default search action
11th ICITST 2016: Barcelona, Spain
- 11th International Conference for Internet Technology and Secured Transactions, ICITST 2016, Barcelona, Spain, December 5-7, 2016. IEEE 2016, ISBN 978-1-908320-73-5
- Steven Furnell, Charles A. Shoniregun:
Welcome message. 3 - Martin Visser:
Keynote speaker 1: Critical Infrastructures SMART ready? 15 - Jorge Lopez Hernandez-Ardieta:
Keynote speaker 2: Cyber ranges: The (r)evolution in cybersecurity training. 16-17 - Óscar Corcho:
Keynote speaker 3: Open Data city portals: Working towards their homogeneisation. 18 - Sandra Stincic Clarke:
Keynote speaker 4: Data silos of the IoT kind. 19 - Carles Antón-Haro:
Invited speaker (IEEE Spain section professional activities): Scientific resumes and job interviews - how to make (a positive) impact. 20
Special Session: Chaos-Data Protection and Hiding in Multimedia Communications (C-DPH-MC)
- Ons Jallouli, Safwan El Assad, Maryline Chetto:
Robust chaos-based stream-cipher for secure public communication channels. 23-26 - Cynthia Lizbeth Guzman-Candelario, Jose Juan Garcia-Hernandez, Loreto Gonzalez-Hernandez:
A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack. 27-32 - Oleg Garasym, Ina Taralova, René Lozi:
Key requirements for the design of robust chaotic PRNG. 33-38 - Gerard Vidal, Rabei Bechikh, Rhouma Rhouma, Safya Belghith:
A commercial application of a chaos-based-stream cipher: Performance and Security analysis. 39-44
Workshops
Workshop 1: Cloud Applications and Security (CAS'16)
- Amina Djellalbia, Nadjib Badache, Souad Benmeziane, Sihem Bensimessaoud:
Anonymous authentication scheme in e-Health Cloud environment. 47-52 - S. Srinivasan:
Data privacy concerns involving cloud. 53-56 - Yi Hu, Dustin Sulek, Anthony Carella, Joshua Cox, Allyson Frame, Karen Cipriano:
Employing miniaturized computers for distributed vulnerability assessment. 57-61
Workshop 2: 4th International workshop on Big Data and Social Networking Management and Security
- Mohamed A. Nassar, Layla A. A. El-Sayed, Yousry Taha:
Efficient parallel Stochastic Gradient Descent for matrix factorization using GPU. 63-68 - Aasim Rafique, Shoaib Azam, Moongu Jeon, Sangwook Lee:
Face-deidentification in images using Restricted Boltzmann Machines. 69-73 - Hlib Mykhailenko, Giovanni Neglia, Fabrice Huet:
Which metrics for vertex-cut partitioning? 74-79 - Sihem Bensimessaoud, Nadjib Badache, Souad Benmeziane, Amina Djellalbia:
An enhanced approach to preserving privacy in social network data publishing. 80-85
Workshop 2: 4th International workshop on Big Data and Social Networking Management and Security 86 (BDSN-2016), Part II
- Lo'ai Ali Tawalbeh, Turki F. Al-Somani, Hilal Houssain:
Towards secure communications: Review of side channel attacks and countermeasures on ECC. 87-91 - Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Mohammed A. Shehab, Yaser Jararweh, Bernard J. Jansen:
Using the Panama Papers to explore the financial networks of the Middle East. 92-97 - Mohammad Al-Smadi, Omar Qawasmeh, Bashar Talafha, Mahmoud Al-Ayyoub, Yaser Jararweh, Elhadj Benkhelifa:
An enhanced framework for aspect-based sentiment analysis of Hotels' reviews: Arabic reviews case study. 98-103 - Leandro Ordoñez-Ante, Thomas Vanhove, Gregory van Seghbroeck, Tim Wauters, Filip De Turck:
Interactive querying and data visualization for abuse detection in social network sites. 104-109
Sessions
Session 1: Information Security
- Robin Fay, Christoph Ruland:
Compressive Sensing encryption modes and their security. 119-126 - Neyire Deniz Sarier:
Efficient biometric-based Encryption for fingerprints. 127-132 - Prathap Siddavaatam, Reza Sedaghat, Min Hsuan Cheng:
An adaptive security framework with extensible computational complexity for cipher systems. 133-140
Session 2: Cyber Security
- Roberto Nardone, Ricardo J. Rodríguez, Stefano Marrone:
Formal security assessment of Modbus protocol. 142-147 - Alex M. S. Orozco, Charles V. Neu, Regio A. Michelin, Avelino F. Zorzo:
Security analysis of forwarding strategies in network time measurements using Openflow. 148-153 - Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki:
A survey of cyber-security awareness in Saudi Arabia. 154-158 - Alessandro Greco, Alberto Caponi, Giuseppe Bianchi:
Facing lateral movements using widespread behavioral probes. 159-160
Session 3: Cloud Security
- Louis Tajan, Dirk Westhoff, Christian A. Reuter, Frederik Armknecht:
Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing. 162-169 - Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera:
Range query integrity in the cloud: the case of video surveillance. 170-175 - Kheng Kok Mar, ZhengQing Hu, Chee Yong Law, Meifen Wang:
Secure cloud distributed file system. 176-181 - Antonis Michalas:
Sharing in the rain: Secure and efficient data sharing for the Cloud. 182-187
Session 4: Information Security
- Neamah Al-Naffakh, Nathan L. Clarke, Paul Dowland, Fudong Li:
Activity Recognition using wearable computing. 189-195 - Zakia El Uahhabi, Hanan El Bakkali:
An approach for evaluating trust in X.509 certificates. 196-203 - Asad Masood Khattak, Farkhund Iqbal, Patrick C. K. Hung, Jwo-Shiun Sun, Guan-Pu Pan, Jing-Jie Lin:
Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD). 204-209 - Charles V. Neu, Avelino F. Zorzo, Alex M. S. Orozco, Regio A. Michelin:
An approach for detecting encrypted insider attacks on OpenFlow SDN Networks. 210-215
Session 5: Internet Application and Technology
- Murizah Kassim, Nor Azura Ayop:
Adaptive Policing Algorithms on inbound internet traffic using Generalized Pareto model. 217-222 - Dennis M. Lupiana, Fredrick Mtenzi:
KiCM: A knowledge-intensive context model. 223-229 - Aspen Olmsted:
Modeling cloud applications for partition contingency. 230-234 - Gozde Ozcan, Sule Gündüz Ögüdücü:
Applying different classification techniques in reciprocal job recommender system for considering job candidate preferences. 235-240
Session 6: Cyber Security
- Sanjay Kumar, Ari Viinikainen, Timo Hämäläinen:
Machine learning classification model for Network based Intrusion Detection System. 242-249 - Moses Moyo, Marianne Loock:
South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review. 250-254 - Tiago Vieira, Carlos Serrão:
Web security in the finance sector. 255-259 - Jarkko Kuusijärvi, Reijo Savola, Pekka Savolainen, Antti Evesti:
Mitigating IoT security threats with a trusted Network element. 260-265
Session 7: Digital Forensics
- Khawla Alghafli, Thomas Martin:
Identification and recovery of video fragments for forensics file carving. 267-272 - Tomas Marques-Arpa, Jordi Serra-Ruiz:
PRS signal in acquiring evidence of Digital Chain of Custody. 273-278 - Gaseb Alotibi, Nathan L. Clarke, Fudong Li, Steven Furnell:
User profiling from network traffic via novel application-level interactions. 279-285
Session 8: Multimedia and Web Services
- Radu Velea, Noel Gordon:
Comparison of color profile gamut coverage for computer monitors. 287-290 - Emad Al-Mohammed, Nigel Linge:
A generic, personalized electronic program guide system for accessing multiple online TV providers. 291-296 - Madeline Little, Aspen Olmsted:
Temporal resource scheduling equity. 297-299
Session 9: Wireless and Sensor Networks
- Aymen J. Salman, Adil Al-Yasiri:
Developing Domain-Specific Language for Wireless Sensor Network application development. 301-308 - Nouredine Seddiki, Amel Douli:
Maximizing the wireless sensor networks lifetime. 309-312 - Adnan Ahmed, Pardeep Kumar, Ali Raza Bhangwar, Muhammad Ibrahim Channa:
A secure and QoS aware routing protocol for Wireless Sensor Network. 313-317 - Tasneem Salah, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi:
The evolution of distributed systems towards microservices architecture. 318-325 - Aiman Ghannami, Chenxi Shao:
Experience-based learning for identifying sub-regions in Wireless Sensor Networks. 326-327
Session 10: Cyber Security
- Tiago Santos, Carlos Serrão:
Secure Javascript Object Notation (SecJSON) Enabling granular confidentiality and integrity of JSON documents. 329-334 - Sophia Moganedi, Njabulo Mkhonto, Jabu Mtsweni:
Evaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing services. 335-339 - Aneesha Sethi, Federica Paci, Gary B. Wills:
EEVi - framework for evaluating the effectiveness of visualization in cyber-security. 340-345
Session 11: Information Security
- Samaneh Rashidibajgan:
A trust structure for detection of sybil attacks in opportunistic networks. 347-351 - Mutlaq Jalimid Alotaibi, Steven Furnell, Nathan L. Clarke:
Information security policies: A review of challenges and influencing factors. 352-358 - Sean T. Miller, Curtis Busby-Earle:
The role of machine learning in botnet detection. 359-364 - Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features. 365-370
Session 12: Internet Application and Technology
- Aisha Suliaman Alazri:
Telecommunication traffic through submarine cables: Security and vulnerabilities. 372-375 - Pedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas, Thales Guimaraes Marques:
Virtualization technologies in web conferencing systems: A performance overview. 376-383 - Ilaria Torre, Frosina Koceva, Odnan Ref Sanchez, Giovanni Adorni:
A framework for personal data protection in the IoT. 384-391 - T. Nawrath, Daniel Fischer, Bernd Markscheffel:
Privacy-sensitive data in connected cars. 392-393
Session 13: Internet Application and Technology
- Andres Paz Sampedro, Shantanu Srivastava:
Cost to serve of large scale online systems. 395-398 - Chung Kwan Law, Wen Xie, Zheng Xu, Yi Dou, Chin Ting Yu, Henry C. B. Chan, Daniel Wai Kei Kwong:
System and Protocols for secure Intercloud Communications. 399-404 - Regio A. Michelin, Avelino F. Zorzo, Marcia B. Campos, Charles V. Neu, Alex M. S. Orozco:
Smartphone as a biometric service for web authentication. 405-408 - Mohammad Kamel Alomari:
Digital divide impact on e-voting adoption in middle eastern country. 409-412 - Norah Ahmed Almubairik, Gary B. Wills:
Automated penetration testing based on a threat model. 413-414
Session 14: Big Data and Ubi/Cloud Computing
- Seyed Mahdi Jameii, Mohsen Maadani:
Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks. 416-420 - Lotfi Hajjem, Salah Benabdallah:
An MMAS-GA for resource allocation in multi-cloud systems. 421-426 - Ibrahim Almarashdeh, Mutasem Alsmadi:
Heuristic evaluation of mobile government portal services: An experts' review. 427-431 - Aiman Ghannami, Chenxi Shao:
Efficient fast recovery mechanism in Software-Defined Networks: Multipath routing approach. 432-435
Session 15: RFID Security and Cryptography
- Benfilali Mostefa, Sofiane Boukli Hacene:
Adaptive image compression in wireless sensor networks. 437-441 - Isil Karabey, Gamze Akman:
A cryptographic approach for secure client - server chat application using public key infrastructure (PKI). 442-446 - Yousuf Alsalami, Chan Yeob Yeun, Thomas Martin, Majid Khonji:
Linear and differential cryptanalysis of small-sized random (n, m)-S-boxes. 447-454 - Belghachi Mohamed, Feham Mohamed:
Experimental evaluation of RPL protocol. 455-458 - Michal Kvet, Monika Vajsová:
Performance study of the index structures in audited environment. 459-464 - Gabriele Spenger, Jörg Keller:
Structural improvements of chaotic PRNG implementations. 465-470
Posters
- Takashi Amano, Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:
Gaze network extraction from bookmarks in accordance with search intentions. 472-473 - Daisuke Arakawa, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura:
Dynamically visualizing the relationships between Web pages depending on user's search viewpoints. 474-475 - Hiroki Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, Hiroaki Kaminaga, Youzou Miyadera:
Learning History Transition Graphs for understanding the programming learning situations. 476-477 - Niranjan Sivakumar, Maxime Crepel, Dominique Boullier:
Risk management in payment system architectures. 478
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.