


default search action
ICCST 2018: Montreal, QC, Canada
- 2018 International Carnahan Conference on Security Technology, ICCST 2018, Montreal, QC, Canada, October 22-25, 2018. IEEE 2018, ISBN 978-1-5386-7931-9

- Pablo Fernández López, Kiyoshi Kiyokawa, Yang Wu, Judith Liu-Jimenez:

Influence of Walking Speed and Smartphone Position on Gait Recognition. 1-5 - Robin Riz à Porta, Yanik Sterchi, Adrian Schwaninger

:
Examining Threat Image Projection Artifacts and Related Issues: A Rating Study. 1-4 - Dongwan Shin

, Jiangfeng Sun:
An Empirical Study of SSL Usage in Android Apps. 1-5 - Basirudin Djamaluddin

, Ahmed Alnazeer, Farag Azzedin
:
Web Deception Towards Moving Target Defense. 1-5 - Vincent E. Urias, William M. S. Stout, Brian P. Van Leeuwen, Han Lin:

Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper. 1-5 - Jorge Sanchez-Casanova

, Ines Goicoechea-Telleria, Judith Liu-Jimenez, Raul Sánchez-Reillo:
Performing a Presentation Attack Detection on Voice Biometrics. 1-5 - Vincent E. Urias, Brian P. Van Leeuwen, William M. S. Stout, Han Lin:

Applying a Threat Model to Cloud Computing. 1-5 - Bhashyam Balaji

:
Quantum Radar: Snake Oil or Good Idea? 1-7 - C. M. Keith Harman:

MIMO Cable Guided Radar. 1-5 - William M. S. Stout, Brian P. Van Leeuwen, Vincent E. Urias, Julian Tuminaro, Spencer Schrock, Nomaan Dossaji:

Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of Moving Target Defenses. 1-5 - Rima Rana, Razieh Nokhbeh Zaeem, K. Suzanne Barber:

US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem. 1-5 - Saeed Shafiee Hasanabadi, Arash Habibi Lashkari

, Ali A. Ghorbani:
The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals. 1-6 - M. Phil Lowney, Hong Liu, Eugene Chabot:

Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics. 1-5 - Soodamani Ramalingam

, Fabio Garzia:
Facial Expression Recognition using Transfer Learning. 1-5 - Paloma Tirado-Martin

, Raul Sánchez-Reillo, Jongwon Park:
Effects of Data Reduction when using Gaussian Mixture Models in Unidimensional Biometric Signals. 1-5 - Fabio Garzia, Roberto Cusani, Francesco Borghini, Benedetta Saltini, Mara Lombardi

, Soodamani Ramalingam
:
Perceived Risk Assessment through Open-Source Intelligent Techniques for Opinion Mining and Sentiment Analysis: The Case Study of the Papal Basilica and Sacred Convent of Saint Francis in Assisi, Italy. 1-5 - Ana Ferreira

, Joana Muchagata:
TagUBig - Taming Your Big Data. 1-5 - Joana Muchagata

, Ana Ferreira
:
Translating GDPR into the mHealth Practice. 1-5 - Chiara Lunerti

, Richard M. Guest, Jon Baker
, Pablo Fernández López, Raul Sánchez-Reillo:
Sensing Movement on Smartphone Devices to Assess User Interaction for Face Verification. 1-5 - Omar Gutierrez

, Jeffreys J. Saavedra, Mayra Zurbarán, Augusto Salazar
, Pedro M. Wightman
:
User-Centered Differential Privacy Mechanisms for Electronic Medical Records. 1-5 - Bhashyam Balaji

, Duncan England:
Quantum Illumination: A Laboratory Investigation. 1-4 - Arash Habibi Lashkari

, Andi Fitriah Abdul Kadir
, Laya Taheri, Ali A. Ghorbani:
Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification. 1-7 - Andreas Walz, Axel Sikora:

Maximizing and Leveraging Behavioral Discrepancies in TLS Implementations using Response-Guided Differential Fuzzing. 1-5 - Attaullah Buriro

, Rutger Van Acker, Bruno Crispo
, Athar Mahboob:
AirSign: A Gesture-Based Smartwatch User Authentication. 1-5 - Fatma Al Maqbali, Chris J. Mitchell

:
Email-based Password Recovery - Risking or Rescuing Users? 1-5 - Zahid Akhtar

, João Monteiro, Tiago H. Falk
:
Adversarial Examples Detection Using No-Reference Image Quality Features. 1-5 - Christer J. Wilkinson:

Airport Staff Access Control: Biometrics at Last? 1-8 - Fabio Garzia, Mara Lombardi

, Mario Fargnoli, Soodamani Ramalingam
:
PSA-LOPA - A Novel Method for Physical Security Risk Analysis based on Layers of Protection Analysis. 1-5 - Nicanor García-Ospina, Juan Rafael Orozco-Arroyave

, Jesús Francisco Vargas-Bonilla
:
Speaker Verification System for Online Education Platforms. 1-5 - Ines Goicoechea-Telleria, Ana Garcia-Peral, Anas Husseis

, Raul Sánchez-Reillo:
Presentation Attack Detection Evaluation on Mobile Devices: Simplest Approach for Capturing and Lifting a Latent Fingerprint. 1-5 - Chaofan Wang, Michael Olson, Benjamin Sherman, Nyambuu Dorjkhand, Joseph Mehr, Shailesh Singh:

Enhanced Buried Perimeter Protection using A Fiber-Optic Target Classification Sensor. 1-5 - David Luong

, Bhashyam Balaji
, Chung Wai Sandbo Chang, Vadiraj Manjunath, Ananthapadmanabha Rao, Christopher M. Wilson
:
Microwave Quantum Radar: An Experimental Validation. 1-5 - William M. S. Stout:

Toward a Multi-Agent System Architecture for Insight & Cybersecurity in Cyber-Physical Networks. 1-5 - Vladimir Smejkal, Jindrich Kodl, Frantisek Hortai, Petr Tesar:

About the Abuse Options of the Dynamic Biometric Signature. 1-6 - Jalil Nourmohammadi-Khiarak

, Andrzej Pacut:
An Ear Anti-Spoofing Database with Various Attacks. 1-5 - Ann E. Speed, Bryana L. Woo, Camron G. Kouhestani, Jaclynn J. Stubbs, Gabriel C. Birch:

Human Factors in Security. 1-5 - Krystyna Ljubymenko, Milan Adamek:

Security Personnel of New Generation. 1-4 - Ana Ferreira

:
Why Ransomware Needs A Human Touch. 1-5 - Jaclynn J. Stubbs, Camron G. Kouhestani, Bryana L. Woo, Gabriel C. Birch:

Counter Unmanned Aerial System Security Education. 1-5 - Alessandro Di Federico, Pietro Fezzardi, Giovanni Agosta:

rev.ng: A Multi-Architecture Framework for Reverse Engineering and Vulnerability Discovery. 1-5 - Lindemberg Naffah Ferreira:

Comparing Brazilian Platforms for Monitoring Roads, Designed to Support Law Enforcement. 1-5 - George D. O'Mahony

, Philip J. Harris, Colin C. Murphy:
Analyzing the Vulnerability of Wireless Sensor Networks to a Malicious Matched Protocol Attack. 1-5 - Chaofan Wang, Michael Olson, Benjamin Sherman, Nyambuu Dorjkhand, Joseph Mehr, Shailesh Singh:

Reliable Leak Detection in Pipelines Using Integrated DdTS Temperature and DAS Acoustic Fiber-Optic Sensor. 1-5 - Meghan A. Galiardi, Stephen J. Verzi, Gabriel C. Birch, Jaclynn J. Stubbs, Bryana L. Woo, Camron G. Kouhestani:

Physical Security Assessment Using Temporal Machine Learning. 1-5 - Nicole Hättenschwiler, Sarah Merks, Adrian Schwaninger

:
Airport Security X-Ray Screening of Hold Baggage: 2D Versus 3D Imaging and Evaluation of an on-Screen Alarm Resolution Protocol. 1-5 - Miguel A. Ferrer

, Moisés Díaz
, Cristina Carmona-Duarte
, Rejean Plamondon:
A Biometric Attack Case Based on Signature Synthesis. 1-6 - Sarah Merks, Nicole Hättenschwiler, Melina Zeballos, Adrian Schwaninger

:
X-ray Screening of Hold Baggage: Are the Same Visual-Cognitive Abilities Needed for 2D and 3D Imaging? 1-5 - Armanas Povilionis

, Franco Arcieri, Maurizio Talamo, Indiraiith Viji Ananth, Christian H. Schunck
, Peter Rosengren, Jesper Thestrup
, Jutta G. Richter
, Agostino Chiaravalottik, Orazio Schillaci, Henrike Gappa, Carlos A. Velasco
:
Identity Management, Access Control and Privacy in Integrated Care Platforms: The PICASO Project. 1-5 - Anton Siser, Ladislav Maris

, David Rehak
, Witalis Pellowski
:
The use of Expert Judgement as the Method to Obtain Delay Time Values of Passive Barriers in the Context of the Physical Protection System. 1-5 - Pierpaolo Napolitano, Giuliano Rossi, Mara Lombardi

, Fabio Garzia, Massimo Ilariucci, Giuseppe Forino:
Threats Analysis and Security Analysis for Critical Infrastructures: Risk Analysis Vs. Game Theory. 1-5 - Ramon Blanco-Gonzalo, Barbara Corsetti, Ines Goicoechea-Telleria, Anas Husseis

, Judith Liu-Jimenez, Raul Sánchez-Reillo, Teodors Eglitis, Elakkiya Ellavarason, R. M. Guest, Chiara Lunerti
, M. Azimi, J. Khiarak, Salatiel Ezennaya-Gomez, Nicholas Whiskerd, R. Kuzu, Ebenezer Okoh:
Attacking a Smartphone Biometric Fingerprint System: A Novice's Approach. 1-5 - Jimmy Anderson Florez Zuluaga, Jesús Francisco Vargas-Bonilla

, José David Ortega Pabón, Carlos Mario Suarez Rios:
Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent Tools. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














