Stop the war!
Остановите войну!
for scientists:
default search action
IAS 2013: Gammarth, Tunisia
- 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia, December 4-6, 2013. IEEE 2013, ISBN 978-1-4799-2989-4
- Ala Balti, Mounir Sayadi, Farhat Fnaiech:
Finger verification Using SVD features. 1-5 - Pardis Pourghomi, Muhammad Qasim Saeed, Gheorghita Ghinea:
Trusted integration of cloud-based NFC transaction players. 6-12 - Markus Graube, Patricia Órtiz, Manuel Carnerero, Óscar Lázaro, Mikel Uriarte, Leon Urbas:
Flexibility vs. security in linked enterprise data access control graphs. 13-18 - Radoniaina Andriatsimandefitra, Thomas Saliou:
Information flow policies vs malware. 19-24 - Andrey Sapegin, David Jaeger, Amir Azodi, Marian Gawron, Feng Cheng, Christoph Meinel:
Hierarchical object log format for normalisation of security events. 25-30 - Wei Ding, Khoa Le, Shou-Hsuan Stephen Huang:
Detecting stepping-stones under the influence of packet jittering. 31-36 - Hamdi Eltaief, Ali El Kamel, Habib Youssef:
ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication. 37-42 - Jorge Aguila Vila, Jetzabel Serna-Olvera, Luis Fernandez, Manel Medina, Andreas Sfakianakis:
A professional view on ebanking authentication: Challenges and recommendations. 43-48 - Florian Arnold, Wolter Pieters, Mariëlle Stoelinga:
Quantitative penetration testing with item response theory. 49-54 - Gianpiero Costantino, Fabio Martinelli, Daniele Sgandurra:
How to grant less permissions to facebook applications. 55-60 - Gianpiero Costantino, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra:
Towards enforcing on-the-fly policies in BYOD environments. 61-65 - Lulu Liang, Wang Ren, Jing Song, Huaming Hu, Qiang He, Shuo Fang:
The state of the art of risk assessment and management for information systems. 66-71 - Raihana Syahirah Abdullah, M. A. Faizal, Zul Azri Muhamad Noh, Siti Rahayu Selamat, Mohd Zaki Mas'ud, Shahrin Sahib:
Enhanced P2P botnets detection framework architecture with hybrid analyzer: Host-based and network-based. 72-77 - Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Robiah Yusof, Rabiah Ahmad:
Profiling mobile malware behaviour through hybrid malware analysis approach. 78-84 - Faten Chaabane, Maha Charfeddine, Chokri Ben Amar:
A survey on digital tracing traitors schemes. 85-90 - Priyank Jain, Neelam Pathak, Pratibha Tapashetti, A. S. Umesh:
Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition. 91-95 - Shilpa Srivastava, Namrata Agarwal, Millie Pant, Ajith Abraham:
A secured model for Indian e-health system. 96-101 - Ahlem Walha, Ali Wali, Adel M. Alimi:
A system of abnormal behaviour detection in aerial surveillance. 102-107 - Yassine Aribi, Ali Wali, Adel M. Alimi:
An intelligent system for video events detection. 108-113 - V. Gayoso Martínez, Luis Hernández Encinas:
Developing ECC applications in Java Card. 114-120 - Dhekra Bousnina, Ridha Ejbali, Mourad Zaied, Chokri Ben Amar:
A wavelet network speech recognition system to control an augmented reality object. 121-124
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.