default search action
4th ICITST 2009: London, UK
- Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009. IEEE 2009, ISBN 978-1-4244-5648-2
- Mazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost, Akram M. Zeki:
A secure audio steganography approach. 1-6 - Kiyana Zolfaghar, Arash Barfar, Shahriar Mohammadi:
A framework for online counter terrorism. 1-5 - Muhammad Asif Habib, Christian Praher:
Object based dynamic separation of duty in RBAC. 1-5 - Maryam Tahajod, Azadeh Iranmehr, Mohammad Reza Darajeh:
A roadmap to develop enterprise security architecture. 1-5 - Ahmad Roshidi Amran, Raphael C.-W. Phan, David J. Parish:
Metrics for network forensics conviction evidence. 1-8 - Ghulam Ali, Noor Ahmed Shaikh, Zubair Ahmed Shaikh:
Towards development of a trust grid to balance between organization's interests and employee's privacy. 1-6 - Pornpit Wongthongtham, Behrang Zadjabbari:
Signifying ontology complexity for knowledge sharing. 1-5 - Saidah Saad, Naomie Salim, Hakim Zainal:
Islamic knowledge ontology creation. 1-6 - Mohammed Alzaabi, Jawad Berri, Mohamed Jamal Zemerly:
On the fly generation of mobile learning structured multimedia content from the web. 1-7 - Carsten Stiller, Fred Roß, Christoph Ament:
Towards spatial awareness in recommender systems. 1-7 - Khaled Alghathbar:
Low power design for silent pass authentication system. 1 - Arpita Mondal, Kaushik Roy, Prabir Bhattacharya:
Secure biometric system for accessing home appliances via Internet. 1-7 - Georgios V. Lioudakis, Fotios Gogoulos, Anna Antonakopoulou, Aziz S. Mousas, Iakovos S. Venieris, Dimitra I. Kaklamani:
An access control approach for privacy-preserving passive network monitoring. 1-8 - Wei Zhou, Gaurav Kapoor, Selwyn Piramuthu:
Modified Slotted ALOHA protocol for RFID tag collisions. 1-2 - Constantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban:
Detecting errors in digital communications with CRC codes implemented with FPGA. 1-6 - Shayesteh Tabatabaei:
Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks. 1-5 - Mohammad Karami, Mohammad Fathian:
A robust trust establishment framework using Dempster-Shafer theory for MANETs. 1-7 - Peipei Shi, Bo Zhu, Amr M. Youssef:
A rotary PIN entry scheme resilient to shoulder-surfing. 1-7 - Zheng Lu, Taoxin Peng:
The VoIP intrusion detection through a LVQ-based neural network. 1-6 - Abdul Qadeer, Waqar Mahmood, Abdul Waheed:
The website census. 1-6 - Ghulam Mujtaba, David J. Parish:
Detection of applications within encrypted tunnels using packet size distributions. 1-6 - Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva:
Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology. 1-7 - Elvis Pontes, Adilson Eduardo Guelfi:
IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic. 1-6 - Zakaria Karim, Karim Mohammed Rezaul, Aliar Hossain:
Towards secure information systems in online banking. 1-6 - J. Adrian Pickering, Christopher Gutteridge:
A networked registration scheme for enhancing trust. 1-5 - Joshua Ojo Nehinbe:
Critical analyses of alerts swamping and intrusion redundancy. 1-8 - Chenglian Liu:
Improvement of authentication of anycast communication. 1-3 - Ryan Ribeiro de Azevedo, Eric Rommel Dantas Galvão, Rubean Caitano dos Santos, Cleyton Mário de Oliveira Rodrigues, Fred Freitas, Marcelo J. Siqueira:
An autonomic multiagent system ontology-based for management of security of information. 1-9 - Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva, Ali Al-Dahoud:
Applying semantic web and user behavior analysis to enforce the intrusion detection system. 1-5 - Tor-Morten Grønli, George Ghinea:
Web 2.0 integration in a context-aware mobile PIM application. 1-2 - Hoda W. Maalouf:
Managing trade-offs between information loss and latency in real-time distributed systems. 1-6 - Dulyawit Prangchumpol, Siripun Sanguansintukul, Panjai Tantasanawong:
Server virtualization by user behaviour model using a data mining technique - A preliminary study. 1-5 - Alkesh Patel, Ajit Balakrishnan:
Generic framework for recommendation system using collective intelligence. 1-6 - Jarle Hansen, Gheorghita Ghinea:
Multi-platform Bluetooth remote control. 1-2 - Nan Lu, Chunguang Zhou, Laizhong Cui:
The application of association rules algorithm on web search engine. 1-8 - Sadegh Kharazmi, Ali Farahmand Nejad, Hassan Abolhassani:
Freshness of Web search engines: Improving performance of Web search engines using data mining techniques. 1-7 - Petr Gajdos, Michal Radecký:
Web visualization support for disaster management. 1-6 - Samir Kumar Jalal, Subal Chandra Biswas, Parthasarathi Mukhopadhyay:
Webometric analysis of Central Universities in India: A study. 1-9 - Kanokwan Kanyamee, Chanboon Sathitwiriyawong:
A simple high-availability multiple-agent key recovery system. 1-6 - Maya I. Chehab, Ali E. Abdallah:
Architectures for identity management. 1-8 - Kasra Amirtahmasebi, Seyed Reza Jalalinia, Saghar Khadem:
A survey of SQL injection defense mechanisms. 1-8 - Tzong-I Wang, Ting Yuan Yeh:
A fault-tolerant mechanism for reducing pollution attacks in peer-to-peer networks. 1-6 - Shriram K. Vasudevan, K. Venkateshwaran, V. Vaithiyanathan, Subashri Vasudevan:
Design of analog to digital converter for SDR (Software Defined Radio). 1-5 - Boon Hoi Lim, Chong Eng Tan:
Simplified link reliability enhancement schemes for wireless networks. 1-6 - Alessandro Giambruno, Muhammad Awais Shibli, Sead Muftic, Antonio Lioy:
MagicNET: XACML authorization policies for mobile agents. 1-7 - Bilal Rauf, M. Faisal Amjad, Kabeer Ahmed Bhatti:
Performance evaluation of IEEE 802.11 DCF in comparison with IEEE 802.11e EDCA. 1-6 - A. R. Rizwana Shaikh, Satish Devane:
Verification of security properties of payment protocol using AVISPA. 1-6 - Riccardo Bresciani, Andrew Butterfield:
A formal security proof for the ZRTP Protocol. 1-6 - Rasha Fares, Mike Woodward:
A new algorithm for controlling the mean queue length in a buffer with time varying arrival rate. 1-6 - Petros Efstathopoulos:
Practical study of a defense against low-rate TCP-targeted DoS attack. 1-6 - Muhammad Ehsan ul Haq, Muhammad Raza Perwaz, Kabeer Ahmed Bhatti:
Compact and user-friendly representation of IPv6 addressing approach and masking. 1-5 - Daniel Caragata, Safwan El Assad, Ion Tutanescu, Emil Sofron:
Secure TCP/IP communications over DVB-S/DVB-RCS using chaotic sequences. 1-6 - Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer:
A model and design of a security provider for Java applications. 1-7 - Daphne Rixon, Mary Furey:
Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission. 1-9 - Laszlo Gyongyosi, Sándor Imre:
Unduplicable quantum data medium based secret decryption and verification. 1-5 - Mathias Kretschmer, Gheorghita Ghinea:
Seamless integration of unidirectional broadcast links into QoS-constrained broadband Wireless Mesh Access Networks. 1-2 - Andrea Visconti, Hooman Tahayori:
Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy sets. 1-2 - Daniel Fischer, Bernd Markscheffel:
State of the art in wireless LAN security - Results and implications of an empirical study concerning German companies and federal authorities. 1-5 - André Filipe de Moraes Batista, Maria das Graças Bruno Marietto, Gislene Cristina de O. Barbosa, Robson dos Santos França, Guiou Kobayashi:
Multi-agent systems to build a computational middleware: A chatterbot case study. 1-2 - Taiwo Ayodele, Shikun Zhou, Rinat Khusainov:
Email classification: Solution with back propagation technique. 1-6 - Wafa S. Al-Sharafat, Reyadh Naoum:
Significant of features selection for detecting network intrusions. 1-6 - Emmanuel Hooper:
Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy. 1-7 - Karen O'Shea, Zuhair Bandar, Keeley A. Crockett:
A semantic-based conversational agent framework. 1-8 - Awanis M. Romli, Arnidcha P. Cha:
An expert system for stress management. 1-6 - Taiwo Ayodele, Shikun Zhou, Rinat Khusainov:
Intelligent email prediction system (IEPS). 1-5 - Sirilak Areerachakul, Siripun Sanguansintukul:
Water quality classification using neural networks: Case study of canals in Bangkok, Thailand. 1-5 - Hajer Ben Mahmoud Dammak, Raouf Ketata, Taieb Ben Romdhane, Samir Ben Ahmed:
Modeling Quality Management System: A multi-agent approach. 1-6 - Nacereddine Hammami, Mokhtar Sellam:
Tree distribution classifier for automatic spoken Arabic digit recognition. 1-4 - Michal Radecký, Petr Gajdos:
Traffic simulation and intelligent agents. 1-6 - Hoon Ko, Carlos Ramos:
A study on Security Status Matrix (SSM) in Urban Computing. 1-6 - Julia Sidorova, Toni Badia:
Syntactic learning for ESEDA.1, a tool for enhanced speech emotion detection and analysis. 1-6 - Rebecca Wilkins, Abel Nyamapfene:
Usability driven website design - An equine sports case study. 1-6 - Siamak Barzegar, Mohammad Shojafar, Mohammad Reza Keyvanpour:
User interface in virtual learning environment. 1-6 - Sergey Boldyrev, Ian Oliver, Ronald Brown, Juha-Matti Tuupola, Arto Palin, Antti Lappeteläinen:
Network and content aware information management. 1-7 - Rares Vasilescu:
Architectural model for a high performance content management system. 1-6 - Ali Harb, Michel Beigbeder, Jean-Jacques Girardot:
Evaluation of question classification systems using differing features. 1-6 - Sophia Alim, Ruqayya Abdulrahman, Daniel Neagu, Mick J. Ridley:
Data retrieval from online social network profiles for social engineering applications. 1-5 - Samir B. Patel, Tejas B. Mehta, Shrikant N. Pradhan:
A novel approach using transformation techniques and decision tree algorithm on images for performing Digital Watermarking. 1-6 - Ankit Anand, Xiao-Hong Peng, Richard Haywood:
Efficient information retrieval via proxy caching mechanisms within a lossy environment. 1-6 - Pijitra Jomsri, Siripun Sanguansintukul, Worasit Choochaiwattana:
A comparison of search engine using "tag title and abstract" with CiteULike - An initial evaluation. 1-5 - Rami Ayadi, Mohsen Maraoui, Mounir Zrigui:
Intertextual distance for Arabic texts classification. 1-6 - Stephen Biggs, Stilianos Vidalis:
Cloud Computing: The impact on digital forensic investigations. 1-6 - Petr Pinkas, Jana Klecková:
The composite algebraic structure over capabilities and actions of a system. 1-6 - Elisabeth Lex, Christin Seifert, Michael Granitzer, Andreas Juffinger:
Cross-domain classification: Trade-off between complexity and accuracy. 1-6 - Annette Tolnai, Sebastiaan H. von Solms:
Solving security issues using Information Security Awareness Portal. 1-5 - Pornpit Wongthongtham, Natsuda Kasisopha, Surasak Komchaliaw:
Community-oriented software engineering ontology evolution. 1-4 - Khaisar Muneebulla Khan, Umesha Naik:
Open source software for personal information managers and personal knowledge management. 1-12 - Aziz El Fazziki, Sana Nouzri, Mohammed Sadgal:
A multi-agent development approach based on the MDA for modelling information systems. 1-6 - Tsang-Hung Wu, Shyh-Chang Liu:
A research on the establishment of enterprise information architecture. 1-6 - Thomas Kirkham, Ingo Dahn, David W. Chadwick, Marc Santos, Sandra Winfield:
Aggregating policies in user centric, real-time and distributed applications. 1-6 - Sanath Sukumaran, M. V. Shetty:
Knowledge Management (KM) in automobile: Application of a value chain (VC) approach using KM tools. 1-6 - Azah Anir Norman, Norizan Mohd Yasin:
An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organization. 1-8 - Wen-Shan Lin:
An integrated framework For modelling the adoptive behaviour of online product recommendations. 1-5 - Wiem Rekik, Maher Khemakhem, Abdelfettah Belghith, Jacques Fayolle:
PKI and UDDI based trust centre: An attempt to improve web service security. 1-4 - Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirotte, Gaëtan Rey, Michel Riveill:
Context-sensitive authorization for asynchronous communications. 1-7 - Tom Kirkham, Kleopatra Konstanteli, Julian R. Gallop, Constantinos Lalos, Ian J. Johnson:
Identity management in a mobile service orientated grid. 1-6 - Chee Er Chang, Faisal Mohd-Yasin, Azhar Kassim Mustapha:
RBStreX: Hardware XML parser for embedded system. 1-6 - Rattikorn Hewett, Phongphun Kijsanayothin:
On securing privacy in composite web service transactions. 1-6 - Amina Gamlo, Omaima Bamasak:
Towards securing e-transactions in e-government systems of Saudi Arabia. 1-7 - Deniz Cokuslu, Abdelkader Hameurlain, Kayhan Erciyes:
Grid resource discovery based on web services. 1-6 - Siddhartha Baruah, Anjana Kakoty Mahanta, Kanak Chandra Sarma:
A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parameters. 1-6 - Nallusamy Anandaraja, Nagappan Sriram, C. Kathiresan, Shibi Sebastian, E. Vadivel:
Web cum mobile based dynamic market information support for Agri-Horti produces: Linking the farmers with market. 1-6 - Rashiq Rafiq Marie, Jonathan M. Blackledge, Helmut E. Bez:
On the fractal characteristics of Internet network traffic and its utilization in covert communications. 1-6 - Frederico Guilherme Álvares de Oliveira Júnior, José Maria Parente de Oliveira:
A heuristic-based runtime ranking for service composition. 1-6 - David S. Allison, Hany F. El Yamany, Miriam A. M. Capretz:
Privacy and trust policies within SOA. 1-6 - Khaled Alghathbar, Hanan A. Mahmoud:
Noisy password security technique. 1-5 - Felix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy:
Software distribution as a malware infection vector. 1-6 - Joel Mana Gonçalves, Fabio Neves Fernandes:
The impact of information security on Latin America. 1-5 - Richard A. Guinee, Marta Blaszczyk:
A novel true random binary sequence generator based On a chaotic double scroll oscillator combination with a pseudo random generator for cryptographic applications. 1-6 - Xianghan Zheng, Vladimir A. Oleshchuk:
Trust-based framework for security enhancement of P2PSIP communication systems. 1-6 - Gao Yi, Lin Xinda, Wang Dong:
A computer based strategy design for automobile spare part logistics network optimization. 1-6 - Mahmoodreza Arefi, Amir Masoud Amini:
The elements influencing the online price dispersion on Iranian electronic retailers. 1-8 - Arian Rahimi, Sharhriar Mohammadi, Rozita Rahimi:
An efficient Iris authentication using chaos theory-based cryptography for e-commerce transactions. 1-6 - Justo Carracedo Gallardo, Emilia Pérez Belleboni:
Use of the new Smart Identity Card to reinforce electronic voting guarantees. 1-6 - Sascha Kaufmann, Christoph Schommer:
e-Conviviality in web systems by the wisdom of crowds. 1-2 - Ugo Barchetti, Anna Lisa Guido, Luca Mainetti:
A conceptual framework for business driven integration. 1-6 - Mohammad Kamel Alomari, Kuldeep Sandhu, Peter Woods:
E-government adoption in the Hashemite Kingdom of Jordan: Factors from social perspectives. 1-7 - Jean Stephan, Nagi Wakim, Youakim Badr:
E-profile-based security for critical transactions in web applications. 1-2 - Demetrios Sarantis, Dimitris Askounis:
A project management ontology as a reference for e-Government projects. 1-8 - Moses Niwe, Janis Stirna:
Pattern approach to business-to-business transactions. 1-6 - Andreas Finger, Holger Meyer, Tim Rieger, Andreas Heuer:
Transactions and service level agreements for online music distribution. 1-7 - Mohammad Rahman, Karim Mohammed Rezaul, Aliar Hossain:
Finding an effective and secured information system in e-commerce environment. 1-8 - Cyril Ehijie Azenabor, Mohammad Dastbaz, Charles A. Shoniregun, Chris Imafidon:
The society and electronic government usage. 1-8 - Sandro Fiore, Alessandro Negro, Giovanni Aloisio:
Data virtualization in grid environments through the GRelC Data Access and Integration Service. 1-6 - Alexander Wöhrer, Thomas Lustig, Peter Brezany:
Scalable relational query results handling in service oriented architectures. 1-7 - Peter Paul Beran, Erich Schikuta:
An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans. 1-7 - Xinxin Fan, Honggang Hu, Guang Gong, Eric M. Smith, Daniel W. Engels:
Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers. 1-7 - Junfeng Fan, Lejla Batina, Ingrid Verbauwhede:
Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. 1-6 - Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms. 1-8 - Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan:
Untraceability in the applied pi-calculus. 1-6 - Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly:
RFID lightweight mutual authentication using shrinking generator. 1-6 - Macedo Firmino, Glaucio B. Brandao, Ana M. G. Guerreiro, Ricardo Alexsandro de Medeiros Valentim:
Neural cryptography applied to key management protocol with mutual authentication in RFID systems. 1-6 - Ari Juels:
Power games in RFID security. 1 - Dang Nguyen Duc, Hyunrok Lee, Divyan M. Konidala, Kwangjo Kim:
Open issues in RFID security. 1-5 - Najwa Hayaati Mohd Alwi, Ip-Shing Fan:
Information security management in e-learning. 1-6 - Jeffy Mwakalinga, Stewart Kowalski, Louise Yngström:
Secure e-learning using a holistic and immune security framework. 1-6 - Kikelomo Maria Apampa, Gary B. Wills, David Argles:
Towards security goals in summative e-assessment security. 1-5 - Christian Willems, Wesam Dawoud, Thomas Klingbeil, Christoph Meinel:
Security in Tele-Lab - Protecting an online virtual lab for security training. 1-7 - Juanita I. Fernando:
The elephant in the room: Health information system security and the user-level environment. 1-7 - Said Jafari, Fredrick Mtenzi, Ronan Fitzpatrick, Brendan O'Shea:
An approach for developing comparative security metrics for healthcare organizations. 1-6 - Rose Tinabo, Fredrick Mtenzi, Brendan O'Shea:
Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data. 1-6 - Zanifa Omary, Fredrick Mtenzi, Bing Wu:
How does politics affect electronic healthcare adoption. 1-8 - Zanifa Omary, Fredrick Mtenzi:
Dataset threshold for the performance estimators in supervised machine learning experiments. 1-8 - Indika Perera, Colin Allison, Ross Nicoll, Thomas Sturgeon:
Towards successful 3D virtual learning - a case study on teaching human computer interaction. 1-6 - Abhimanyu Jain, Ashish Jain, Aditya Raj, Tushar Pahwa:
Sequenced picture captcha: generation and its strength analysis. 1-8 - Kaouthar Boumhamdi, Zahi Jarir:
Yet another approach for dynamic web service composition. 1-5 - Hironori Egi, Hiroshi Shigeno, Ken-ichi Okada:
Grasping contextual awareness inside aworkspace at the entrance to support group interaction. 1-8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.