the Company During the Pandemic - Human Resource Management. 1-4 - David Rehak, Alena Splichalova:
Application of composite indicator in evaluation of resilience in critical infrastructure system. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.