


default search action
9th ICITST 2014: London, UK
- 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014, London, United Kingdom, December 8-10, 2014. IEEE 2014, ISBN 978-1-908320-39-1

Workshops
Workshop 1: Chaos-Information Hiding and Security (C-IHS-2014)
- Mario Diego Munoz-Hernandez, Jose Juan Garcia-Hernandez, Miguel Morales-Sandoval

:
Study on the robustness to retyping attacks of fingerprinted digital documents in the frequential domain. 25-30 - Karol Desnos, Safwan El Assad, Aurore Arlicot, Maxime Pelcat, Daniel Ménard:

Efficient multicore implementation of an advanced generator of discrete chaotic sequences. 31-36 - Simona Petrakieva, Oleg Garasym, Ina Taralova

:
G-interval method for secure chaotic synchronization and information transmission. 37-42 - Daniel Caragata, Safwan El Assad, Kassem Ahmad:

Survey of network access security in UMTS/LTE networks. 43-46 - Zobeida Jezabel Guzman-Zavaleta

, Claudia Feregrino Uribe, Alejandra Menendez-Ortiz
, Jose Juan Garcia-Hernandez:
A robust audio fingerprinting method using spectrograms saliency maps. 47-52
Workshop 2: Cloud Applications and Security (CAS'14)
- Johann Betz, Dirk Westhoff:

C3-Sched - A cache covert channel robust cloud computing scheduler. 54-60 - Manuel Rudolph, Reinhard Schwarz, Christian Jung

:
Security policy specification templates for critical infrastructure services in the cloud. 61-66 - Oliver Pfaff, Sebastian Ries:

Avoiding security integration pitfalls in the cloud. 67-70
Sessions
Session 1: Infonomics, E-Technology, ICT developments and diffusion
- Mohammad Kamel Alomari

:
Towards E-democracy in the middle east: E-voting adoption. 73-77 - Nawaf Sulaiman Alharbi, Maria Papadaki

, Paul Dowland
:
Security challenges of E-government adoption based on end users' perspective. 78-82 - Dirk Burkhardt

, Kawa Nazemi
, Wilhelm Retz, Jörn Kohlhammer:
Visual explanation of government-data for policy making through open-data inclusion. 83-89 - Gilmini Dantanarayana, Prasad M. Jayaweera

:
Value oriented service designing for successful e-Health. 90-94
Session 2: Cloud Security
- Saurabh Kulkarni, Shayan Saha, Ryler Hockenbury:

Preserving privacy in sensor-fog networks. 96-99 - Suresh Kumar Aditya, Kavya Premkumar, R. Anitha

, Saswati Mukherjee:
Combined security framework for multi-cloud environment. 100-105 - Regio A. Michelin, Avelino F. Zorzo

, César A. F. De Rose
:
Mitigating DoS to authenticated cloud REST APIs. 106-111 - Pushpinder-Kaur Chouhan, Sakir Sezer, Yangseo Choi, Ikkyun Kim, Chunghwan Jung:

Secure virtualised environment. 112-117
Session 3: Internet Applications and Technology
- Brika Ammar, Fahima Nader:

Creation of educative content on the web. 119-124 - Aspen Olmsted

, RoxAnn H. Stalvey:
Highly available, consistent, business rule filters. 125-130 - Loubna El Faquih, Hanae Sbaï

, Mounia Fredj:
Semantic variability modeling in business processes: A comparative study. 131-136 - Udsanee Pakdeetrakulwong

, Pornpit Wongthongtham, Waralak V. Siricharoen
:
Recommendation systems for software engineering: A survey from software development life cycle phase perspective. 137-142
Session 4: Information Security
- Edina Hatunic-Webster, Fredrick Mtenzi

, Brendan O'Shea:
Model for analysing Anti-Phishing Authentication Ceremonies. 144-150 - Potchara Pruksasri, Jan van den Berg, Wout Hofman, Yao-Hua Tan:

Data concealing of supply chain transactions using the Distributed Trust Backbone. 151-156 - Dimitrios Kasiaras, Thomas Zafeiropoulos, Nathan L. Clarke

, Georgios Kambourakis:
Android forensics: Correlation analysis. 157-162 - Rafal Leszczyna, Michal R. Wróbel

:
Security information sharing for smart grids: Developing the right data model. 163-169
Session 5: Ubi/Cloud Computing
- Christian M. Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner:

ESTADO - Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online. 171-177 - Surabhi Mour, Priyansh Srivastava, Payal Patel, Hari Ram, Bhavesh N. Gohil, Dhiren R. Patel:

Load management model for cloud computing. 178-184 - Elarbi Badidi

:
A context broker federation for QoC-driven selection of cloud-based context services. 185-190 - Osama M. Ben Omran, Brajendra Panda:

A new technique to partition and manage data security in cloud databases. 191-196
Session 6: Internet Application and Technology
- Boniface Kayode Alese

, R. A. Akingbola, Folasade Mojisola Dahunsi, Olumide S. Adewale, T. J. Ogundele:
Improving deception in honeynet: Through data manipulation. 198-204 - Vincent Chan, Tony Hao Wu, Grantham Pang:

Decision support and data mining for direct consumer-to-consumer trading. 205-208 - Souad Sadki, Hanan El Bakkali:

PPAMH: A novel privacy-preserving approach for mobile healthcare. 209-214 - Sabah Al-Fedaghi

, Heba Al Meshari:
Characterizing social networks based on interior processes of nodes. 215-221
Session 7: Information Security
- Abdulrazaq Almutairi, David J. Parish:

Using classification techniques for creation of predictive intrusion detection model. 223-228 - Matej Kacic, Daniel Ovsonka, Petr Hanácek

, Maros Barabas:
Traffic generator based on behavioral pattern. 229-223 - Tiwalade Adelola, Ray Dawson, Firat Batmaz:

Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case. 234-239 - Nikolai Joukov, Vladislav Shorokhov

, Dmytro Tantsuyev:
Security audit of data flows across enterprise systems and networks. 240-247 - Eric Amankwa

, Marianne Loock, Elmarie Kritzinger
:
A conceptual analysis of information security education, information security training and information security awareness definitions. 248-252
Session 8: Internet Applications and Information Security
- Antonia Rana, Andrea Ciardulli:

Enabling consumers to self-verify authenticity of products. 254-255 - Mee Hong Ling, Kok-Lim Alvin Yau:

Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks. 256-261 - André A. Osti, Bruno Alves Pereira Botelho, Nelson Uto:

Implementation aspects of software guards: A case study. 262-267 - Pino Caballero-Gil

, Francisco Martín-Fernández, Cándido Caballero-Gil:
Using query frequencies in tree-based revocation for certificateless authentication in VANETs. 268-273 - Olusegun Ademolu Ajigini

, John A. van der Poll, Jan H. Kroeze
:
Towards a model on security challenges during closed source software to OSS migrations. 274-283
Session 9: Internet Application and Technology
- Fatiha Djebbar

, Beghdad Ayad:
Image hiding in speech spectrum. 285-287 - Bamidele Moses Kuboye

, Boniface Kayode Alese
, Olumide Sunday Adewale:
Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networks. 288-294 - Otasowie Iyare

, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese:
A replication model for students' result processing. 295-301 - Abrar Ullah, Hannan Xiao

, Trevor Barker
, Mariana Lilley
:
Graphical and text based challenge questions for secure and usable authentication in online examinations. 302-308
Session 10: Information Security
- Ivan Homoliak

, Daniel Ovsonka, Matej Grégr, Petr Hanácek
:
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic. 310-317 - Natalija Vlajic, Armin Slopek:

Performance and economies of 'bot-less' application-layer DDoS attacks. 318-323 - Norah S. Farooqi

, Siobhán North
:
Time cost evaluation of trust based access control for XML databases. 324-326 - Patrick Dressler, Daniel Fischer

, Bernd Markscheffel:
Software solutions for high-security voice and data communication for smartphones. 327-332
Session 11: Internet Applications, Technology, Multimedia and Web Services
- Rahul Kumar, Indraveni K, Aakash Kumar Goel:

Automation of detection of security vulnerabilities in web services using dynamic analysis. 334-336 - Seokhwan Yang, Jaechun Kim, Mokdong Chung:

A prediction model based on Big Data analysis using hybrid FCM clustering. 337-339 - Saleh Albahli

, Austin Melton:
ohStore: Ontology hierarchy solution to improve RDF data management. 340-348 - Hossain Shahriar

, Victor Clincy:
Detection of repackaged Android Malware. 349-354
Session 12: Information Security
- F. Y. Osisanwo, Adebayo O. Adetunmbi, Boniface Kayode Alese

:
Barefoot morphology: A person unique feature for forensic identification. 356-359 - Keisuke Kato, Vitaly Klyuev:

Large-scale network packet analysis for intelligent DDoS attack detection development. 360-365 - Wided Boubakri, Walid Abdallah, Noureddine Boudriga:

A chaos-based authentication and key management scheme for M2M communication. 366-371
Session 13: Information Security, Multimedia and Web Services
- L. A. Nwosu, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese

, Olumide Olayinka Obe:
An Attribute-Based Signature using rivest shamir adleman scheme. 380-386 - Boniface Kayode Alese

, O. Oyebade, A. Osuolale Festus, Otasowie Iyare
, Aderonke Favour-Bethy Thompson:
Evaluation of information security risks using hybrid assessment model. 387-395 - Omer Nawaz

, Tahir Nawaz Minhas, Markus Fiedler:
Optimal MTU for realtime video broadcast with packet loss - A QoE perspective. 396-401 - Omer K. Jasim Mohammad

, Safia Abbas
, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem:
Advanced encryption standard development based quantum key distribution. 402-408 - Shruti Kohli, Ankit Gupta

:
Modeling anonymous human behavior using social media. 409-412
Session 14: Information Security
- Muhammad Ali Yousuf

, Fatimah Y. Akeel, Nawfal F. Fadhel
, Gary B. Wills:
Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data. 414-419 - Fatimah Y. Akeel, Gary B. Wills, Andrew M. Gravell:

Exposing data leakage in Data Integration Systems. 420-425 - Igor Mishsky, Nurit Gal-Oz

, Ehud Gudes:
Computing domains reputation using flow. 426-431 - Ricardo Villalón-Fonseca, Braulio J. Solano-Rojas

, Gabriela Marín Raventós:
An applied methodology for information security and assurance: A study case for cloud computing. 432-439 - Christopher Morrell, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront:

Scaling IPv6 address bindings in support of a moving target defense. 440-445
Session 15: Internet Applications, Technology and Ubi/Cloud Computing
- M. T. Dlamini

, Jan H. P. Eloff, Mariki M. Eloff
:
CBAC4C: Conflict Based Allocation Control for Cloud. 447-448 - Abikoye Oluwakemi Christianah, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson, D. Alowolodu Olufunso, A. Osuolale Festus:

A robust multicast authentication scheme based on asymmetric key signature. 449-458 - Fahad Polash, Abdullah Abuhussein

, Sajjan G. Shiva:
A survey of cloud computing taxonomies: Rationale and overview. 459-465 - Fahad M. Alotaibi:

Architectural framework proposed of behavioural classroom simulation based second life environment. 466-470 - Pedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas:

Performance analysis of Hadoop MapReduce on an OpenNebula cloud with KVM and OpenVZ virtualizations. 471-476

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














