Login / Signup
EST
2010
2013
2016
2019
2010
2019
Keyphrases
Publications
2019
Shi Pan
,
Farzin Deravi
Spatio-Temporal Texture Features for Presentation Attack Detection in Biometric Systems.
EST
(2019)
Thomas Truong
,
Jonathan Graf
,
Svetlana N. Yanushkevich
Hybrid Score- and Rank-Level Fusion for Person Identification using Face and ECG Data.
EST
(2019)
Zisu Liliana
Two, Three and Four Dimensional BB84: A Comparative Analysis Based on C# Simulation.
EST
(2019)
Charlie D. Frowd
,
Emma Portch
,
Abigail Killeen
,
Lydia Mullen
,
Alexander J. Martin
,
Peter J. B. Hancock
EvoFIT Facial Composite Images: A Detailed Assessment of Impact on Forensic Practitioners, Police Investigators, Victims, Witnesses, Offenders and the Media.
EST
(2019)
Samuel D. Baba
,
Supriya Yadav
,
Gareth Howells
SortAlgo-Metrics: Identification of Cloud-Based Server Via a Simple Algorithmic Analysis.
EST
(2019)
Supriya Yadav
,
Gareth Howells
Secure Device Identification Using Multidimensional Mapping.
EST
(2019)
Khattab M. Ali Alheeti
,
Muzhir Shaban Al-Ani
,
Klaus D. McDonald-Maier
Spreading Code Identification of Legal Drones in IoT Environment.
EST
(2019)
Jonathan Graf
,
Shawn Eastwood
,
Svetlana N. Yanushkevich
,
Reed Ferber
Risk Inference Models for Security Applications.
EST
(2019)
Kenneth Lai
,
Svetlana N. Yanushkevich
Multi-Metric Evaluation of Thermal-to-Visual Face Recognition.
EST
(2019)
Ramiro Sámano-Robles
MAC-PRY Cross-Layer Design for Secure Wireless Avionics Intra-Communications.
EST
(2019)
Zhihao Chen
,
Redouane Khemmar
,
Benoit Decoux
,
Amphani Atahouet
,
Jean-Yves Ertaud
Real Time Object Detection, Tracking, and Distance and Motion Estimation based on Deep Learning: Application to Smart Mobility.
EST
(2019)
Julian Murphy
,
Gareth Howells
,
Klaus D. McDonald-Maier
A Machine Learning Method For Sensor Authentication Using Hidden Markov Models.
EST
(2019)
Asad Ali
,
Nawal Alsufyani
,
Sanaul Hoque
,
Farzin Deravi
Gaze-based Presentation Attack Detection for Users Wearing Tinted Glasses.
EST
(2019)
P. Farkas
Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC Codes.
EST
(2019)
Sudarsini Tekkam Gnanasekar
,
Svetlana N. Yanushkevich
Face Attributes and Detection of Drug Addicts.
EST
(2019)
Tasmina Islam
,
Michael C. Fairhurst
Investigating the Effect of Writer Style, Age and Gender on Natural Revocability Analysis in Handwritten Signature Biometric.
EST
(2019)
Saleh Mulhem
,
Mouadh Ayache
,
Wael Adi
Mini-Block-Based Cipher Class for Physically Clone-Resistant Devices.
EST
(2019)
Eighth International Conference on Emerging Security Technologies, EST 2019, Colchester, UK, July 22-24, 2019
EST
(2019)
Amit Sardar
,
Bijoy Das
,
Dipanwita Roy Chowdhury
An Efficient Hardware Design for Combined AES and AEGIS.
EST
(2019)
Nicolas Ragot
,
Redouane Khemmar
,
Adithya Pokala
,
Romain Rossi
,
Jean-Yves Ertaud
Benchmark of Visual SLAM Algorithms: ORB-SLAM2 vs RTAB-Map.
EST
(2019)
Audrey Ledoux
,
Ngoc Bich Dao
,
Paul Lahmi
,
Mickaël Coustaty
Alphanumeric Glyphs Transformation Based on Shape Morphing: Context of Text.
EST
(2019)
O. Obi-Alago
,
Svetlana N. Yanushkevich
,
H. M. Wetherley
Detecting Thermal Face Signature Abnormalities.
EST
(2019)
Hamed Alsufyani
,
Sanaul Hoque
,
Farzin Deravi
Usability of Skin Texture Biometrics for Mixed-Resolution Images.
EST
(2019)
2017
Adedayo Odesile
,
Geethapriya Thamilarasu
Distributed intrusion detection using mobile agents in wireless body area networks.
EST
(2017)
Seventh International Conference on Emerging Security Technologies, EST 2017, Canterbury, United Kingdom, September 6-8, 2017
EST
(2017)
Supriya Yadav
,
Gareth Howells
Analysis of ICMetrics features/technology for wearable devices IOT sensors.
EST
(2017)
Emad Hamadaqa
,
Ayoub Mars
,
Wael Adi
,
Saleh Mulhem
Clone-resistant vehicular RKE by deploying SUC.
EST
(2017)
Alaa S. Al-Waisy
,
Rami Qahwaji
,
Stanley S. Ipson
,
Shumoos Al-Fahdawi
A multimodal biometrie system for personal identification based on deep learning approaches.
EST
(2017)
Adewale Adetomi
,
Godwin Enemali
,
Tughrul Arslan
Towards an efficient intellectual property protection in dynamically reconfigurable FPGAs.
EST
(2017)
Rohan Durve
,
Ahmed Bouridane
Windows 10 security hardening using device guard whitelisting and Applocker blacklisting.
EST
(2017)
Hongyuan Jing
,
Tanya Vladimirova
Novel algorithm for landmine detection using C-scan ground penetrating radar signals.
EST
(2017)
Yazeed Alkhurayyif
,
George R. S. Weir
Readability as a basis for information security policy assessment.
EST
(2017)
Vassilis Prevelakis
,
Wael Adi
LS-ARP: A lightweight and secure ARP.
EST
(2017)
Charity Brown
,
Charlie D. Frowd
,
Emma Portch
Tell me again about the face: Using repeated interviewing techniques to improve feature-based facial composite technologies.
EST
(2017)
Samaneh Shafee
,
Boshra Rajaei
A secure steganography algorithm using compressive sensing based on HVS feature.
EST
(2017)
Nicolas Sidere
,
Francisco Cruz
,
Mickaël Coustaty
,
Jean-Marc Ogier
A dataset for forgery detection and spotting in document images.
EST
(2017)
Atiku Abubakar
,
Bernardi Pranggono
Machine learning based intrusion detection system for software defined networks.
EST
(2017)
Melanie Pitchford
,
Danielle Green
,
Charlie D. Frowd
The impact of misleading information on the identifiability of feature-based facial composites.
EST
(2017)
Solomon Ogbomon Uwagbole
,
William J. Buchanan
,
Lu Fan
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.
EST
(2017)
Shi Pan
,
Farzin Deravi
Facial action units for presentation attack detection.
EST
(2017)
Emma Portch
,
Karen Logan
,
Charlie D. Frowd
Interviewing and visualisation techniques: Attempting to further improve EvoFIT facial composites.
EST
(2017)
Aristotle Onumo
,
Andrea J. Cullen
,
Irfan-Ullah Awan
Empirical study of the impact of e-government services on cybersecurity development.
EST
(2017)
Muhammad Yusof
,
Madihah Mohd Saudi
,
Farida Ridzuan
A new mobile botnet classification based on permission and API calls.
EST
(2017)
Mohamed Hassan
,
Lutta Pantaleon
An investigation into the impact of rooting android device on user data integrity.
EST
(2017)
David Zooker Zabib
,
Maoz Vizentovski
,
Alexander Fish
,
Osnat Keren
,
Yoav Weizman
Vulnerability of secured IoT memory against localized back side laser fault injection.
EST
(2017)
Adrian Stoica
,
Yumi Iwashita
,
Christopher Assad
,
Michael S. Ryoo
,
Gareth Howells
A holistic approach to interpreting human states in smart environments providing high quality of life.
EST
(2017)
Saleh Mulhem
,
Wael Adi
,
Ayoub Mars
,
Vassilis Prevelakis
Chaining trusted links by deploying secured physical identities.
EST
(2017)
Sotirios Chatzidimitriadis
,
Paul Oprea
,
Michael Gillham
,
Konstantinos Sirlantzis
Evaluation of 3D obstacle avoidance algorithm for smart powered wheelchairs.
EST
(2017)
John Gregor Fraser
,
Ahmed Bouridane
Have the security flaws surrounding BITCOIN effected the currency's value?
EST
(2017)
Amal Durou
,
Ibrahim Aref
,
Mosa Elbendak
,
Somaya Al-Máadeed
,
Ahmed Bouridane
Measuring and optimising performance of an offline text writer identification system in terms of dimensionality reduction techniques.
EST
(2017)