default search action
15th ICITST 2020: London, United Kingdom
- 15th International Conference for Internet Technology and Secured Transactions, ICITST 2020, London, United Kingdom, December 8-10, 2020. IEEE 2020, ISBN 978-1-913572-21-1
- Huangxiaolie Liu, Dong Zhang, Huijun Chen:
Towards robust classification detection for adversarial examples. 1-7 - Dhruva Hunusekattte:
Smart Parking With Automated Billing System. 1-5 - Zongchao Qiao, Ina Taralova, Safwan El Assad:
A Reliable Encryption Oriented Pseudo-chaotic Number Generator Using a Key Space Expandable Strategy. 1-5 - Song-Kyoo Amang Kim:
Toward Compact Data from Big Data. 1-5 - Felix Larbi Aryeh, Boniface Kayode Alese:
A Multi-layer Stack Ensemble Approach to Improve Intrusion Detection System's Prediction Accuracy. 1-6 - Mohammad Masum, Hossain Shahriar:
TL-NID: Deep Neural Network with Transfer Learning for Network Intrusion Detection. 1-7 - Saad Al-Ahmari, Karen Renaud, Inah Omoronyia:
Implement a Model for Describing and Maximising Security Knowledge Sharing. 1-4 - May Medhat, Menna Essa, Hend Faisal, Samir G. Sayed:
YARAMON: A Memory-based Detection Framework for Ransomware Families. 1-6 - Satoshi Kosakatani, Tetsutaro Uehara, Songpon Teerakanok:
Japan's Act on Wiretapping for Criminal Investigation: How the system is implemented and how it should be. 1-6 - Jong-Jin Kim, Sang-Gil Lee, Cheol-Hoon Lee:
Real-Time supports on Tablet PC Platforms. 1-7 - Ezekiel Uzor Okike, Gofaone Mogapi:
A Pedagogic Analysis of Information Systems Security Measures in Online Services. 1-6 - Loreen Mahmoud, Raja Praveen:
Network Security Evaluation Using Deep Neural Network. 1-4 - Ali Raya, K. Mariyappn:
Security and Performance of Elliptic Curve Cryptography in Resource-limited Environments: A Comparative Study. 1-8 - Fethi Dridi, Safwan El Assad, Carinelle Atamech, Wajih El Hadj Youssef, Mohsen Machhout:
Design and Implementation on FPGA Board of a Chaos-based Stream Cipher. 1-5 - Luca Deri, Daniele Sartiano:
Monitoring IoT Encrypted Traffic with Deep Packet Inspection and Statistical Analysis. 1-6 - Raadhesh Kannan, Ji-Jian Chin, Xiaoning Guo:
Adversarial Evasion Noise Attacks Against TensorFlow Object Detection API. 1-4 - Mohammad Al-Fawa'reh, Amal Saif, Mousa Tayseer Jafar, Ammar Elhassan:
Malware Detection by Eating a Whole APK. 1-7 - Fabian Schillinger, Christian Schindelhauer:
Partitioned Private User Storages in End-to-End Encrypted Online Social Networks. 1-8 - Tabisa Ncubukezi, Laban Mwansa, François Rocaries:
A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses. 1-6 - Khalid Mohamed, Suleiman Ali, Soilahoudini Ali, Ilyas Kassim:
Performance Evaluation of RPL and DODAG Formations for IoTs Applications. 1-7 - Sook-Yan Hue, Nor Haniza Sarmin, Eddie Shahril Ismail, Ji-Jian Chin:
Easy Simple Factoring-based Digital Signature Scheme. 1-4 - Kitty Kioskli, Nineta Polemi:
Measuring Psychosocial and Behavioural Factors Improves Attack Potential Estimates. 1-4 - Esau Bermudez, Djamel Fawzi Hadj Sadok:
Energy Consumption of a LoRaWAN Network using Jarvis Algorithm. 1-6 - Wai Kok Chan, Ji-Jian Chin, Vik Tor Goh:
Evolution of Bitcoin Addresses from Security Perspectives. 1-6 - Zein Ashi, Laila Aburashed, Mohammad Al-Fawa'reh, Malik Qasaimeh:
Fast and Reliable DDoS Detection using Dimensionality Reduction and Machine Learning. 1-10 - Harris Anthonio, Yvonne Hwei-Syn Kam:
A Shoulder-Surfing Resistant Colour Image-based Authentication Method Using Human Vision Perception with Spatial Frequency. 1-5 - Chunxiao Yang, Ina Taralova, Jean-Jacques Loiseau, Safwan El Assad:
A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.