


default search action
ICCST 2019: Chennai, India
- Gordon L. Thomas, Mala John:

2019 International Carnahan Conference on Security Technology, ICCST 2019, Chennai, India, October 1-3, 2019. IEEE 2019, ISBN 978-1-7281-1577-1 - Vladimir Smejkal

, Boris Oniscenko, Jindrich Kodl, Petr Tesar:
Influence of hypoxia on the stability of the dynamic biometric signature. 1-6 - Daniela Buser, Yanik Sterchi, Adrian Schwaninger:

Effects of Time on Task, Breaks, and Target Prevalence on Screener Performance in an X-ray Image Inspection Task. 1-6 - Heinz Hertlein, Aladdin M. Ariyaeeinia, Zoe Jeffrey

, Soodamani Ramalingam
:
Effectiveness in the Realisation of Speaker Authentication. 1-5 - Simon Attfield, Nallini Selveraj, Neesha Kodagoda, Peter J. Passmore, Elke Dunke:

Patterns of Life Visualiations for Intelligence Analysis: Exploring Animation with POLAR. 1-6 - Anas Husseis

, Judith Liu-Jimenez, Ines Goicoechea-Telleria, Raul Sánchez-Reillo:
A Survey in Presentation Attack and Presentation Attack Detection. 1-13 - Shilpa Thakur

, Ajay Singh:
Ergodic Secrecy Capacity in Nakagami-m Fading Channels. 1-3 - Iman Sharafaldin, Arash Habibi Lashkari

, Saqib Hakak
, Ali A. Ghorbani:
Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy. 1-8 - Vasu Sethia, A. Jeyasekar

:
Malware Capturing and Analysis using Dionaea Honeypot. 1-4 - T. Nathezhtha, Sangeetha Dhamodaran

, Vaidehi V.:
WC-PAD: Web Crawling based Phishing Attack Detection. 1-6 - Laya Taheri, Andi Fitriah Abdul Kadir

, Arash Habibi Lashkari
:
Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls. 1-8 - Purushotham Parthiban Parthy, Gowthamaraj Rajendran

:
Identification and prevention of social engineering attacks on an enterprise. 1-5 - S. Abijah Roseline, A. D. Sasisri, S. Geetha

, C. Balasubramanian
:
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique. 1-6 - Lucindia Dupak, Subhasish Banerjee:

Role of Bio-Inspired Algorithms for Designing Protocols in MANET-Review. 1-6 - Justin Joseph

, Saumya Bhadauria:
Cookie Based Protocol to Defend Malicious Browser Extensions. 1-6 - Miguel A. Ferrer

, Moisés Díaz
, Cristina Carmona-Duarte
, Réjean Plamondon:
Generating Off-line and On-line Forgeries from On-line Genuine Signatures. 1-6 - Rishu Raj, Soumya Michael, D. Femi:

Forest Monitoring System through RFID and Tensorflow Object Detection. 1-4 - Barbara Corsetti, Raul Sánchez-Reillo, Richard M. Guest, Marco Santopietro:

Face Image Analysis in Mobile Biometric Accessibility Evaluations. 1-5 - N. Divya:

Image Specific Similar Target Detection in Aerial Images Using Gaussian Mixture Model. 1-5 - Ines Goicoechea-Telleria, Kiyoshi Kiyokawa, Anas Husseis

, Judith Liu-Jimenez, Raul Sánchez-Reillo:
Fingerprint Presentation Attack Detection: Multispectral imaging with a narrow-band camera using Bag of Features. 1-6 - K. Kirutika, V. Vetri Selvi, Ranjani Parthasarathi, G. Subrahmanya V. R. K. Rao:

Controller Monitoring System In Software Defined Networks Using Random Forest Algorithm. 1-6 - Kwasi Boakye-Boateng

, Arash Habibi Lashkari
:
Securing GOOSE: The Return of One-Time Pads. 1-8 - M. G. Padmashree, J. S. Arunalatha, K. R. Venugopal:

HPAKE: Hybrid Precocious Authentication and Key Establishment in IoT. 1-6 - Gowthamaraj Rajendran

, R. S. Ragul Nivash, Purushotham Parthiban Parthy, S. Balamurugan:
Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures. 1-6 - K. Venkatesh, K. Pratibha, Suganya Annadurai, Lakshmi Kuppusamy

:
Reconfigurable Architecture to Speed-up Modular Exponentiation. 1-6 - Dillibabu Shanmugam

, Suganya Annadurai, Rajagopalan Vijayasarathy, T. Venkatesh Prasad:
Denial of Service Detection System on various platforms. 1-12 - M. Vincent, P. Arumugam, G. Prabhakara Rao:

Interior Intrusion Detection System. 1-4 - T. A. Mohanaprakash

, J. Andrews:
Novel privacy preserving system for Cloud Data security using Signature Hashing Algorithm. 1-6 - Balaraja Lavanya

, V. ThamizhThendral:
A novel data ciphering method for secure cloud storage. 1-6 - Bobba Basaveswara Rao, Suneetha Bulla, Gangadhara Rao Kancherla, K. Chandan:

HRF (HTTP Request Filtering): A New Detection Mechanism of EDoS Attack on Cloud. 1-7 - Divyans Mahansaria

, Uttam Kumar Roy:
Secure Authentication for ATM transactions using NFC technology. 1-5 - K. B. Sarmila

, S. V. Manisekaran:
A Study on Security Considerations in IoT Environment and Data Protection Methodologies for Communication in Cloud Computing. 1-6 - Wendy Ponce-Hernandez, Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Judith Liu-Jimenez:

Template protection approaches: Fuzzy Vault scheme. 1-5 - Sabbir Ahmed, Tamkin Mahmud Tan, Anna Mary Mondol, Zawad Alam, Noshin Nawal

, Jia Uddin
:
Automated Toll Collection System Based on RFID Sensor. 1-3 - Roopa Ravish

, Varun R. Gupta, K. J. Nagesh, Amruth Karnam, Shanta Rangaswamy
:
Software Implementation of an Automatic Movable Road Barrier. 1-6 - Raul Garcia-Martin

, Raul Sánchez-Reillo, J. Enrique Suarez Pascual:
Wrist Vascular Biometric Capture Using a Portable Contactless System. 1-6 - Michael Rhead, Soodamani Ramalingam

, Robert Gurney, William E. Martin
, Andrew Jones:
Implications of the Method of Construction of UK Number Plates for Infrared Reflectance and Camera Settings on ANPR System. 1-5 - Manthan Prajapati, Dharmesh Dave:

Host-based Forensic Artefacts of Botnet Infection. 1-4 - Atieh Merikh Nejadasl, Mahmoud Chizari

:
Using finger for touchscreen devices; is it safe? 1-3 - K. Shruthi, P. S. Chinmayi:

Android Device or a Privacy Compromise? 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














