Login / Signup
ICITST
2009
2013
2015
2020
2009
2020
Keyphrases
Publications
2020
Esau Bermudez
,
Djamel Fawzi Hadj Sadok
Energy Consumption of a LoRaWAN Network using Jarvis Algorithm.
ICITST
(2020)
Saad Al-Ahmari
,
Karen Renaud
,
Inah Omoronyia
Implement a Model for Describing and Maximising Security Knowledge Sharing.
ICITST
(2020)
Harris Anthonio
,
Yvonne Hwei-Syn Kam
A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency.
ICITST
(2020)
May Medhat
,
Menna Essa
,
Hend Faisal
,
Samir G. Sayed
YARAMON: A Memory-based Detection Framework for Ransomware Families.
ICITST
(2020)
Zongchao Qiao
,
Ina Taralova
,
Safwan El Assad
A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy.
ICITST
(2020)
Song-Kyoo Amang Kim
Toward Compact Data from Big Data.
ICITST
(2020)
Satoshi Kosakatani
,
Tetsutaro Uehara
,
Songpon Teerakanok
Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be.
ICITST
(2020)
Tabisa Ncubukezi
,
Laban Mwansa
,
François Rocaries
A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses.
ICITST
(2020)
Fabian Schillinger
,
Christian Schindelhauer
Partitioned Private User Storages in End-to-End Encrypted Online Social Networks.
ICITST
(2020)
Fethi Dridi
,
Safwan El Assad
,
Carinelle Atamech
,
Wajih El Hadj Youssef
,
Mohsen Machhout
Design and Implementation on FPGA Board of a Chaos-based Stream Cipher.
ICITST
(2020)
Khalid Mohamed
,
Suleiman Ali
,
Soilahoudini Ali
,
Ilyas Kassim
Performance Evaluation of RPL and DODAG Formations for IoTs Applications.
ICITST
(2020)
Mohammad Al-Fawa'reh
,
Amal Saif
,
Mousa Tayseer Jafar
,
Ammar Elhassan
Malware Detection by Eating a Whole APK.
ICITST
(2020)
Wai Kok Chan
,
Ji-Jian Chin
,
Vik Tor Goh
Evolution of Bitcoin Addresses from Security Perspectives.
ICITST
(2020)
Kitty Kioskli
,
Nineta Polemi
Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates.
ICITST
(2020)
Chunxiao Yang
,
Ina Taralova
,
Jean-Jacques Loiseau
,
Safwan El Assad
A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator.
ICITST
(2020)
Loreen Mahmoud
,
Raja Praveen
Network Security Evaluation Using Deep Neural Network.
ICITST
(2020)
Mohammad Masum
,
Hossain Shahriar
TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection.
ICITST
(2020)
Huangxiaolie Liu
,
Dong Zhang
,
Huijun Chen
Towards robust classification detection for adversarial examples.
ICITST
(2020)
Jong-Jin Kim
,
Sang-Gil Lee
,
Cheol-Hoon Lee
Real-Time supports on Tablet PC Platforms.
ICITST
(2020)
Sook-Yan Hue
,
Nor Haniza Sarmin
,
Eddie Shahril Ismail
,
Ji-Jian Chin
Easy Simple Factoring-based Digital Signature Scheme.
ICITST
(2020)
Ezekiel Uzor Okike
,
Gofaone Mogapi
A Pedagogic Analysis of Information Systems Security Measures in Online Services.
ICITST
(2020)
Felix Larbi Aryeh
,
Boniface Kayode Alese
A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy.
ICITST
(2020)
Zein Ashi
,
Laila Aburashed
,
Mohammad Al-Fawa'reh
,
Malik Qasaimeh
Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning.
ICITST
(2020)
Luca Deri
,
Daniele Sartiano
Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis.
ICITST
(2020)
Raadhesh Kannan
,
Ji-Jian Chin
,
Xiaoning Guo
Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API.
ICITST
(2020)
Dhruva Hunusekattte
Smart Parking With Automated Billing System.
ICITST
(2020)
Ali Raya
,
K. Mariyappn
Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study.
ICITST
(2020)
15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020
ICITST
(2020)
2017
Ferda Ernawan
,
Muhammad Nomani Kabir
,
Zuriani Mustaffa
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection.
ICITST
(2017)
W. P. Yuen
,
K. B. Chuah
Data visibility and trust enhancement of enterprise customers in cloud computing services.
ICITST
(2017)
Philip McShane
,
Darryl Stewart
Challenge based visual speech recognition using deep learning.
ICITST
(2017)
Elizabeth Healy
,
Husna Siddiqui
,
Aspen Olmsted
Classifying influenza outbreaks by analyzing and filtering Twitter data.
ICITST
(2017)
Seamus Dowling
,
Michael Schukat
,
Hugh Melvin
Using analysis of temporal variances within a honeypot dataset to better predict attack type probability.
ICITST
(2017)
Haya Alshehri
,
Farid Meziane
The influence of advanced and secure e-commerce environments on customers behaviour: The case of Saudis in the UK.
ICITST
(2017)
Basil Alothman
,
Prapa Rattadilok
Towards using transfer learning for Botnet Detection.
ICITST
(2017)
Thomas Zefferer
,
Dominik Ziegler
,
Andreas Reiter
Best of two worlds: Secure cloud federations meet eIDAS.
ICITST
(2017)
Thomas Nash
,
Aspen Olmsted
shinySDM: Point and click species distribution modeling.
ICITST
(2017)
Igor Ivkic
,
Markus Gerhard Tauber
,
Alexander Wöhrer
Towards comparing programming paradigms.
ICITST
(2017)
Clara Bertolissi
,
Omar Boucelma
,
Worachet Uttha
Enhancing security in the cloud: When traceability meets access control.
ICITST
(2017)
Faisal Alotaibi
,
Steven Furnell
,
Ingo Stengel
,
Maria Papadaki
Enhancing cyber security awareness with mobile games.
ICITST
(2017)
Chatipot Srimuang
,
Nagul Cooharojananone
,
Uthai Tanlamai
,
Achara Chandrachai
,
Kanokwan Atchariyachanvanich
The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM.
ICITST
(2017)
Alaa Altorbaq
,
Fredrik Blix
,
Stina Sorman
Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR.
ICITST
(2017)
Roland Pellegrini
,
Patrick Rottmann
,
Georg Strieder
Preventing vendor lock-ins via an interoperable multi-cloud deployment approach.
ICITST
(2017)
Anna V. Sandifer
,
Casey Wilson
,
Aspen Olmsted
Detection of fake online hotel reviews.
ICITST
(2017)
Husna Siddiqui
,
Aspen Olmsted
,
Brendan Keane
Venmo: Exposing a user's lifestyle.
ICITST
(2017)
Enrico Malfa
Keynote speaker 6: Steel made in Europe: The backbone of sustainability.
ICITST
(2017)
Marwa Saidi
,
Houcemeddine Hermassi
,
Rhouma Rhouma
,
Safya Belghith
LSB-hamming based chaotic steganography (LH-Steg).
ICITST
(2017)
Ahana Roy
,
Aspen Olmsted
Distributed query processing and data sharing.
ICITST
(2017)
Fredrik Blix
,
Salah Addin Elshekeil
,
Saran Laoyookhong
Data protection by design in systems development: From legal requirements to technical solutions.
ICITST
(2017)
Kouya Tochikubo
Multiple assignment secret sharing scheme using hierarchical threshold scheme.
ICITST
(2017)