default search action
Search dblp for Publications
export results for "toc:db/conf/sersc-isa/isa2010c.bht:"
@inproceedings{DBLP:conf/sersc-isa/Ahmad10, author = {Mushtaq Ahmad}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Security Risks of Cloud Computing and Its Emergence as 5th Utility Service}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {209--219}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_20}, doi = {10.1007/978-3-642-13365-7\_20}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/Ahmad10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/AlhabeebALS10, author = {Mohammed A. Alhabeeb and Abdullah Mohammed Almuhaideb and Phu Dung Le and Bala Srinivasan}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {A New Holistic Security Approach for Government Critical Systems: Flooding Prevention}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {249--264}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_25}, doi = {10.1007/978-3-642-13365-7\_25}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/AlhabeebALS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/AliK10, author = {Aftab Ali and Farrukh Aslam Khan}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {An Improved EKG-Based Key Agreement Scheme for Body Area Networks}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {298--308}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_29}, doi = {10.1007/978-3-642-13365-7\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/AliK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/AmiruzzamanAC10, author = {Md. Amiruzzaman and Mohammad Abdullah{-}Al{-}Wadud and Yoojin Chung}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {An Analysis of Syndrome Coding}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {37--50}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_5}, doi = {10.1007/978-3-642-13365-7\_5}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/AmiruzzamanAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/BalitanasK10, author = {Maricel O. Balitanas and Tai{-}Hoon Kim}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {{IPV6} Mobile Network Protocol Weaknesses and a Cryptosystem Approach}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {116--127}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_12}, doi = {10.1007/978-3-642-13365-7\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/BalitanasK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/BhattacharyyaCYLK10, author = {Debnath Bhattacharyya and Arijit Chakraborty and Feruza Sattarova Yusufovna and Young{-}Hun Lee and Tai{-}Hoon Kim}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Lane Design for Speed Optimization}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {97--107}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_10}, doi = {10.1007/978-3-642-13365-7\_10}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/BhattacharyyaCYLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/BhattacharyyaSRPAK10, author = {Debnath Bhattacharyya and A. Shrotri and S. C. Rethrekar and M. H. Patil and Farkhod A. Alisherov and Tai{-}Hoon Kim}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Biometric Authentication Using Infrared Imaging of Hand Vein Patterns}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {108--115}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_11}, doi = {10.1007/978-3-642-13365-7\_11}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/BhattacharyyaSRPAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ChaurasiaVT10, author = {Brijesh Kumar Chaurasia and Shekhar Verma and G. S. Tomar}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Infrastructure Aided Privacy Preserving-Authentication in VANETs}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {179--189}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_17}, doi = {10.1007/978-3-642-13365-7\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/ChaurasiaVT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ChenHS10, author = {Tien{-}Ho Chen and Han{-}Cheng Hsiang and Wei{-}Kuan Shih}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Security Improvement on a Remote User Authentication Scheme Using Smart Cards}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {9--16}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_2}, doi = {10.1007/978-3-642-13365-7\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/ChenHS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/GilaniZK10, author = {Syed Sherjeel Ahmad Gilani and Muhammad Zubair and Zeeshan Shafi Khan}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {225--232}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_22}, doi = {10.1007/978-3-642-13365-7\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/GilaniZK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/GiriBSJ10, author = {Debasis Giri and Prithayan Barua and P. D. Srivastava and Biswapati Jana}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {A Cryptosystem for Encryption and Decryption of Long Confidential Messages}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {86--96}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_9}, doi = {10.1007/978-3-642-13365-7\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/GiriBSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/GuptaKST10a, author = {Phalguni Gupta and Dakshina Ranjan Kisku and Jamuna Kanta Sing and Massimo Tistarelli}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {1--8}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_1}, doi = {10.1007/978-3-642-13365-7\_1}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/GuptaKST10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/HuangJGFZ10, author = {Xin Huang and Yang Jiang and Xiong Gao and Rong Fu and Tingting Zhang}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Sensor Aided Authentication}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {265--277}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_26}, doi = {10.1007/978-3-642-13365-7\_26}, timestamp = {Tue, 15 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/HuangJGFZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/IqbalKW10, author = {Mian Muhammad Waseem Iqbal and Firdous Kausar and Muhammad Arif Wahla}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Attacks on Bluetooth Security Architecture and Its Countermeasures}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {190--197}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_18}, doi = {10.1007/978-3-642-13365-7\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/IqbalKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/IsazaCLCL10, author = {Gustavo A. Isaza and Andr{\'{e}}s G. Castillo and Marcelo L{\'{o}}pez and Luis Fernando Castillo and Manuel L{\'{o}}pez}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Intrusion Correlation Using Ontologies and Multi-agent Systems}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {51--63}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_6}, doi = {10.1007/978-3-642-13365-7\_6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/IsazaCLCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/KhanKM10, author = {Muhammad Asif Khan and Firdous Kausar and Ashraf Masood}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Modified Anonymous Authentication Scheme with Enhanced Security for Wireless Communication}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {198--208}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_19}, doi = {10.1007/978-3-642-13365-7\_19}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/KhanKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/Kim10a, author = {Tai{-}Hoon Kim}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Pattern Recognition Using Artificial Neural Network: {A} Review}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {138--148}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_14}, doi = {10.1007/978-3-642-13365-7\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/Kim10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/LeeCK10, author = {Hae Young Lee and Tae Ho Cho and Hyung{-}Jong Kim}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {128--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_13}, doi = {10.1007/978-3-642-13365-7\_13}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/LeeCK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/LeePP10, author = {Kijeong Lee and Byungjoo Park and Gil{-}Cheol Park}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Tag {ID} Subdivision Scheme for Efficient Authentication and Security-Enhancement of {RFID} System in {USN}}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {64--71}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_7}, doi = {10.1007/978-3-642-13365-7\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/LeePP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/MohamadHD10, author = {Kamaruddin Malik Mohamad and Tutut Herawan and Mustafa Mat Deris}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Dual-Byte-Marker Algorithm for Detecting {JFIF} Header}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {17--26}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_3}, doi = {10.1007/978-3-642-13365-7\_3}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/MohamadHD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/MohamadHD10a, author = {Kamaruddin Malik Mohamad and Tutut Herawan and Mustafa Mat Deris}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Hiding Data in {JPEG} Using in-DQT Technique}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {27--36}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_4}, doi = {10.1007/978-3-642-13365-7\_4}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/MohamadHD10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/Mrabet10, author = {Nadia El Mrabet}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Fault Attacks against the Miller's Algorithm in Edwards Coordinates}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {72--85}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_8}, doi = {10.1007/978-3-642-13365-7\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/Mrabet10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/NaumanA10, author = {Mohammad Nauman and Tamleek Ali}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {{TOKEN:} Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {286--297}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_28}, doi = {10.1007/978-3-642-13365-7\_28}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/NaumanA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/RahimKM10, author = {Aneel Rahim and Zeeshan Shafi Khan and Fahad Bin Muhaya}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Performance Evaluation of Video Streaming in Vehicular Adhoc Network}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {220--224}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_21}, doi = {10.1007/978-3-642-13365-7\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/RahimKM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ShafiRMAS10, author = {Rehan Shafi and Aneel Rahim and Fahad Bin Muhaya and Shehzad Ashraf and Muhammad Sher}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Secure Mechanism for Handling Targeted Attacks in Infrastructure Based Wireless Mesh Networks}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {233--240}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_23}, doi = {10.1007/978-3-642-13365-7\_23}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/ShafiRMAS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ShiraziAII10, author = {Syed Noor{-}ul{-}Hassan Shirazi and Muhammad Asim and Muhammad Irfan and Nassar Ikram}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {{MPLS} Unleashed: Remedy Using {IPSEC} over {MPLS} {VPN}}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {241--248}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_24}, doi = {10.1007/978-3-642-13365-7\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/ShiraziAII10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/VeijalainenSK10, author = {Jari Veijalainen and Alexander Semenov and Jorma Kypp{\"{o}}}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Tracing Potential School Shooters in the Digital Sphere}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {163--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_16}, doi = {10.1007/978-3-642-13365-7\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/VeijalainenSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/WuSSH10, author = {Raymond Wu and Keisuke Seki and Ryusuke Sakamoto and Masayuki Hisada}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Knowledge-Base Semantic Gap Analysis for the Vulnerability Detection}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {278--285}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_27}, doi = {10.1007/978-3-642-13365-7\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/WuSSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/XiaoX10, author = {Zhifeng Xiao and Yang Xiao}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {PeerReview Analysis and Re-evaluation for Accountability in Distributed Systems or Networks}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {149--162}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_15}, doi = {10.1007/978-3-642-13365-7\_15}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/XiaoX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/YoukL10, author = {Sang{-}Jo Youk and Bong Keun Lee}, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Multi-agent Reinforcement Learning Model for Effective Action Selection}, booktitle = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, pages = {309--317}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7\_30}, doi = {10.1007/978-3-642-13365-7\_30}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sersc-isa/YoukL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sersc-isa/2010c, editor = {Samir Kumar Bandyopadhyay and Wael Adi and Tai{-}Hoon Kim and Yang Xiao}, title = {Information Security and Assurance - 4th International Conference, {ISA} 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {76}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13365-7}, doi = {10.1007/978-3-642-13365-7}, isbn = {978-3-642-13364-0}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/2010c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.