Search dblp for Publications

export results for "toc:db/conf/icitcs/icitcs2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icitcs/AbubakarJF15,
  author       = {Mustapha Yusuf Abubakar and
                  Low Tang Jung and
                  Oi Mean Foong},
  title        = {Two Channel Quantum Security Modelling Focusing on Quantum Key Distribution
                  Technique},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293032},
  doi          = {10.1109/ICITCS.2015.7293032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AbubakarJF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AdiBLH15,
  author       = {Erwin Adi and
                  Zubair A. Baig and
                  Chiou Peng Lam and
                  Philip Hingston},
  title        = {Low-Rate Denial-of-Service Attacks against {HTTP/2} Services},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292994},
  doi          = {10.1109/ICITCS.2015.7292994},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AdiBLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AdnanHOZS15,
  author       = {Ali I. Adnan and
                  Zurina Mohd Hanapi and
                  Mohamed Othman and
                  Zuriati Ahmad Zukarnain and
                  Abubakar Sadiq},
  title        = {A Reputation-Based Routing Protocol for Wireless Sensor Networks},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292931},
  doi          = {10.1109/ICITCS.2015.7292931},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AdnanHOZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AgrawalR15,
  author       = {Rashmi Agrawal and
                  Babu Ram},
  title        = {A Modified K-Nearest Neighbor Algorithm to Handle Uncertain Data},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292920},
  doi          = {10.1109/ICITCS.2015.7292920},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AgrawalR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AhmadRA15,
  author       = {Mifrah Ahmad and
                  Lukman Ab. Rahim and
                  Noreen Izza Arshad},
  title        = {Towards an Effective Modelling and Development of Educational Games
                  with Subject-Matter: {A} Multi-Domain Framework},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293027},
  doi          = {10.1109/ICITCS.2015.7293027},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AhmadRA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AhmadRA15a,
  author       = {Mifrah Ahmad and
                  Lukman Ab. Rahim and
                  Noreen Izza Arshad},
  title        = {Understanding Game Play Domain: An Interpretive Approach towards Modelling
                  Educational Games with Multi-Domain Framework},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293033},
  doi          = {10.1109/ICITCS.2015.7293033},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AhmadRA15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AlhussianZ15,
  author       = {Hitham Alhussian and
                  Nordin Zakaria},
  title        = {An Efficient Zero-Laxity Based Real-Time Multiprocessor Scheduling
                  Algorithm},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292943},
  doi          = {10.1109/ICITCS.2015.7292943},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AlhussianZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AliJ15,
  author       = {Munwar Ali and
                  Low Tang Jung},
  title        = {Confidentiality Based File Attributes and Data Classification Using
                  TsF-KNN},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292963},
  doi          = {10.1109/ICITCS.2015.7292963},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AliJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AlmomaniBMB15,
  author       = {Malek Ahmad Theeb Almomani and
                  Shuib Basri and
                  Ahmad Kamil Bin Mahmood and
                  Amos Orenyi Bajeh},
  title        = {Software Development Practices and Problems in Malaysian Small and
                  Medium Software Enterprises: {A} Pilot Study},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293018},
  doi          = {10.1109/ICITCS.2015.7293018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/AlmomaniBMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AnjumNA15,
  author       = {Shaik Shabana Anjum and
                  Rafidah Md Noor and
                  Mohammad Hossein Anisi},
  title        = {Survey on {MANET} Based Communication Scenarios for Search and Rescue
                  Operations},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293023},
  doi          = {10.1109/ICITCS.2015.7293023},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AnjumNA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Atchariyachanvanich15,
  author       = {Kanokwan Atchariyachanvanich and
                  Rungsiman Nararatwong and
                  Nagul Cooharojananone},
  title        = {An Exploratory Study on Users' Intention to Purchase Items from Mobile
                  Applications in Thailand},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292945},
  doi          = {10.1109/ICITCS.2015.7292945},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Atchariyachanvanich15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Atoum15,
  author       = {Mohammed Salem Atoum},
  title        = {New {MP3} Steganography Data Set},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292999},
  doi          = {10.1109/ICITCS.2015.7292999},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Atoum15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Baek15,
  author       = {Nakhoon Baek},
  title        = {Adding Advanced Debug Output Features to an Existing OpenGL {ES} 1.1
                  Implementation},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292938},
  doi          = {10.1109/ICITCS.2015.7292938},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Baek15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/BaekI15,
  author       = {Nakhoon Baek and
                  Byeonguk Im},
  title        = {Providing Preliminary Profiling Information for OpenGL {ES} 1.1 Application
                  Programs},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293011},
  doi          = {10.1109/ICITCS.2015.7293011},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/BaekI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/BaharudinADA15,
  author       = {Norzaidi Baharudin and
                  Fakariah Hani Mohd Ali and
                  Mohamad Yusof Darus and
                  Norkhushaini Awang},
  title        = {Wireless Intruder Detection System {(WIDS)} in Detecting De-Authentication
                  and Disassociation Attacks in {IEEE} 802.11},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293037},
  doi          = {10.1109/ICITCS.2015.7293037},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/BaharudinADA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/BarayugaY15,
  author       = {Vitruvius John D. Barayuga and
                  William Emmanuel S. Yu},
  title        = {Packet Level {TCP} Performance of NAT44, {NAT64} and IPv6 Using Iperf
                  in the Context of IPv6 Migration},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293006},
  doi          = {10.1109/ICITCS.2015.7293006},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/BarayugaY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/BehniaTH15,
  author       = {Rouzbeh Behnia and
                  Syh{-}Yuan Tan and
                  Swee{-}Huay Heng},
  title        = {On the Security of Two Pairing-Based Signature Schemes},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293002},
  doi          = {10.1109/ICITCS.2015.7293002},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/BehniaTH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Cegan15,
  author       = {Lukas Cegan},
  title        = {Intelligent Preloading of Websites Resources Based on Clustering Web
                  User Sessions},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292988},
  doi          = {10.1109/ICITCS.2015.7292988},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Cegan15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ChaitienTC15,
  author       = {Komchan Chaitien and
                  Chayaphon Tanwongvarl and
                  Soamsiri Chantaraskul},
  title        = {Adaptive Multichannel Approach for Congestion Control in Vehicular
                  Safety Communications},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292937},
  doi          = {10.1109/ICITCS.2015.7292937},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ChaitienTC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/CheongL15,
  author       = {Hon{-}Sang Cheong and
                  Wai{-}Kong Lee},
  title        = {Fast Implementation of Block Ciphers and PRNGs for Kepler {GPU} Architecture},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292982},
  doi          = {10.1109/ICITCS.2015.7292982},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/CheongL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ChoiLJY15,
  author       = {Jihyeon Choi and
                  Byung Jun Lee and
                  DongYoung Jung and
                  Hee Yong Youn},
  title        = {An SSD-Based Accelerator Using Partitioned Bloom Filter for Directory
                  Parsing},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292947},
  doi          = {10.1109/ICITCS.2015.7292947},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ChoiLJY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/DarASK15,
  author       = {Muhammad Najam Dar and
                  M. Usman Akram and
                  Arslan Shaukat and
                  Muazzam Ali Khan},
  title        = {{ECG} Based Biometric Identification for Population with Normal and
                  Cardiac Anomalies Using Hybrid {HRV} and {DWT} Features},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292977},
  doi          = {10.1109/ICITCS.2015.7292977},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/DarASK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/EoJLS15,
  author       = {Soowoong Eo and
                  Wooyeon Jo and
                  Seokjun Lee and
                  Taeshik Shon},
  title        = {A Phase of Deleted File Recovery for Digital Forensics Research in
                  Tizen},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292924},
  doi          = {10.1109/ICITCS.2015.7292924},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/EoJLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/EpishkinaK15,
  author       = {Anna Epishkina and
                  Konstantin Kogos},
  title        = {Covert Channels Parameters Evaluation Using the Information Theory
                  Statements},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292966},
  doi          = {10.1109/ICITCS.2015.7292966},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/EpishkinaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/FatimaAB15,
  author       = {Khush Naseeb Fatima and
                  M. Usman Akram and
                  Shafaat A. Bazaz},
  title        = {Papilledema Detection in Fundus Images Using Hybrid Feature Set},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293007},
  doi          = {10.1109/ICITCS.2015.7293007},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/FatimaAB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Ganatra15,
  author       = {Amit P. Ganatra},
  title        = {Information Fusion (Ensemble System) in Data Warehousing {\&}
                  Data Mining},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292987},
  doi          = {10.1109/ICITCS.2015.7292987},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Ganatra15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/GuKJS15,
  author       = {Sungdo Gu and
                  So Yeon Kim and
                  Hyun{-}hwan Jeong and
                  Kyung{-}Ah Sohn},
  title        = {Constructing and Exploiting Software Metrics Networks for Software
                  Quality Assessment},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292964},
  doi          = {10.1109/ICITCS.2015.7292964},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/GuKJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/GuKKMY15,
  author       = {Seunghoe Gu and
                  Jong{-}Hwan Kim and
                  Younghoon Kim and
                  Cheoleun Moon and
                  Ikjun Yeom},
  title        = {Controlled Queue Management in Software-Defined Networks},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292965},
  doi          = {10.1109/ICITCS.2015.7292965},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/GuKKMY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HalimAAA15,
  author       = {Shamimi A. Halim and
                  Muthukkaruppan Annamalai and
                  Mohd Sharifuddin Ahmad and
                  Rashidi Ahmad},
  title        = {Domain Expert Maintainable Inference Knowledge of Assessment Task},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292974},
  doi          = {10.1109/ICITCS.2015.7292974},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/HalimAAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HasegawaKNO15,
  author       = {Keisuke Hasegawa and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Eiji Okamoto},
  title        = {Software Implementation of Ciphertext-Policy Functional Encryption
                  with Simple Usability},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293020},
  doi          = {10.1109/ICITCS.2015.7293020},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/HasegawaKNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HassanQHW15,
  author       = {Shoaib Hassan and
                  Usman Qamar and
                  Taimoor Hassan and
                  Muhammad Waqas},
  title        = {Software Reverse Engineering to Requirement Engineering for Evolution
                  of Legacy System},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293021},
  doi          = {10.1109/ICITCS.2015.7293021},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HassanQHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HassanYY15,
  author       = {Nor Awani Che Hassan and
                  Kamaludin Mohamad Yusof and
                  Sharifah Kamilah Syed Yusof},
  title        = {Ranging Estimation Using Dual-Frequency Doppler Technique},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293012},
  doi          = {10.1109/ICITCS.2015.7293012},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/HassanYY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HongLL15,
  author       = {Ki{-}sung Hong and
                  Chulung Lee and
                  Kyungchul Lee},
  title        = {Dynamic Toll Pricing Model for an Intelligent Transportation System
                  with Individual High Occupancy Toll Lanes},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292976},
  doi          = {10.1109/ICITCS.2015.7292976},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/HongLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HuHLC15,
  author       = {Hwai{-}Tsu Hu and
                  Ling{-}Yuan Hsu and
                  Sheng{-}Yu Lai and
                  Yu{-}Jung Chang},
  title        = {The Use of Spectral Shaping to Extend the Capacity for DWT-Based Blind
                  Audio Watermarking},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293026},
  doi          = {10.1109/ICITCS.2015.7293026},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/HuHLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/IslamGAMG15,
  author       = {Md. Nazrul Islam and
                  Jaime Gallardo{-}Alvarado and
                  Othman bin Hj Ahmad and
                  Mazlina Binti Mamat and
                  B. K. Ghosh},
  title        = {Path Planning Algorithm for Manipulators Based on an Improved Backtracking
                  Search Algorithm},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293009},
  doi          = {10.1109/ICITCS.2015.7293009},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/IslamGAMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/JantaranusonC15,
  author       = {Boonyakorn Jantaranuson and
                  Nagul Cooharojananone},
  title        = {Background Subtraction from Auto-Exposure Surveillance Camera in Restaurant},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292957},
  doi          = {10.1109/ICITCS.2015.7292957},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/JantaranusonC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/JingYM15,
  author       = {Tee Wee Jing and
                  Wong Seng Yue and
                  Raja Kumar Murugesan},
  title        = {Learning Outcome Enhancement via Serious Game: Implementing Game-Based
                  Learning Framework in Blended Learning Environment},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292992},
  doi          = {10.1109/ICITCS.2015.7292992},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/JingYM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KanbaraTKNO15,
  author       = {Yusuke Kanbara and
                  Tadanori Teruya and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Eiji Okamoto},
  title        = {Software Implementation of a Pairing Function for Public Key Cryptosystems},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293019},
  doi          = {10.1109/ICITCS.2015.7293019},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KanbaraTKNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Kang15,
  author       = {Seung{-}Ho Kang},
  title        = {A Feature Selection Algorithm to Find Optimal Feature Subsets for
                  Detecting DoS Attacks},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292916},
  doi          = {10.1109/ICITCS.2015.7292916},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Kang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Kang15a,
  author       = {Sunyoung Kang},
  title        = {The Application of Healthcare Device for Exercise Prescription},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293025},
  doi          = {10.1109/ICITCS.2015.7293025},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Kang15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Kang15b,
  author       = {Seungae Kang},
  title        = {Trend of the Sports Convergence Technology for Health Promotion},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293030},
  doi          = {10.1109/ICITCS.2015.7293030},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Kang15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KangKWK15,
  author       = {Semin Kang and
                  Sung{-}Soo Kim and
                  Jongho Won and
                  Young{-}Min Kang},
  title        = {Bidirectional Constructive Crossover for Evolutionary Approach to
                  Travelling Salesman Problem},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292958},
  doi          = {10.1109/ICITCS.2015.7292958},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KangKWK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KangYPP15,
  author       = {Seungae Kang and
                  Kyungock Yi and
                  Soojung Park and
                  Bonsup Park},
  title        = {Applications of u-Fitness in Sports Field},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292951},
  doi          = {10.1109/ICITCS.2015.7292951},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KangYPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KebedeTS15,
  author       = {Alemu Molla Kebede and
                  Kaleab Getaneh Tefrie and
                  Kyung{-}Ah Sohn},
  title        = {Anonymous Author Similarity Identification},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292949},
  doi          = {10.1109/ICITCS.2015.7292949},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KebedeTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Kim15,
  author       = {Hye{-}Young Kim},
  title        = {An Effective Load Balancing Scheme Maximizes the Lifetime in Wireless
                  Sensor Networks},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292940},
  doi          = {10.1109/ICITCS.2015.7292940},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Kim15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimCK15,
  author       = {Hyoung{-}Gook Kim and
                  Hye{-}Seung Cho and
                  Jin Young Kim},
  title        = {{TV} Advertisement Search Based on Audio Peak-Pair Hashing in Real
                  Environments},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293031},
  doi          = {10.1109/ICITCS.2015.7293031},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimGJS15,
  author       = {So Yeon Kim and
                  Sungdo Gu and
                  Hyun{-}hwan Jeong and
                  Kyung{-}Ah Sohn},
  title        = {A Network Clustering Based Software Attribute Selection for Identifying
                  Fault-Prone Modules},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292921},
  doi          = {10.1109/ICITCS.2015.7292921},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimGJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimHK15,
  author       = {Dong{-}Hyun Kim and
                  Jun{-}Hwan Huh and
                  Jong{-}Deok Kim},
  title        = {Analysis of Broadcast Packet Loss for Unequal Loss Protection in Wi-Fi
                  Broadcasting System},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292948},
  doi          = {10.1109/ICITCS.2015.7292948},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimJSY15,
  author       = {Seung Wan Kim and
                  Young Gyo Jung and
                  Dong Ryeol Shin and
                  Hee Yong Youn},
  title        = {Dynamic Queue Management Approach for Data Integrity and Delay Differentiated
                  Service in {WSN}},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292975},
  doi          = {10.1109/ICITCS.2015.7292975},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimJSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimKL15,
  author       = {Song Yi Kim and
                  Hyoseung Kim and
                  Dong Hoon Lee},
  title        = {An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider
                  Attack},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292941},
  doi          = {10.1109/ICITCS.2015.7292941},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimLKS15,
  author       = {Hyunjin Kim and
                  Seokcheol Lee and
                  SungJin Kim and
                  Taeshik Shon},
  title        = {Reliability Enhanced Communication Guidance for Electric Utilities
                  Based on Regulatory Standard},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293013},
  doi          = {10.1109/ICITCS.2015.7293013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimLKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimTPKYR15,
  author       = {Jisu Kim and
                  Gemoh T. and
                  Sanghyun Park and
                  Jinsul Kim and
                  Sunghyun Yoon and
                  HoYong Ryu},
  title        = {An Efficient Multimedia Transmission Control Methodology Based on
                  {NFV}},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292942},
  doi          = {10.1109/ICITCS.2015.7292942},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimTPKYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KoLJW15,
  author       = {Ru Ko and
                  Hahn{-}Ming Lee and
                  Albert B. Jeng and
                  Te{-}En Wei},
  title        = {Vulnerability Detection of Multiple Layer Colluding Application through
                  Intent Privilege Checking},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293036},
  doi          = {10.1109/ICITCS.2015.7293036},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/KoLJW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LakshmiR15,
  author       = {K. Prasanna Lakshmi and
                  C. R. K. Reddy},
  title        = {Fast Rule-Based Prediction of Data Streams Using Associative Classification
                  Mining},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292983},
  doi          = {10.1109/ICITCS.2015.7292983},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/LakshmiR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeA15,
  author       = {Kang Chian Le and
                  Rosni Abdullah},
  title        = {Parallel Strategies for Harmony Search on {CUDA} to Solve Traveling
                  Salesman Problem},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293008},
  doi          = {10.1109/ICITCS.2015.7293008},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeeKJK15,
  author       = {Wonhyuk Lee and
                  Seunghae Kim and
                  Hongseok Jeon and
                  Hyuncheol Kim},
  title        = {Detecting an Abnormal Traffic on Healthcare Network},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292970},
  doi          = {10.1109/ICITCS.2015.7292970},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeeKJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeeL15,
  author       = {Young Kyung Lee and
                  Dong Hoon Lee},
  title        = {Forward Secure Non-Interactive Key Exchange from Indistinguishability
                  Obfuscation},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292984},
  doi          = {10.1109/ICITCS.2015.7292984},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeeL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeeNCKK15,
  author       = {Wonhyuk Lee and
                  Minki Noh and
                  Buseung Cho and
                  TaeYeon Kim and
                  Hyuncheol Kim},
  title        = {Designing of Healthcare Information Network Using IPv6 Cloud Networks},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292969},
  doi          = {10.1109/ICITCS.2015.7292969},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeeNCKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LiW15,
  author       = {A.{-}yong Li and
                  Li{-}rong Wei},
  title        = {Optimization Model of Information Flow in Power Grid Engineering Construction
                  Projects Based on Improved {DSM}},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293003},
  doi          = {10.1109/ICITCS.2015.7293003},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/LiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/MauryaG15,
  author       = {Vijay Maurya and
                  Suresh C. Gupta},
  title        = {Comparative Analysis of Processors Performance Using {ANN}},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292962},
  doi          = {10.1109/ICITCS.2015.7292962},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/MauryaG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/MohamedPAA15,
  author       = {Kamsiah Mohamed and
                  Mohd Nazran Mohammed Pauzi and
                  Fakariah Hani Hj Mohd Ali and
                  Suriyani Ariffin},
  title        = {Linearity Test Framework for S-Box in Block Cipher},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292993},
  doi          = {10.1109/ICITCS.2015.7292993},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/MohamedPAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/NagoyaLH15,
  author       = {Fumiko Nagoya and
                  Shaoying Liu and
                  Kyousuke Hamada},
  title        = {Developing a Web Dictionary System Using the {SOFL} Three-Step Specification
                  Approach},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292971},
  doi          = {10.1109/ICITCS.2015.7292971},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/NagoyaLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/NajihARH15,
  author       = {Abdulmawla M. A. Najih and
                  Syed Abdul Rahman Al{-}Haddad and
                  Abd. Rahman Ramli and
                  Shaiful Jahari Hashim},
  title        = {A New Colour Image Watermarking Technique Using Special Domain},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292922},
  doi          = {10.1109/ICITCS.2015.7292922},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/NajihARH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/NajjarK15,
  author       = {Firas Najjar and
                  Mohammad M. Kadhum},
  title        = {Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol Investigation},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293014},
  doi          = {10.1109/ICITCS.2015.7293014},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/NajjarK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/NguyenDN15,
  author       = {Thu N. A. Nguyen and
                  Van H. Dang and
                  Thuc Dinh Nguyen},
  title        = {On the Public Key-Based Auditing Methods},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293001},
  doi          = {10.1109/ICITCS.2015.7293001},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/NguyenDN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/OhPKP15,
  author       = {Seungwook Oh and
                  Dae{-}Won Park and
                  Youngjin Kim and
                  Suhyun Park},
  title        = {Design and Implementation of Display Module for Feature Symbol Verification
                  Based on {S-100}},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292967},
  doi          = {10.1109/ICITCS.2015.7292967},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/OhPKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/OhPLP15,
  author       = {Daseul Oh and
                  Dae{-}Won Park and
                  Yongmin Lim and
                  Suhyun Park},
  title        = {Methods of GML-Based Representation of {S-101} {ENC} Vector Data},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292996},
  doi          = {10.1109/ICITCS.2015.7292996},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/OhPLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Ohmori15,
  author       = {Kenji Ohmori},
  title        = {Development of Functional Reactive Programming Using an Incrementally
                  Modular Abstraction Hierarchy},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292972},
  doi          = {10.1109/ICITCS.2015.7292972},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Ohmori15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Park15,
  author       = {Hwa{-}Jin Park},
  title        = {Occlusion Handling Based on Projective Depth in Object Tracking},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293000},
  doi          = {10.1109/ICITCS.2015.7293000},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Park15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkAC15,
  author       = {Jongseon Park and
                  Do{-}Sik An and
                  Gi{-}Hwan Cho},
  title        = {Available Bandwidth Estimation Method Adaptive to Network Traffic
                  Load Considering Fairness with {UDT} Flows},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292956},
  doi          = {10.1109/ICITCS.2015.7292956},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkKL15,
  author       = {AHyeon{-}Ju Park and
                  Hye{-}Young Kim and
                  Jong{-}In Lim},
  title        = {A Framework of Device Authentication Management in IoT Environments},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292918},
  doi          = {10.1109/ICITCS.2015.7292918},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/PongpanjanthraL15,
  author       = {Kriengkri Pongpanjanthra and
                  Yachai Limpiyakorn},
  title        = {Model-Based Approach to Generating Web Portals},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292998},
  doi          = {10.1109/ICITCS.2015.7292998},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/PongpanjanthraL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Pradeep15,
  author       = {Preeja Pradeep},
  title        = {Research Domains for Cognitive Radio: {A} Survey},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293015},
  doi          = {10.1109/ICITCS.2015.7293015},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Pradeep15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/PradeepDDRSVR15,
  author       = {Preeja Pradeep and
                  P. L. Divya and
                  R. D. Arya Devi and
                  P. Rekha and
                  K. Sangeeth and
                  Tinu Vinod and
                  Maneesha Vinodini Ramesh},
  title        = {An Energy Aware Schedule Based Remote Triggered Wireless Sensor Network
                  Laboratory},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292944},
  doi          = {10.1109/ICITCS.2015.7292944},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/PradeepDDRSVR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/PrompilaL15,
  author       = {Ekarat Prompila and
                  Yachai Limpiyakorn},
  title        = {Automating Documentation of {HTML} Prototype},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292955},
  doi          = {10.1109/ICITCS.2015.7292955},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/PrompilaL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/RastegariLH15,
  author       = {Samaneh Rastegari and
                  Chiou Peng Lam and
                  Philip Hingston},
  title        = {A Statistical Rule Learning Approach to Network Intrusion Detection},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292933},
  doi          = {10.1109/ICITCS.2015.7292933},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/RastegariLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Sahi15,
  author       = {Geetanjali Sahi},
  title        = {User Satisfaction and Website Usability: Exploring the Linkages in
                  {B2C} E-Commerce Context},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293034},
  doi          = {10.1109/ICITCS.2015.7293034},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Sahi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SamiAJGN15,
  author       = {Muhammad Sami and
                  Yasar Ayaz and
                  Mohsin Jamil and
                  Syed Omer Gilani and
                  Muhammad Naveed},
  title        = {Text Detection and Recognition for Semantic Mapping in Indoor Navigation},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293024},
  doi          = {10.1109/ICITCS.2015.7293024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SamiAJGN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SamsuwanL15,
  author       = {Piyaporn Samsuwan and
                  Yachai Limpiyakorn},
  title        = {Generation of Data Warehouse Design Test Cases},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292985},
  doi          = {10.1109/ICITCS.2015.7292985},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SamsuwanL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SangeethPDRDLR15,
  author       = {K. Sangeeth and
                  Preeja Pradeep and
                  P. L. Divya and
                  P. Rekha and
                  R. D. Arya Devi and
                  Sheeja L. and
                  Maneesha Vinodini Ramesh},
  title        = {A Remote Code Editing Framework for {AMRITA} Remote Triggered {WSN}
                  Laboratory},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292930},
  doi          = {10.1109/ICITCS.2015.7292930},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SangeethPDRDLR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SetthawongT15,
  author       = {Pisal Setthawong and
                  Nattaworn Tancharoen},
  title        = {Extending a Standard Tablet into an Ocarina Playing Gaming Platform
                  with Projected Parallax Layers},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292980},
  doi          = {10.1109/ICITCS.2015.7292980},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SetthawongT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ShaukatAA15,
  author       = {Arslan Shaukat and
                  Mansoor Aziz and
                  M. Usman Akram},
  title        = {Facial Expression Recognition Using Multiple Feature Sets},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292981},
  doi          = {10.1109/ICITCS.2015.7292981},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ShaukatAA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SheshadriSK15,
  author       = {H. S. Sheshadri and
                  S. R. Bhagya Shree and
                  Murali Krishna},
  title        = {Diagnosis of Alzheimer's Disease Employing Neuropsychological and
                  Classification Techniques},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292973},
  doi          = {10.1109/ICITCS.2015.7292973},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SheshadriSK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SinghMG15,
  author       = {Shirish Kumar Singh and
                  Bharavi Mishra and
                  Poonam Gera},
  title        = {A Privacy Enhanced Security Framework for Android Users},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292926},
  doi          = {10.1109/ICITCS.2015.7292926},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SinghMG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SinghS15,
  author       = {Hardeep Singh and
                  Bikram Pal Singh},
  title        = {{HR} Challenges {\&} Issues in Insurance Industry: An Empirical
                  Study},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292986},
  doi          = {10.1109/ICITCS.2015.7292986},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SinghS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SodanilI15,
  author       = {Maleerat Sodanil and
                  Chalermpong Intarat},
  title        = {A Development of Image Enhancement for {CCTV} Images},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292914},
  doi          = {10.1109/ICITCS.2015.7292914},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SodanilI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SuhKK15,
  author       = {Dongjun Suh and
                  Hyunyoung Kim and
                  Jinsul Kim},
  title        = {Estimation of Water Demand in Residential Building Using Machine Learning
                  Approach},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--2},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292979},
  doi          = {10.1109/ICITCS.2015.7292979},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SuhKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SuhKSY15,
  author       = {Youngho Suh and
                  Kyung Tae Kim and
                  Dong Ryeol Shin and
                  Hee Yong Youn},
  title        = {Traffic-Aware Energy Efficient Routing {(TEER)} Using Multi-Criteria
                  Decision Making for Wireless Sensor Network},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293029},
  doi          = {10.1109/ICITCS.2015.7293029},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/SuhKSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/TanCPKY15,
  author       = {Syh{-}Yuan Tan and
                  Ji{-}Jian Chin and
                  Geong Sen Poh and
                  Yvonne H. S. Kam and
                  Wei{-}Chuen Yau},
  title        = {A Client-Server Prototype of a Symmetric Key Searchable Encryption
                  Scheme Using Open-Source Applications},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292892},
  doi          = {10.1109/ICITCS.2015.7292892},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/TanCPKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/TangLX15,
  author       = {Ye Tang and
                  Huiyun Li and
                  Guoqing Xu},
  title        = {Cache Side-Channel Attack to Recover Plaintext against Datagram {TLS}},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292961},
  doi          = {10.1109/ICITCS.2015.7292961},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/TangLX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/TehLCC15,
  author       = {Thong{-}Yun Teh and
                  Yik{-}Shu Lee and
                  Zi{-}Yik Cheah and
                  Ji{-}Jian Chin},
  title        = {A Prototype to Facilitate Access Control Using Identity-Based Identification
                  on Mobile Smart Devices},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292928},
  doi          = {10.1109/ICITCS.2015.7292928},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/TehLCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ThanhFSTK15,
  author       = {Do Van Thanh and
                  Boning Feng and
                  Clark Swafford and
                  Do van Thuan and
                  Loc H. Khuong},
  title        = {Mobile Identity as a Tool to Develop Society},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292997},
  doi          = {10.1109/ICITCS.2015.7292997},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ThanhFSTK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/TommyRMLKS15,
  author       = {Robin Tommy and
                  Ullas Ravi and
                  Deen Mohan and
                  Jobin Luke and
                  Aswathy S. Krishna and
                  Girija Subramaniam},
  title        = {Internet of Things (IoT) Expanding the Horizons of Mainframes},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292989},
  doi          = {10.1109/ICITCS.2015.7292989},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/TommyRMLKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ToulouseMC15,
  author       = {Michel Toulouse and
                  Bui Quang Minh and
                  Philip Curtis},
  title        = {A Consensus Based Network Intrusion Detection System},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292913},
  doi          = {10.1109/ICITCS.2015.7292913},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ToulouseMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/TrinhKKL15,
  author       = {Trinh Tan Dat and
                  Jin Young Kim and
                  Hyoung{-}Gook Kim and
                  Kyong{-}Rok Lee},
  title        = {Robust Speaker Verification Using Low-Rank Recovery under Total Variability
                  Space},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293016},
  doi          = {10.1109/ICITCS.2015.7293016},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/TrinhKKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/UmarHSZ15,
  author       = {Idris Abubakar Umar and
                  Zurina Mohd Hanapi and
                  Aduwati Sali and
                  Zuriati Ahmad Zukarnain},
  title        = {A Forwarding Strategy for {DWSIGF} Routing Protocol},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292917},
  doi          = {10.1109/ICITCS.2015.7292917},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/UmarHSZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/UrushiyamaM15,
  author       = {Yuta Urushiyama and
                  Yoshifumi Manabe},
  title        = {A Double-Private epsilon-Fuzzy Matching Protocol},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292915},
  doi          = {10.1109/ICITCS.2015.7292915},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/UrushiyamaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/VanT15,
  author       = {Dang Hai Van and
                  Nguyen Dinh Thuc},
  title        = {A Privacy Preserving Message Authentication Code},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292927},
  doi          = {10.1109/ICITCS.2015.7292927},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/VanT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/WangLLY15,
  author       = {Yili Wang and
                  Byung Jun Lee and
                  Jung June Lee and
                  Hee Yong Youn},
  title        = {A PSO-Based Buffer Management Scheme for Improving Hit Ratio of Solid
                  State Drive},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292929},
  doi          = {10.1109/ICITCS.2015.7292929},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/WangLLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/WazzanA15,
  author       = {Majda A. Wazzan and
                  Mohammad Hamza Awedh},
  title        = {Towards Improving Web Attack Detection: Highlighting the Significant
                  Factors},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293028},
  doi          = {10.1109/ICITCS.2015.7293028},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/WazzanA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Wilaisakoolyong15,
  author       = {Narungsun Wilaisakoolyong},
  title        = {Using Cloud Computing Systems to Create Virtual Classroom Model for
                  Thai-Nichi's Students},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293035},
  doi          = {10.1109/ICITCS.2015.7293035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Wilaisakoolyong15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Yamamoto15,
  author       = {Shuichiro Yamamoto},
  title        = {Assuring Security through Attribute {GSN}},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292954},
  doi          = {10.1109/ICITCS.2015.7292954},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Yamamoto15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/YaoWMZL15,
  author       = {Yuangang Yao and
                  Xing Wang and
                  Xiangjie Meng and
                  Xiaofei Zhang and
                  Bin Li},
  title        = {{ISEK:} An Information Security Knowledge Graph for {CISP} Knowledge
                  System},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292991},
  doi          = {10.1109/ICITCS.2015.7292991},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/YaoWMZL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/YewHAAS15,
  author       = {Yew Kwang Hooi and
                  Mohd Fadzil Hassan and
                  Ahmad Izuddin B. Zainal Abidin and
                  Noreen Izza Bt. Arshad and
                  Azmi M. Shariff},
  title        = {A Generic Ontology Methodology and Factors to Address Design Consistency},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292919},
  doi          = {10.1109/ICITCS.2015.7292919},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/YewHAAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/YooRKY15,
  author       = {Sang Hyun Yoo and
                  Yonjoong Ryou and
                  Kyung Tae Kim and
                  Hee Yong Youn},
  title        = {Block Replacement Based on Access Locality with Solid State Drive},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292960},
  doi          = {10.1109/ICITCS.2015.7292960},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/YooRKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/YoonBL15,
  author       = {Jiyoung Yoon and
                  Nakhoon Baek and
                  Hwanyong Lee},
  title        = {{ARINC661} Graphics Rendering Based on OpenVG},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292953},
  doi          = {10.1109/ICITCS.2015.7292953},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/YoonBL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/YueJ15,
  author       = {Wong Seng Yue and
                  Tee Wee Jing},
  title        = {Survey Analysis: The Effectiveness of Game-Based Learning {(GBL)}
                  in Tertiary Education Environment},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293022},
  doi          = {10.1109/ICITCS.2015.7293022},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/YueJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/YunKL15,
  author       = {Jong Pil Yun and
                  Hyoseung Kim and
                  Dong Hoon Lee},
  title        = {An Improved Fuzzy Attribute-Based Authentication},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292946},
  doi          = {10.1109/ICITCS.2015.7292946},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/YunKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ZaheerKKN15,
  author       = {Md. Zaigham Zaheer and
                  Jin Young Kim and
                  Hyoung{-}Gook Kim and
                  Seung You Na},
  title        = {A Preliminary Study on Deep-Learning Based Screaming Sound Detection},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292925},
  doi          = {10.1109/ICITCS.2015.7292925},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ZaheerKKN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ZhukabayevaOZZA15,
  author       = {Tamara Zhukabayeva and
                  Zhanar O. Oralbekova and
                  Makpal Zhartybayeva and
                  Ainur Zhumadillayeva and
                  Aigul Adamova},
  title        = {Prospects of Development of Technologies in the Field of Robotics
                  and the Stages of Design of Mobile Robotic Complex},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293010},
  doi          = {10.1109/ICITCS.2015.7293010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ZhukabayevaOZZA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ZhumabayevaZMO15,
  author       = {Laula Zhumabayeva and
                  Tamara Zhukabayeva and
                  Gairatzhan Mavlankulov and
                  Mohamed Othman},
  title        = {Arbitrary Petri Nets Controlled Grammars Under Parallel Firing Strategy},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7292952},
  doi          = {10.1109/ICITCS.2015.7292952},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ZhumabayevaZMO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Zia15,
  author       = {Tanveer A. Zia},
  title        = {Organisations Capability and Aptitude towards {IT} Security Governance},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293005},
  doi          = {10.1109/ICITCS.2015.7293005},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/Zia15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ZubairYKKK15,
  author       = {Muhammad Zubair and
                  Changwoo Yoon and
                  Hyunyoung Kim and
                  Jisu Kim and
                  Jinsul Kim},
  title        = {Smart Wearable Band for Stress Detection},
  booktitle    = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICITCS.2015.7293017},
  doi          = {10.1109/ICITCS.2015.7293017},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/ZubairYKKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icitcs/2015,
  title        = {5th International Conference on {IT} Convergence and Security, {ICITCS}
                  2015, Kuala Lumpur, Malaysia, August 24-27, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7287494/proceeding},
  isbn         = {978-1-4673-6537-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics