Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icitcs/icitcs2015.bht:"
@inproceedings{DBLP:conf/icitcs/AbubakarJF15, author = {Mustapha Yusuf Abubakar and Low Tang Jung and Oi Mean Foong}, title = {Two Channel Quantum Security Modelling Focusing on Quantum Key Distribution Technique}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293032}, doi = {10.1109/ICITCS.2015.7293032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AbubakarJF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AdiBLH15, author = {Erwin Adi and Zubair A. Baig and Chiou Peng Lam and Philip Hingston}, title = {Low-Rate Denial-of-Service Attacks against {HTTP/2} Services}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292994}, doi = {10.1109/ICITCS.2015.7292994}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AdiBLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AdnanHOZS15, author = {Ali I. Adnan and Zurina Mohd Hanapi and Mohamed Othman and Zuriati Ahmad Zukarnain and Abubakar Sadiq}, title = {A Reputation-Based Routing Protocol for Wireless Sensor Networks}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292931}, doi = {10.1109/ICITCS.2015.7292931}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AdnanHOZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AgrawalR15, author = {Rashmi Agrawal and Babu Ram}, title = {A Modified K-Nearest Neighbor Algorithm to Handle Uncertain Data}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292920}, doi = {10.1109/ICITCS.2015.7292920}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AgrawalR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AhmadRA15, author = {Mifrah Ahmad and Lukman Ab. Rahim and Noreen Izza Arshad}, title = {Towards an Effective Modelling and Development of Educational Games with Subject-Matter: {A} Multi-Domain Framework}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293027}, doi = {10.1109/ICITCS.2015.7293027}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AhmadRA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AhmadRA15a, author = {Mifrah Ahmad and Lukman Ab. Rahim and Noreen Izza Arshad}, title = {Understanding Game Play Domain: An Interpretive Approach towards Modelling Educational Games with Multi-Domain Framework}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293033}, doi = {10.1109/ICITCS.2015.7293033}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AhmadRA15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AlhussianZ15, author = {Hitham Alhussian and Nordin Zakaria}, title = {An Efficient Zero-Laxity Based Real-Time Multiprocessor Scheduling Algorithm}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292943}, doi = {10.1109/ICITCS.2015.7292943}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AlhussianZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AliJ15, author = {Munwar Ali and Low Tang Jung}, title = {Confidentiality Based File Attributes and Data Classification Using TsF-KNN}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292963}, doi = {10.1109/ICITCS.2015.7292963}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AliJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AlmomaniBMB15, author = {Malek Ahmad Theeb Almomani and Shuib Basri and Ahmad Kamil Bin Mahmood and Amos Orenyi Bajeh}, title = {Software Development Practices and Problems in Malaysian Small and Medium Software Enterprises: {A} Pilot Study}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293018}, doi = {10.1109/ICITCS.2015.7293018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/AlmomaniBMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AnjumNA15, author = {Shaik Shabana Anjum and Rafidah Md Noor and Mohammad Hossein Anisi}, title = {Survey on {MANET} Based Communication Scenarios for Search and Rescue Operations}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293023}, doi = {10.1109/ICITCS.2015.7293023}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AnjumNA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Atchariyachanvanich15, author = {Kanokwan Atchariyachanvanich and Rungsiman Nararatwong and Nagul Cooharojananone}, title = {An Exploratory Study on Users' Intention to Purchase Items from Mobile Applications in Thailand}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292945}, doi = {10.1109/ICITCS.2015.7292945}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Atchariyachanvanich15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Atoum15, author = {Mohammed Salem Atoum}, title = {New {MP3} Steganography Data Set}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292999}, doi = {10.1109/ICITCS.2015.7292999}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Atoum15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Baek15, author = {Nakhoon Baek}, title = {Adding Advanced Debug Output Features to an Existing OpenGL {ES} 1.1 Implementation}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292938}, doi = {10.1109/ICITCS.2015.7292938}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Baek15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/BaekI15, author = {Nakhoon Baek and Byeonguk Im}, title = {Providing Preliminary Profiling Information for OpenGL {ES} 1.1 Application Programs}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293011}, doi = {10.1109/ICITCS.2015.7293011}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/BaekI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/BaharudinADA15, author = {Norzaidi Baharudin and Fakariah Hani Mohd Ali and Mohamad Yusof Darus and Norkhushaini Awang}, title = {Wireless Intruder Detection System {(WIDS)} in Detecting De-Authentication and Disassociation Attacks in {IEEE} 802.11}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293037}, doi = {10.1109/ICITCS.2015.7293037}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/BaharudinADA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/BarayugaY15, author = {Vitruvius John D. Barayuga and William Emmanuel S. Yu}, title = {Packet Level {TCP} Performance of NAT44, {NAT64} and IPv6 Using Iperf in the Context of IPv6 Migration}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293006}, doi = {10.1109/ICITCS.2015.7293006}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/BarayugaY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/BehniaTH15, author = {Rouzbeh Behnia and Syh{-}Yuan Tan and Swee{-}Huay Heng}, title = {On the Security of Two Pairing-Based Signature Schemes}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293002}, doi = {10.1109/ICITCS.2015.7293002}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/BehniaTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Cegan15, author = {Lukas Cegan}, title = {Intelligent Preloading of Websites Resources Based on Clustering Web User Sessions}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292988}, doi = {10.1109/ICITCS.2015.7292988}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Cegan15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ChaitienTC15, author = {Komchan Chaitien and Chayaphon Tanwongvarl and Soamsiri Chantaraskul}, title = {Adaptive Multichannel Approach for Congestion Control in Vehicular Safety Communications}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292937}, doi = {10.1109/ICITCS.2015.7292937}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ChaitienTC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/CheongL15, author = {Hon{-}Sang Cheong and Wai{-}Kong Lee}, title = {Fast Implementation of Block Ciphers and PRNGs for Kepler {GPU} Architecture}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292982}, doi = {10.1109/ICITCS.2015.7292982}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/CheongL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ChoiLJY15, author = {Jihyeon Choi and Byung Jun Lee and DongYoung Jung and Hee Yong Youn}, title = {An SSD-Based Accelerator Using Partitioned Bloom Filter for Directory Parsing}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292947}, doi = {10.1109/ICITCS.2015.7292947}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ChoiLJY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/DarASK15, author = {Muhammad Najam Dar and M. Usman Akram and Arslan Shaukat and Muazzam Ali Khan}, title = {{ECG} Based Biometric Identification for Population with Normal and Cardiac Anomalies Using Hybrid {HRV} and {DWT} Features}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292977}, doi = {10.1109/ICITCS.2015.7292977}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/DarASK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/EoJLS15, author = {Soowoong Eo and Wooyeon Jo and Seokjun Lee and Taeshik Shon}, title = {A Phase of Deleted File Recovery for Digital Forensics Research in Tizen}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292924}, doi = {10.1109/ICITCS.2015.7292924}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/EoJLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/EpishkinaK15, author = {Anna Epishkina and Konstantin Kogos}, title = {Covert Channels Parameters Evaluation Using the Information Theory Statements}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292966}, doi = {10.1109/ICITCS.2015.7292966}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/EpishkinaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/FatimaAB15, author = {Khush Naseeb Fatima and M. Usman Akram and Shafaat A. Bazaz}, title = {Papilledema Detection in Fundus Images Using Hybrid Feature Set}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293007}, doi = {10.1109/ICITCS.2015.7293007}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/FatimaAB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Ganatra15, author = {Amit P. Ganatra}, title = {Information Fusion (Ensemble System) in Data Warehousing {\&} Data Mining}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292987}, doi = {10.1109/ICITCS.2015.7292987}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Ganatra15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/GuKJS15, author = {Sungdo Gu and So Yeon Kim and Hyun{-}hwan Jeong and Kyung{-}Ah Sohn}, title = {Constructing and Exploiting Software Metrics Networks for Software Quality Assessment}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292964}, doi = {10.1109/ICITCS.2015.7292964}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/GuKJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/GuKKMY15, author = {Seunghoe Gu and Jong{-}Hwan Kim and Younghoon Kim and Cheoleun Moon and Ikjun Yeom}, title = {Controlled Queue Management in Software-Defined Networks}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292965}, doi = {10.1109/ICITCS.2015.7292965}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/GuKKMY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HalimAAA15, author = {Shamimi A. Halim and Muthukkaruppan Annamalai and Mohd Sharifuddin Ahmad and Rashidi Ahmad}, title = {Domain Expert Maintainable Inference Knowledge of Assessment Task}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292974}, doi = {10.1109/ICITCS.2015.7292974}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/HalimAAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HasegawaKNO15, author = {Keisuke Hasegawa and Naoki Kanayama and Takashi Nishide and Eiji Okamoto}, title = {Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293020}, doi = {10.1109/ICITCS.2015.7293020}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/HasegawaKNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HassanQHW15, author = {Shoaib Hassan and Usman Qamar and Taimoor Hassan and Muhammad Waqas}, title = {Software Reverse Engineering to Requirement Engineering for Evolution of Legacy System}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293021}, doi = {10.1109/ICITCS.2015.7293021}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HassanQHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HassanYY15, author = {Nor Awani Che Hassan and Kamaludin Mohamad Yusof and Sharifah Kamilah Syed Yusof}, title = {Ranging Estimation Using Dual-Frequency Doppler Technique}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293012}, doi = {10.1109/ICITCS.2015.7293012}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/HassanYY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HongLL15, author = {Ki{-}sung Hong and Chulung Lee and Kyungchul Lee}, title = {Dynamic Toll Pricing Model for an Intelligent Transportation System with Individual High Occupancy Toll Lanes}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292976}, doi = {10.1109/ICITCS.2015.7292976}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/HongLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HuHLC15, author = {Hwai{-}Tsu Hu and Ling{-}Yuan Hsu and Sheng{-}Yu Lai and Yu{-}Jung Chang}, title = {The Use of Spectral Shaping to Extend the Capacity for DWT-Based Blind Audio Watermarking}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293026}, doi = {10.1109/ICITCS.2015.7293026}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/HuHLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/IslamGAMG15, author = {Md. Nazrul Islam and Jaime Gallardo{-}Alvarado and Othman bin Hj Ahmad and Mazlina Binti Mamat and B. K. Ghosh}, title = {Path Planning Algorithm for Manipulators Based on an Improved Backtracking Search Algorithm}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293009}, doi = {10.1109/ICITCS.2015.7293009}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/IslamGAMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/JantaranusonC15, author = {Boonyakorn Jantaranuson and Nagul Cooharojananone}, title = {Background Subtraction from Auto-Exposure Surveillance Camera in Restaurant}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292957}, doi = {10.1109/ICITCS.2015.7292957}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/JantaranusonC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/JingYM15, author = {Tee Wee Jing and Wong Seng Yue and Raja Kumar Murugesan}, title = {Learning Outcome Enhancement via Serious Game: Implementing Game-Based Learning Framework in Blended Learning Environment}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292992}, doi = {10.1109/ICITCS.2015.7292992}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/JingYM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KanbaraTKNO15, author = {Yusuke Kanbara and Tadanori Teruya and Naoki Kanayama and Takashi Nishide and Eiji Okamoto}, title = {Software Implementation of a Pairing Function for Public Key Cryptosystems}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293019}, doi = {10.1109/ICITCS.2015.7293019}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KanbaraTKNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Kang15, author = {Seung{-}Ho Kang}, title = {A Feature Selection Algorithm to Find Optimal Feature Subsets for Detecting DoS Attacks}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292916}, doi = {10.1109/ICITCS.2015.7292916}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Kang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Kang15a, author = {Sunyoung Kang}, title = {The Application of Healthcare Device for Exercise Prescription}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293025}, doi = {10.1109/ICITCS.2015.7293025}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Kang15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Kang15b, author = {Seungae Kang}, title = {Trend of the Sports Convergence Technology for Health Promotion}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293030}, doi = {10.1109/ICITCS.2015.7293030}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Kang15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KangKWK15, author = {Semin Kang and Sung{-}Soo Kim and Jongho Won and Young{-}Min Kang}, title = {Bidirectional Constructive Crossover for Evolutionary Approach to Travelling Salesman Problem}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292958}, doi = {10.1109/ICITCS.2015.7292958}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KangKWK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KangYPP15, author = {Seungae Kang and Kyungock Yi and Soojung Park and Bonsup Park}, title = {Applications of u-Fitness in Sports Field}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292951}, doi = {10.1109/ICITCS.2015.7292951}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KangYPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KebedeTS15, author = {Alemu Molla Kebede and Kaleab Getaneh Tefrie and Kyung{-}Ah Sohn}, title = {Anonymous Author Similarity Identification}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292949}, doi = {10.1109/ICITCS.2015.7292949}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KebedeTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Kim15, author = {Hye{-}Young Kim}, title = {An Effective Load Balancing Scheme Maximizes the Lifetime in Wireless Sensor Networks}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292940}, doi = {10.1109/ICITCS.2015.7292940}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Kim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimCK15, author = {Hyoung{-}Gook Kim and Hye{-}Seung Cho and Jin Young Kim}, title = {{TV} Advertisement Search Based on Audio Peak-Pair Hashing in Real Environments}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293031}, doi = {10.1109/ICITCS.2015.7293031}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KimCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimGJS15, author = {So Yeon Kim and Sungdo Gu and Hyun{-}hwan Jeong and Kyung{-}Ah Sohn}, title = {A Network Clustering Based Software Attribute Selection for Identifying Fault-Prone Modules}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292921}, doi = {10.1109/ICITCS.2015.7292921}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KimGJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimHK15, author = {Dong{-}Hyun Kim and Jun{-}Hwan Huh and Jong{-}Deok Kim}, title = {Analysis of Broadcast Packet Loss for Unequal Loss Protection in Wi-Fi Broadcasting System}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292948}, doi = {10.1109/ICITCS.2015.7292948}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KimHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimJSY15, author = {Seung Wan Kim and Young Gyo Jung and Dong Ryeol Shin and Hee Yong Youn}, title = {Dynamic Queue Management Approach for Data Integrity and Delay Differentiated Service in {WSN}}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292975}, doi = {10.1109/ICITCS.2015.7292975}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KimJSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimKL15, author = {Song Yi Kim and Hyoseung Kim and Dong Hoon Lee}, title = {An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292941}, doi = {10.1109/ICITCS.2015.7292941}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KimKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimLKS15, author = {Hyunjin Kim and Seokcheol Lee and SungJin Kim and Taeshik Shon}, title = {Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293013}, doi = {10.1109/ICITCS.2015.7293013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KimLKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimTPKYR15, author = {Jisu Kim and Gemoh T. and Sanghyun Park and Jinsul Kim and Sunghyun Yoon and HoYong Ryu}, title = {An Efficient Multimedia Transmission Control Methodology Based on {NFV}}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292942}, doi = {10.1109/ICITCS.2015.7292942}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KimTPKYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KoLJW15, author = {Ru Ko and Hahn{-}Ming Lee and Albert B. Jeng and Te{-}En Wei}, title = {Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293036}, doi = {10.1109/ICITCS.2015.7293036}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/KoLJW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LakshmiR15, author = {K. Prasanna Lakshmi and C. R. K. Reddy}, title = {Fast Rule-Based Prediction of Data Streams Using Associative Classification Mining}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292983}, doi = {10.1109/ICITCS.2015.7292983}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/LakshmiR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeA15, author = {Kang Chian Le and Rosni Abdullah}, title = {Parallel Strategies for Harmony Search on {CUDA} to Solve Traveling Salesman Problem}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293008}, doi = {10.1109/ICITCS.2015.7293008}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/LeA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeeKJK15, author = {Wonhyuk Lee and Seunghae Kim and Hongseok Jeon and Hyuncheol Kim}, title = {Detecting an Abnormal Traffic on Healthcare Network}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292970}, doi = {10.1109/ICITCS.2015.7292970}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/LeeKJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeeL15, author = {Young Kyung Lee and Dong Hoon Lee}, title = {Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292984}, doi = {10.1109/ICITCS.2015.7292984}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/LeeL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeeNCKK15, author = {Wonhyuk Lee and Minki Noh and Buseung Cho and TaeYeon Kim and Hyuncheol Kim}, title = {Designing of Healthcare Information Network Using IPv6 Cloud Networks}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292969}, doi = {10.1109/ICITCS.2015.7292969}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/LeeNCKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LiW15, author = {A.{-}yong Li and Li{-}rong Wei}, title = {Optimization Model of Information Flow in Power Grid Engineering Construction Projects Based on Improved {DSM}}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293003}, doi = {10.1109/ICITCS.2015.7293003}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/LiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/MauryaG15, author = {Vijay Maurya and Suresh C. Gupta}, title = {Comparative Analysis of Processors Performance Using {ANN}}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292962}, doi = {10.1109/ICITCS.2015.7292962}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/MauryaG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/MohamedPAA15, author = {Kamsiah Mohamed and Mohd Nazran Mohammed Pauzi and Fakariah Hani Hj Mohd Ali and Suriyani Ariffin}, title = {Linearity Test Framework for S-Box in Block Cipher}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292993}, doi = {10.1109/ICITCS.2015.7292993}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/MohamedPAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/NagoyaLH15, author = {Fumiko Nagoya and Shaoying Liu and Kyousuke Hamada}, title = {Developing a Web Dictionary System Using the {SOFL} Three-Step Specification Approach}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292971}, doi = {10.1109/ICITCS.2015.7292971}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/NagoyaLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/NajihARH15, author = {Abdulmawla M. A. Najih and Syed Abdul Rahman Al{-}Haddad and Abd. Rahman Ramli and Shaiful Jahari Hashim}, title = {A New Colour Image Watermarking Technique Using Special Domain}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292922}, doi = {10.1109/ICITCS.2015.7292922}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/NajihARH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/NajjarK15, author = {Firas Najjar and Mohammad M. Kadhum}, title = {Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol Investigation}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293014}, doi = {10.1109/ICITCS.2015.7293014}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/NajjarK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/NguyenDN15, author = {Thu N. A. Nguyen and Van H. Dang and Thuc Dinh Nguyen}, title = {On the Public Key-Based Auditing Methods}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293001}, doi = {10.1109/ICITCS.2015.7293001}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/NguyenDN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/OhPKP15, author = {Seungwook Oh and Dae{-}Won Park and Youngjin Kim and Suhyun Park}, title = {Design and Implementation of Display Module for Feature Symbol Verification Based on {S-100}}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292967}, doi = {10.1109/ICITCS.2015.7292967}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/OhPKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/OhPLP15, author = {Daseul Oh and Dae{-}Won Park and Yongmin Lim and Suhyun Park}, title = {Methods of GML-Based Representation of {S-101} {ENC} Vector Data}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292996}, doi = {10.1109/ICITCS.2015.7292996}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/OhPLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Ohmori15, author = {Kenji Ohmori}, title = {Development of Functional Reactive Programming Using an Incrementally Modular Abstraction Hierarchy}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292972}, doi = {10.1109/ICITCS.2015.7292972}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Ohmori15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Park15, author = {Hwa{-}Jin Park}, title = {Occlusion Handling Based on Projective Depth in Object Tracking}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293000}, doi = {10.1109/ICITCS.2015.7293000}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Park15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkAC15, author = {Jongseon Park and Do{-}Sik An and Gi{-}Hwan Cho}, title = {Available Bandwidth Estimation Method Adaptive to Network Traffic Load Considering Fairness with {UDT} Flows}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292956}, doi = {10.1109/ICITCS.2015.7292956}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ParkAC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkKL15, author = {AHyeon{-}Ju Park and Hye{-}Young Kim and Jong{-}In Lim}, title = {A Framework of Device Authentication Management in IoT Environments}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292918}, doi = {10.1109/ICITCS.2015.7292918}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ParkKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/PongpanjanthraL15, author = {Kriengkri Pongpanjanthra and Yachai Limpiyakorn}, title = {Model-Based Approach to Generating Web Portals}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292998}, doi = {10.1109/ICITCS.2015.7292998}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/PongpanjanthraL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Pradeep15, author = {Preeja Pradeep}, title = {Research Domains for Cognitive Radio: {A} Survey}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293015}, doi = {10.1109/ICITCS.2015.7293015}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Pradeep15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/PradeepDDRSVR15, author = {Preeja Pradeep and P. L. Divya and R. D. Arya Devi and P. Rekha and K. Sangeeth and Tinu Vinod and Maneesha Vinodini Ramesh}, title = {An Energy Aware Schedule Based Remote Triggered Wireless Sensor Network Laboratory}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292944}, doi = {10.1109/ICITCS.2015.7292944}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/PradeepDDRSVR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/PrompilaL15, author = {Ekarat Prompila and Yachai Limpiyakorn}, title = {Automating Documentation of {HTML} Prototype}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292955}, doi = {10.1109/ICITCS.2015.7292955}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/PrompilaL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/RastegariLH15, author = {Samaneh Rastegari and Chiou Peng Lam and Philip Hingston}, title = {A Statistical Rule Learning Approach to Network Intrusion Detection}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292933}, doi = {10.1109/ICITCS.2015.7292933}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/RastegariLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Sahi15, author = {Geetanjali Sahi}, title = {User Satisfaction and Website Usability: Exploring the Linkages in {B2C} E-Commerce Context}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293034}, doi = {10.1109/ICITCS.2015.7293034}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Sahi15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SamiAJGN15, author = {Muhammad Sami and Yasar Ayaz and Mohsin Jamil and Syed Omer Gilani and Muhammad Naveed}, title = {Text Detection and Recognition for Semantic Mapping in Indoor Navigation}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293024}, doi = {10.1109/ICITCS.2015.7293024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SamiAJGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SamsuwanL15, author = {Piyaporn Samsuwan and Yachai Limpiyakorn}, title = {Generation of Data Warehouse Design Test Cases}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292985}, doi = {10.1109/ICITCS.2015.7292985}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SamsuwanL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SangeethPDRDLR15, author = {K. Sangeeth and Preeja Pradeep and P. L. Divya and P. Rekha and R. D. Arya Devi and Sheeja L. and Maneesha Vinodini Ramesh}, title = {A Remote Code Editing Framework for {AMRITA} Remote Triggered {WSN} Laboratory}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292930}, doi = {10.1109/ICITCS.2015.7292930}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SangeethPDRDLR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SetthawongT15, author = {Pisal Setthawong and Nattaworn Tancharoen}, title = {Extending a Standard Tablet into an Ocarina Playing Gaming Platform with Projected Parallax Layers}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292980}, doi = {10.1109/ICITCS.2015.7292980}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SetthawongT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ShaukatAA15, author = {Arslan Shaukat and Mansoor Aziz and M. Usman Akram}, title = {Facial Expression Recognition Using Multiple Feature Sets}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292981}, doi = {10.1109/ICITCS.2015.7292981}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ShaukatAA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SheshadriSK15, author = {H. S. Sheshadri and S. R. Bhagya Shree and Murali Krishna}, title = {Diagnosis of Alzheimer's Disease Employing Neuropsychological and Classification Techniques}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292973}, doi = {10.1109/ICITCS.2015.7292973}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SheshadriSK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SinghMG15, author = {Shirish Kumar Singh and Bharavi Mishra and Poonam Gera}, title = {A Privacy Enhanced Security Framework for Android Users}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292926}, doi = {10.1109/ICITCS.2015.7292926}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SinghMG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SinghS15, author = {Hardeep Singh and Bikram Pal Singh}, title = {{HR} Challenges {\&} Issues in Insurance Industry: An Empirical Study}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292986}, doi = {10.1109/ICITCS.2015.7292986}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SinghS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SodanilI15, author = {Maleerat Sodanil and Chalermpong Intarat}, title = {A Development of Image Enhancement for {CCTV} Images}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292914}, doi = {10.1109/ICITCS.2015.7292914}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SodanilI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SuhKK15, author = {Dongjun Suh and Hyunyoung Kim and Jinsul Kim}, title = {Estimation of Water Demand in Residential Building Using Machine Learning Approach}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--2}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292979}, doi = {10.1109/ICITCS.2015.7292979}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SuhKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SuhKSY15, author = {Youngho Suh and Kyung Tae Kim and Dong Ryeol Shin and Hee Yong Youn}, title = {Traffic-Aware Energy Efficient Routing {(TEER)} Using Multi-Criteria Decision Making for Wireless Sensor Network}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293029}, doi = {10.1109/ICITCS.2015.7293029}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/SuhKSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/TanCPKY15, author = {Syh{-}Yuan Tan and Ji{-}Jian Chin and Geong Sen Poh and Yvonne H. S. Kam and Wei{-}Chuen Yau}, title = {A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292892}, doi = {10.1109/ICITCS.2015.7292892}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/TanCPKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/TangLX15, author = {Ye Tang and Huiyun Li and Guoqing Xu}, title = {Cache Side-Channel Attack to Recover Plaintext against Datagram {TLS}}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292961}, doi = {10.1109/ICITCS.2015.7292961}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/TangLX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/TehLCC15, author = {Thong{-}Yun Teh and Yik{-}Shu Lee and Zi{-}Yik Cheah and Ji{-}Jian Chin}, title = {A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292928}, doi = {10.1109/ICITCS.2015.7292928}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/TehLCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ThanhFSTK15, author = {Do Van Thanh and Boning Feng and Clark Swafford and Do van Thuan and Loc H. Khuong}, title = {Mobile Identity as a Tool to Develop Society}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292997}, doi = {10.1109/ICITCS.2015.7292997}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ThanhFSTK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/TommyRMLKS15, author = {Robin Tommy and Ullas Ravi and Deen Mohan and Jobin Luke and Aswathy S. Krishna and Girija Subramaniam}, title = {Internet of Things (IoT) Expanding the Horizons of Mainframes}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292989}, doi = {10.1109/ICITCS.2015.7292989}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/TommyRMLKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ToulouseMC15, author = {Michel Toulouse and Bui Quang Minh and Philip Curtis}, title = {A Consensus Based Network Intrusion Detection System}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292913}, doi = {10.1109/ICITCS.2015.7292913}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ToulouseMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/TrinhKKL15, author = {Trinh Tan Dat and Jin Young Kim and Hyoung{-}Gook Kim and Kyong{-}Rok Lee}, title = {Robust Speaker Verification Using Low-Rank Recovery under Total Variability Space}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293016}, doi = {10.1109/ICITCS.2015.7293016}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/TrinhKKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/UmarHSZ15, author = {Idris Abubakar Umar and Zurina Mohd Hanapi and Aduwati Sali and Zuriati Ahmad Zukarnain}, title = {A Forwarding Strategy for {DWSIGF} Routing Protocol}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292917}, doi = {10.1109/ICITCS.2015.7292917}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/UmarHSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/UrushiyamaM15, author = {Yuta Urushiyama and Yoshifumi Manabe}, title = {A Double-Private epsilon-Fuzzy Matching Protocol}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292915}, doi = {10.1109/ICITCS.2015.7292915}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/UrushiyamaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/VanT15, author = {Dang Hai Van and Nguyen Dinh Thuc}, title = {A Privacy Preserving Message Authentication Code}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292927}, doi = {10.1109/ICITCS.2015.7292927}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/VanT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/WangLLY15, author = {Yili Wang and Byung Jun Lee and Jung June Lee and Hee Yong Youn}, title = {A PSO-Based Buffer Management Scheme for Improving Hit Ratio of Solid State Drive}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292929}, doi = {10.1109/ICITCS.2015.7292929}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/WangLLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/WazzanA15, author = {Majda A. Wazzan and Mohammad Hamza Awedh}, title = {Towards Improving Web Attack Detection: Highlighting the Significant Factors}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293028}, doi = {10.1109/ICITCS.2015.7293028}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/WazzanA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Wilaisakoolyong15, author = {Narungsun Wilaisakoolyong}, title = {Using Cloud Computing Systems to Create Virtual Classroom Model for Thai-Nichi's Students}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293035}, doi = {10.1109/ICITCS.2015.7293035}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Wilaisakoolyong15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Yamamoto15, author = {Shuichiro Yamamoto}, title = {Assuring Security through Attribute {GSN}}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292954}, doi = {10.1109/ICITCS.2015.7292954}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Yamamoto15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/YaoWMZL15, author = {Yuangang Yao and Xing Wang and Xiangjie Meng and Xiaofei Zhang and Bin Li}, title = {{ISEK:} An Information Security Knowledge Graph for {CISP} Knowledge System}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292991}, doi = {10.1109/ICITCS.2015.7292991}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/YaoWMZL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/YewHAAS15, author = {Yew Kwang Hooi and Mohd Fadzil Hassan and Ahmad Izuddin B. Zainal Abidin and Noreen Izza Bt. Arshad and Azmi M. Shariff}, title = {A Generic Ontology Methodology and Factors to Address Design Consistency}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292919}, doi = {10.1109/ICITCS.2015.7292919}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/YewHAAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/YooRKY15, author = {Sang Hyun Yoo and Yonjoong Ryou and Kyung Tae Kim and Hee Yong Youn}, title = {Block Replacement Based on Access Locality with Solid State Drive}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292960}, doi = {10.1109/ICITCS.2015.7292960}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/YooRKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/YoonBL15, author = {Jiyoung Yoon and Nakhoon Baek and Hwanyong Lee}, title = {{ARINC661} Graphics Rendering Based on OpenVG}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292953}, doi = {10.1109/ICITCS.2015.7292953}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/YoonBL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/YueJ15, author = {Wong Seng Yue and Tee Wee Jing}, title = {Survey Analysis: The Effectiveness of Game-Based Learning {(GBL)} in Tertiary Education Environment}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293022}, doi = {10.1109/ICITCS.2015.7293022}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/YueJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/YunKL15, author = {Jong Pil Yun and Hyoseung Kim and Dong Hoon Lee}, title = {An Improved Fuzzy Attribute-Based Authentication}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292946}, doi = {10.1109/ICITCS.2015.7292946}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/YunKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ZaheerKKN15, author = {Md. Zaigham Zaheer and Jin Young Kim and Hyoung{-}Gook Kim and Seung You Na}, title = {A Preliminary Study on Deep-Learning Based Screaming Sound Detection}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292925}, doi = {10.1109/ICITCS.2015.7292925}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ZaheerKKN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ZhukabayevaOZZA15, author = {Tamara Zhukabayeva and Zhanar O. Oralbekova and Makpal Zhartybayeva and Ainur Zhumadillayeva and Aigul Adamova}, title = {Prospects of Development of Technologies in the Field of Robotics and the Stages of Design of Mobile Robotic Complex}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293010}, doi = {10.1109/ICITCS.2015.7293010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ZhukabayevaOZZA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ZhumabayevaZMO15, author = {Laula Zhumabayeva and Tamara Zhukabayeva and Gairatzhan Mavlankulov and Mohamed Othman}, title = {Arbitrary Petri Nets Controlled Grammars Under Parallel Firing Strategy}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7292952}, doi = {10.1109/ICITCS.2015.7292952}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ZhumabayevaZMO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Zia15, author = {Tanveer A. Zia}, title = {Organisations Capability and Aptitude towards {IT} Security Governance}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293005}, doi = {10.1109/ICITCS.2015.7293005}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/Zia15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ZubairYKKK15, author = {Muhammad Zubair and Changwoo Yoon and Hyunyoung Kim and Jisu Kim and Jinsul Kim}, title = {Smart Wearable Band for Stress Detection}, booktitle = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICITCS.2015.7293017}, doi = {10.1109/ICITCS.2015.7293017}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/ZubairYKKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitcs/2015, title = {5th International Conference on {IT} Convergence and Security, {ICITCS} 2015, Kuala Lumpur, Malaysia, August 24-27, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7287494/proceeding}, isbn = {978-1-4673-6537-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.