default search action
9th ICITST 2014: London, UK
- 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014, London, United Kingdom, December 8-10, 2014. IEEE 2014, ISBN 978-1-908320-39-1
Workshops
Workshop 1: Chaos-Information Hiding and Security (C-IHS-2014)
- Mario Diego Munoz-Hernandez, Jose Juan Garcia-Hernandez, Miguel Morales-Sandoval:
Study on the robustness to retyping attacks of fingerprinted digital documents in the frequential domain. 25-30 - Karol Desnos, Safwan El Assad, Aurore Arlicot, Maxime Pelcat, Daniel Ménard:
Efficient multicore implementation of an advanced generator of discrete chaotic sequences. 31-36 - Simona Petrakieva, Oleg Garasym, Ina Taralova:
G-interval method for secure chaotic synchronization and information transmission. 37-42 - Daniel Caragata, Safwan El Assad, Kassem Ahmad:
Survey of network access security in UMTS/LTE networks. 43-46 - Zobeida Jezabel Guzman-Zavaleta, Claudia Feregrino Uribe, Alejandra Menendez-Ortiz, Jose Juan Garcia-Hernandez:
A robust audio fingerprinting method using spectrograms saliency maps. 47-52
Workshop 2: Cloud Applications and Security (CAS'14)
- Johann Betz, Dirk Westhoff:
C3-Sched - A cache covert channel robust cloud computing scheduler. 54-60 - Manuel Rudolph, Reinhard Schwarz, Christian Jung:
Security policy specification templates for critical infrastructure services in the cloud. 61-66 - Oliver Pfaff, Sebastian Ries:
Avoiding security integration pitfalls in the cloud. 67-70
Sessions
Session 1: Infonomics, E-Technology, ICT developments and diffusion
- Mohammad Kamel Alomari:
Towards E-democracy in the middle east: E-voting adoption. 73-77 - Nawaf Sulaiman Alharbi, Maria Papadaki, Paul Dowland:
Security challenges of E-government adoption based on end users' perspective. 78-82 - Dirk Burkhardt, Kawa Nazemi, Wilhelm Retz, Jörn Kohlhammer:
Visual explanation of government-data for policy making through open-data inclusion. 83-89 - Gilmini Dantanarayana, Prasad M. Jayaweera:
Value oriented service designing for successful e-Health. 90-94
Session 2: Cloud Security
- Saurabh Kulkarni, Shayan Saha, Ryler Hockenbury:
Preserving privacy in sensor-fog networks. 96-99 - Suresh Kumar Aditya, Kavya Premkumar, R. Anitha, Saswati Mukherjee:
Combined security framework for multi-cloud environment. 100-105 - Regio A. Michelin, Avelino F. Zorzo, César A. F. De Rose:
Mitigating DoS to authenticated cloud REST APIs. 106-111 - Pushpinder-Kaur Chouhan, Sakir Sezer, Yangseo Choi, Ikkyun Kim, Chunghwan Jung:
Secure virtualised environment. 112-117
Session 3: Internet Applications and Technology
- Brika Ammar, Fahima Nader:
Creation of educative content on the web. 119-124 - Aspen Olmsted, RoxAnn H. Stalvey:
Highly available, consistent, business rule filters. 125-130 - Loubna El Faquih, Hanae Sbaï, Mounia Fredj:
Semantic variability modeling in business processes: A comparative study. 131-136 - Udsanee Pakdeetrakulwong, Pornpit Wongthongtham, Waralak V. Siricharoen:
Recommendation systems for software engineering: A survey from software development life cycle phase perspective. 137-142
Session 4: Information Security
- Edina Hatunic-Webster, Fredrick Mtenzi, Brendan O'Shea:
Model for analysing Anti-Phishing Authentication Ceremonies. 144-150 - Potchara Pruksasri, Jan van den Berg, Wout Hofman, Yao-Hua Tan:
Data concealing of supply chain transactions using the Distributed Trust Backbone. 151-156 - Dimitrios Kasiaras, Thomas Zafeiropoulos, Nathan L. Clarke, Georgios Kambourakis:
Android forensics: Correlation analysis. 157-162 - Rafal Leszczyna, Michal R. Wróbel:
Security information sharing for smart grids: Developing the right data model. 163-169
Session 5: Ubi/Cloud Computing
- Christian M. Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner:
ESTADO - Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online. 171-177 - Surabhi Mour, Priyansh Srivastava, Payal Patel, Hari Ram, Bhavesh N. Gohil, Dhiren R. Patel:
Load management model for cloud computing. 178-184 - Elarbi Badidi:
A context broker federation for QoC-driven selection of cloud-based context services. 185-190 - Osama M. Ben Omran, Brajendra Panda:
A new technique to partition and manage data security in cloud databases. 191-196
Session 6: Internet Application and Technology
- Boniface Kayode Alese, R. A. Akingbola, Folasade Mojisola Dahunsi, Olumide S. Adewale, T. J. Ogundele:
Improving deception in honeynet: Through data manipulation. 198-204 - Vincent Chan, Tony Hao Wu, Grantham Pang:
Decision support and data mining for direct consumer-to-consumer trading. 205-208 - Souad Sadki, Hanan El Bakkali:
PPAMH: A novel privacy-preserving approach for mobile healthcare. 209-214 - Sabah Al-Fedaghi, Heba Al Meshari:
Characterizing social networks based on interior processes of nodes. 215-221
Session 7: Information Security
- Abdulrazaq Almutairi, David J. Parish:
Using classification techniques for creation of predictive intrusion detection model. 223-228 - Matej Kacic, Daniel Ovsonka, Petr Hanácek, Maros Barabas:
Traffic generator based on behavioral pattern. 229-223 - Tiwalade Adelola, Ray Dawson, Firat Batmaz:
Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case. 234-239 - Nikolai Joukov, Vladislav Shorokhov, Dmytro Tantsuyev:
Security audit of data flows across enterprise systems and networks. 240-247 - Eric Amankwa, Marianne Loock, Elmarie Kritzinger:
A conceptual analysis of information security education, information security training and information security awareness definitions. 248-252
Session 8: Internet Applications and Information Security
- Antonia Rana, Andrea Ciardulli:
Enabling consumers to self-verify authenticity of products. 254-255 - Mee Hong Ling, Kok-Lim Alvin Yau:
Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks. 256-261 - André A. Osti, Bruno Alves Pereira Botelho, Nelson Uto:
Implementation aspects of software guards: A case study. 262-267 - Pino Caballero-Gil, Francisco Martín-Fernández, Cándido Caballero-Gil:
Using query frequencies in tree-based revocation for certificateless authentication in VANETs. 268-273 - Olusegun Ademolu Ajigini, John A. van der Poll, Jan H. Kroeze:
Towards a model on security challenges during closed source software to OSS migrations. 274-283
Session 9: Internet Application and Technology
- Fatiha Djebbar, Beghdad Ayad:
Image hiding in speech spectrum. 285-287 - Bamidele Moses Kuboye, Boniface Kayode Alese, Olumide Sunday Adewale:
Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networks. 288-294 - Otasowie Iyare, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese:
A replication model for students' result processing. 295-301 - Abrar Ullah, Hannan Xiao, Trevor Barker, Mariana Lilley:
Graphical and text based challenge questions for secure and usable authentication in online examinations. 302-308
Session 10: Information Security
- Ivan Homoliak, Daniel Ovsonka, Matej Grégr, Petr Hanácek:
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic. 310-317 - Natalija Vlajic, Armin Slopek:
Performance and economies of 'bot-less' application-layer DDoS attacks. 318-323 - Norah S. Farooqi, Siobhán North:
Time cost evaluation of trust based access control for XML databases. 324-326 - Patrick Dressler, Daniel Fischer, Bernd Markscheffel:
Software solutions for high-security voice and data communication for smartphones. 327-332
Session 11: Internet Applications, Technology, Multimedia and Web Services
- Rahul Kumar, Indraveni K, Aakash Kumar Goel:
Automation of detection of security vulnerabilities in web services using dynamic analysis. 334-336 - Seokhwan Yang, Jaechun Kim, Mokdong Chung:
A prediction model based on Big Data analysis using hybrid FCM clustering. 337-339 - Saleh Albahli, Austin Melton:
ohStore: Ontology hierarchy solution to improve RDF data management. 340-348 - Hossain Shahriar, Victor Clincy:
Detection of repackaged Android Malware. 349-354
Session 12: Information Security
- F. Y. Osisanwo, Adebayo O. Adetunmbi, Boniface Kayode Alese:
Barefoot morphology: A person unique feature for forensic identification. 356-359 - Keisuke Kato, Vitaly Klyuev:
Large-scale network packet analysis for intelligent DDoS attack detection development. 360-365 - Wided Boubakri, Walid Abdallah, Noureddine Boudriga:
A chaos-based authentication and key management scheme for M2M communication. 366-371
Session 13: Information Security, Multimedia and Web Services
- L. A. Nwosu, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese, Olumide Olayinka Obe:
An Attribute-Based Signature using rivest shamir adleman scheme. 380-386 - Boniface Kayode Alese, O. Oyebade, A. Osuolale Festus, Otasowie Iyare, Aderonke Favour-Bethy Thompson:
Evaluation of information security risks using hybrid assessment model. 387-395 - Omer Nawaz, Tahir Nawaz Minhas, Markus Fiedler:
Optimal MTU for realtime video broadcast with packet loss - A QoE perspective. 396-401 - Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Advanced encryption standard development based quantum key distribution. 402-408 - Shruti Kohli, Ankit Gupta:
Modeling anonymous human behavior using social media. 409-412
Session 14: Information Security
- Muhammad Ali Yousuf, Fatimah Y. Akeel, Nawfal F. Fadhel, Gary B. Wills:
Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data. 414-419 - Fatimah Y. Akeel, Gary B. Wills, Andrew M. Gravell:
Exposing data leakage in Data Integration Systems. 420-425 - Igor Mishsky, Nurit Gal-Oz, Ehud Gudes:
Computing domains reputation using flow. 426-431 - Ricardo Villalón-Fonseca, Braulio J. Solano-Rojas, Gabriela Marín Raventós:
An applied methodology for information security and assurance: A study case for cloud computing. 432-439 - Christopher Morrell, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:
Scaling IPv6 address bindings in support of a moving target defense. 440-445
Session 15: Internet Applications, Technology and Ubi/Cloud Computing
- M. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff:
CBAC4C: Conflict Based Allocation Control for Cloud. 447-448 - Abikoye Oluwakemi Christianah, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson, D. Alowolodu Olufunso, A. Osuolale Festus:
A robust multicast authentication scheme based on asymmetric key signature. 449-458 - Fahad Polash, Abdullah Abuhussein, Sajjan G. Shiva:
A survey of cloud computing taxonomies: Rationale and overview. 459-465 - Fahad M. Alotaibi:
Architectural framework proposed of behavioural classroom simulation based second life environment. 466-470 - Pedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas:
Performance analysis of Hadoop MapReduce on an OpenNebula cloud with KVM and OpenVZ virtualizations. 471-476
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.