Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icitst/icitst2009.bht:"
@inproceedings{DBLP:conf/icitst/AbbasiMS09, author = {Abdul Ghafoor Abbasi and Sead Muftic and Gernot Schm{\"{o}}lzer}, title = {A model and design of a security provider for Java applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402592}, doi = {10.1109/ICITST.2009.5402592}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AbbasiMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Al-SharafatN09, author = {Wafa S. Al{-}Sharafat and Reyadh Naoum}, title = {Significant of features selection for detecting network intrusions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402584}, doi = {10.1109/ICITST.2009.5402584}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Al-SharafatN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Alghathbar09, author = {Khaled Alghathbar}, title = {Low power design for silent pass authentication system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402634}, doi = {10.1109/ICITST.2009.5402634}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Alghathbar09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlghathbarM09, author = {Khaled Alghathbar and Hanan A. Mahmoud}, title = {Noisy password security technique}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402537}, doi = {10.1109/ICITST.2009.5402537}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlghathbarM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AliSS09, author = {Ghulam Ali and Noor Ahmed Shaikh and Zubair Ahmed Shaikh}, title = {Towards development of a trust grid to balance between organization's interests and employee's privacy}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402637}, doi = {10.1109/ICITST.2009.5402637}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AliSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlimANR09, author = {Sophia Alim and Ruqayya Abdulrahman and Daniel Neagu and Mick J. Ridley}, title = {Data retrieval from online social network profiles for social engineering applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402568}, doi = {10.1109/ICITST.2009.5402568}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AlimANR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AllisonYC09, author = {David S. Allison and Hany F. El Yamany and Miriam A. M. Capretz}, title = {Privacy and trust policies within {SOA}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402540}, doi = {10.1109/ICITST.2009.5402540}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AllisonYC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlomariSW09, author = {Mohammad Kamel Alomari and Kuldeep Sandhu and Peter Woods}, title = {E-government adoption in the Hashemite Kingdom of Jordan: Factors from social perspectives}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402528}, doi = {10.1109/ICITST.2009.5402528}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlomariSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlwiF09, author = {Najwa Hayaati Mohd Alwi and Ip{-}Shing Fan}, title = {Information security management in e-learning}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402507}, doi = {10.1109/ICITST.2009.5402507}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlwiF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AlzaabiBZ09, author = {Mohammed Alzaabi and Jawad Berri and Mohamed Jamal Zemerly}, title = {On the fly generation of mobile learning structured multimedia content from the web}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402636}, doi = {10.1109/ICITST.2009.5402636}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AlzaabiBZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmirtahmasebiJK09, author = {Kasra Amirtahmasebi and Seyed Reza Jalalinia and Saghar Khadem}, title = {A survey of {SQL} injection defense mechanisms}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402604}, doi = {10.1109/ICITST.2009.5402604}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmirtahmasebiJK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AmranPP09, author = {Ahmad Roshidi Amran and Raphael C.{-}W. Phan and David J. Parish}, title = {Metrics for network forensics conviction evidence}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402640}, doi = {10.1109/ICITST.2009.5402640}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AmranPP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AnandPH09, author = {Ankit Anand and Xiao{-}Hong Peng and Richard Haywood}, title = {Efficient information retrieval via proxy caching mechanisms within a lossy environment}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402566}, doi = {10.1109/ICITST.2009.5402566}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AnandPH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AnandarajaSKSV09, author = {Nallusamy Anandaraja and Nagappan Sriram and C. Kathiresan and Shibi Sebastian and E. Vadivel}, title = {Web cum mobile based dynamic market information support for Agri-Horti produces: Linking the farmers with market}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402541}, doi = {10.1109/ICITST.2009.5402541}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AnandarajaSKSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AntonITMS09, author = {Constantin Anton and Laurentiu Ionescu and Ion Tutanescu and Alin Mazare and Gheorghe Serban}, title = {Detecting errors in digital communications with {CRC} codes implemented with {FPGA}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402630}, doi = {10.1109/ICITST.2009.5402630}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AntonITMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ApampaWA09, author = {Kikelomo Maria Apampa and Gary B. Wills and David Argles}, title = {Towards security goals in summative e-assessment security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402505}, doi = {10.1109/ICITST.2009.5402505}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ApampaWA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArapinisCRR09, author = {Myrto Arapinis and Tom Chothia and Eike Ritter and Mark Ryan}, title = {Untraceability in the applied pi-calculus}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402514}, doi = {10.1109/ICITST.2009.5402514}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/ArapinisCRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AreerachakulS09, author = {Sirilak Areerachakul and Siripun Sanguansintukul}, title = {Water quality classification using neural networks: Case study of canals in Bangkok, Thailand}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402577}, doi = {10.1109/ICITST.2009.5402577}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AreerachakulS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ArefiA09, author = {Mahmoodreza Arefi and Amir Masoud Amini}, title = {The elements influencing the online price dispersion on Iranian electronic retailers}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402531}, doi = {10.1109/ICITST.2009.5402531}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ArefiA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AyadiMZ09, author = {Rami Ayadi and Mohsen Maraoui and Mounir Zrigui}, title = {Intertextual distance for Arabic texts classification}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402564}, doi = {10.1109/ICITST.2009.5402564}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AyadiMZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AyodeleZK09, author = {Taiwo Ayodele and Shikun Zhou and Rinat Khusainov}, title = {Email classification: Solution with back propagation technique}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402583}, doi = {10.1109/ICITST.2009.5402583}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AyodeleZK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AyodeleZK09a, author = {Taiwo Ayodele and Shikun Zhou and Rinat Khusainov}, title = {Intelligent email prediction system {(IEPS)}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402580}, doi = {10.1109/ICITST.2009.5402580}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/AyodeleZK09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AzenaborDSI09, author = {Cyril Ehijie Azenabor and Mohammad Dastbaz and Charles A. Shoniregun and Chris Imafidon}, title = {The society and electronic government usage}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402522}, doi = {10.1109/ICITST.2009.5402522}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AzenaborDSI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AzevedoGSRFS09, author = {Ryan Ribeiro de Azevedo and Eric Rommel Dantas Galv{\~{a}}o and Rubean Caitano dos Santos and Cleyton M{\'{a}}rio de Oliveira Rodrigues and Fred Freitas and Marcelo J. Siqueira}, title = {An autonomic multiagent system ontology-based for management of security of information}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402615}, doi = {10.1109/ICITST.2009.5402615}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AzevedoGSRFS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BarchettiGM09, author = {Ugo Barchetti and Anna Lisa Guido and Luca Mainetti}, title = {A conceptual framework for business driven integration}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402527}, doi = {10.1109/ICITST.2009.5402527}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BarchettiGM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BaruahMS09, author = {Siddhartha Baruah and Anjana Kakoty Mahanta and Kanak Chandra Sarma}, title = {A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parameters}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402544}, doi = {10.1109/ICITST.2009.5402544}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BaruahMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BarzegarSK09, author = {Siamak Barzegar and Mohammad Shojafar and Mohammad Reza Keyvanpour}, title = {User interface in virtual learning environment}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402572}, doi = {10.1109/ICITST.2009.5402572}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BarzegarSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BatistaMBFK09, author = {Andr{\'{e}} Filipe de Moraes Batista and Maria das Gra{\c{c}}as Bruno Marietto and Gislene Cristina de O. Barbosa and Robson dos Santos Fran{\c{c}}a and Guiou Kobayashi}, title = {Multi-agent systems to build a computational middleware: {A} chatterbot case study}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402586}, doi = {10.1109/ICITST.2009.5402586}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BatistaMBFK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BeranS09, author = {Peter Paul Beran and Erich Schikuta}, title = {An extended multi-layered blackboard approach for the optimization of world-spanning query execution plans}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402518}, doi = {10.1109/ICITST.2009.5402518}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BeranS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BiggsV09, author = {Stephen Biggs and Stilianos Vidalis}, title = {Cloud Computing: The impact on digital forensic investigations}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402561}, doi = {10.1109/ICITST.2009.5402561}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BiggsV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BoldyrevOBTPL09, author = {Sergey Boldyrev and Ian Oliver and Ronald Brown and Juha{-}Matti Tuupola and Arto Palin and Antti Lappetel{\"{a}}inen}, title = {Network and content aware information management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402569}, doi = {10.1109/ICITST.2009.5402569}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BoldyrevOBTPL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BoumhamdiJ09, author = {Kaouthar Boumhamdi and Zahi Jarir}, title = {Yet another approach for dynamic web service composition}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5435098}, doi = {10.1109/ICITST.2009.5435098}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/BoumhamdiJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/BrescianiB09, author = {Riccardo Bresciani and Andrew Butterfield}, title = {A formal security proof for the {ZRTP} Protocol}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402595}, doi = {10.1109/ICITST.2009.5402595}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/BrescianiB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CaragataATS09, author = {Daniel Caragata and Safwan El Assad and Ion Tutanescu and Emil Sofron}, title = {Secure {TCP/IP} communications over {DVB-S/DVB-RCS} using chaotic sequences}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402591}, doi = {10.1109/ICITST.2009.5402591}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CaragataATS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChanSA09, author = {Yi{-}Tung F. Chan and Charles A. Shoniregun and Galyna A. Akmayeva}, title = {Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topology}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402621}, doi = {10.1109/ICITST.2009.5402621}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChanSA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChanSAA09, author = {Yi{-}Tung F. Chan and Charles A. Shoniregun and Galyna A. Akmayeva and Ali Al{-}Dahoud}, title = {Applying semantic web and user behavior analysis to enforce the intrusion detection system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402616}, doi = {10.1109/ICITST.2009.5402616}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChanSAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChangMM09, author = {Chee Er Chang and Faisal Mohd{-}Yasin and Azhar Kassim Mustapha}, title = {RBStreX: Hardware {XML} parser for embedded system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402548}, doi = {10.1109/ICITST.2009.5402548}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChangMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ChehabA09, author = {Maya I. Chehab and Ali E. Abdallah}, title = {Architectures for identity management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402603}, doi = {10.1109/ICITST.2009.5402603}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ChehabA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/CokusluHE09, author = {Deniz Cokuslu and Abdelkader Hameurlain and Kayhan Erciyes}, title = {Grid resource discovery based on web services}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402543}, doi = {10.1109/ICITST.2009.5402543}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/CokusluHE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DammakKRA09, author = {Hajer Ben Mahmoud Dammak and Raouf Ketata and Taieb Ben Romdhane and Samir Ben Ahmed}, title = {Modeling Quality Management System: {A} multi-agent approach}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402578}, doi = {10.1109/ICITST.2009.5402578}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DammakKRA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/DucLKK09, author = {Dang Nguyen Duc and Hyunrok Lee and Divyan M. Konidala and Kwangjo Kim}, title = {Open issues in {RFID} security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402510}, doi = {10.1109/ICITST.2009.5402510}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/DucLKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Efstathopoulos09, author = {Petros Efstathopoulos}, title = {Practical study of a defense against low-rate TCP-targeted DoS attack}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402593}, doi = {10.1109/ICITST.2009.5402593}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Efstathopoulos09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/EgiSO09, author = {Hironori Egi and Hiroshi Shigeno and Ken{-}ichi Okada}, title = {Grasping contextual awareness inside aworkspace at the entrance to support group interaction}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5435099}, doi = {10.1109/ICITST.2009.5435099}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/EgiSO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FanBV09, author = {Junfeng Fan and Lejla Batina and Ingrid Verbauwhede}, title = {Light-weight implementation options for curve-based cryptography: {HECC} is also ready for {RFID}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402516}, doi = {10.1109/ICITST.2009.5402516}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FanBV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FanHGSE09, author = {Xinxin Fan and Honggang Hu and Guang Gong and Eric M. Smith and Daniel W. Engels}, title = {Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollers}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402515}, doi = {10.1109/ICITST.2009.5402515}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FanHGSE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FaresW09, author = {Rasha Fares and Mike Woodward}, title = {A new algorithm for controlling the mean queue length in a buffer with time varying arrival rate}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402596}, doi = {10.1109/ICITST.2009.5402596}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FaresW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FazzikiNS09, author = {Aziz El Fazziki and Sana Nouzri and Mohammed Sadgal}, title = {A multi-agent development approach based on the {MDA} for modelling information systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402555}, doi = {10.1109/ICITST.2009.5402555}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FazzikiNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Fernando09, author = {Juanita I. Fernando}, title = {The elephant in the room: Health information system security and the user-level environment}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402503}, doi = {10.1109/ICITST.2009.5402503}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Fernando09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FingerMRH09, author = {Andreas Finger and Holger Meyer and Tim Rieger and Andreas Heuer}, title = {Transactions and service level agreements for online music distribution}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402524}, doi = {10.1109/ICITST.2009.5402524}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FingerMRH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FioreNA09, author = {Sandro Fiore and Alessandro Negro and Giovanni Aloisio}, title = {Data virtualization in grid environments through the GRelC Data Access and Integration Service}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402520}, doi = {10.1109/ICITST.2009.5402520}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FioreNA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FirminoBGV09, author = {Macedo Firmino and Glaucio B. Brandao and Ana M. G. Guerreiro and Ricardo Alexsandro de Medeiros Valentim}, title = {Neural cryptography applied to key management protocol with mutual authentication in {RFID} systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402512}, doi = {10.1109/ICITST.2009.5402512}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FirminoBGV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FischerM09, author = {Daniel Fischer and Bernd Markscheffel}, title = {State of the art in wireless {LAN} security - Results and implications of an empirical study concerning German companies and federal authorities}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402585}, doi = {10.1109/ICITST.2009.5402585}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FischerM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/FrancisHMM09, author = {Lishoy Francis and Gerhard P. Hancke and Keith Mayes and Konstantinos Markantonakis}, title = {Potential misuse of {NFC} enabled mobile phones with embedded security elements as contactless attack platforms}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402513}, doi = {10.1109/ICITST.2009.5402513}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/FrancisHMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GajdosR09, author = {Petr Gajdos and Michal Radeck{\'{y}}}, title = {Web visualization support for disaster management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402608}, doi = {10.1109/ICITST.2009.5402608}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GajdosR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GallardoB09, author = {Justo Carracedo Gallardo and Emilia P{\'{e}}rez Belleboni}, title = {Use of the new Smart Identity Card to reinforce electronic voting guarantees}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402529}, doi = {10.1109/ICITST.2009.5402529}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GallardoB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GamloB09, author = {Amina Gamlo and Omaima Bamasak}, title = {Towards securing e-transactions in e-government systems of Saudi Arabia}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402546}, doi = {10.1109/ICITST.2009.5402546}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GamloB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GiambrunoSML09, author = {Alessandro Giambruno and Muhammad Awais Shibli and Sead Muftic and Antonio Lioy}, title = {MagicNET: {XACML} authorization policies for mobile agents}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402600}, doi = {10.1109/ICITST.2009.5402600}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GiambrunoSML09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GoncalvesF09, author = {Joel Mana Gon{\c{c}}alves and Fabio Neves Fernandes}, title = {The impact of information security on Latin America}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402535}, doi = {10.1109/ICITST.2009.5402535}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GoncalvesF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GrobertSW09, author = {Felix Gr{\"{o}}bert and Ahmad{-}Reza Sadeghi and Marcel Winandy}, title = {Software distribution as a malware infection vector}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402538}, doi = {10.1109/ICITST.2009.5402538}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GrobertSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GronliG09, author = {Tor{-}Morten Gr{\o}nli and George Ghinea}, title = {Web 2.0 integration in a context-aware mobile {PIM} application}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402613}, doi = {10.1109/ICITST.2009.5402613}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GronliG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GuineeB09, author = {Richard A. Guinee and Marta Blaszczyk}, title = {A novel true random binary sequence generator based On a chaotic double scroll oscillator combination with a pseudo random generator for cryptographic applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402536}, doi = {10.1109/ICITST.2009.5402536}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GuineeB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/GyongyosiI09, author = {Laszlo Gyongyosi and S{\'{a}}ndor Imre}, title = {Unduplicable quantum data medium based secret decryption and verification}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402590}, doi = {10.1109/ICITST.2009.5402590}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/GyongyosiI09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HabibP09, author = {Muhammad Asif Habib and Christian Praher}, title = {Object based dynamic separation of duty in {RBAC}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402642}, doi = {10.1109/ICITST.2009.5402642}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HabibP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HammamiS09, author = {Nacereddine Hammami and Mokhtar Sellam}, title = {Tree distribution classifier for automatic spoken Arabic digit recognition}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--4}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402575}, doi = {10.1109/ICITST.2009.5402575}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HammamiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HansenG09, author = {Jarle Hansen and Gheorghita Ghinea}, title = {Multi-platform Bluetooth remote control}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402609}, doi = {10.1109/ICITST.2009.5402609}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HansenG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HaqPA09, author = {Muhammad Ehsan ul Haq and Muhammad Raza Perwaz and Kabeer Ahmed Bhatti}, title = {Compact and user-friendly representation of IPv6 addressing approach and masking}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402594}, doi = {10.1109/ICITST.2009.5402594}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/HaqPA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HarbBG09, author = {Ali Harb and Michel Beigbeder and Jean{-}Jacques Girardot}, title = {Evaluation of question classification systems using differing features}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402567}, doi = {10.1109/ICITST.2009.5402567}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HarbBG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HewettK09, author = {Rattikorn Hewett and Phongphun Kijsanayothin}, title = {On securing privacy in composite web service transactions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402545}, doi = {10.1109/ICITST.2009.5402545}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HewettK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Hooper09, author = {Emmanuel Hooper}, title = {Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacy}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402581}, doi = {10.1109/ICITST.2009.5402581}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Hooper09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/HourdinTLRR09, author = {Vincent Hourdin and Jean{-}Yves Tigli and Stephane Lavirotte and Ga{\"{e}}tan Rey and Michel Riveill}, title = {Context-sensitive authorization for asynchronous communications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402550}, doi = {10.1109/ICITST.2009.5402550}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/HourdinTLRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JafariMFO09, author = {Said Jafari and Fredrick Mtenzi and Ronan Fitzpatrick and Brendan O'Shea}, title = {An approach for developing comparative security metrics for healthcare organizations}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402504}, doi = {10.1109/ICITST.2009.5402504}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JafariMFO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JainJRP09, author = {Abhimanyu Jain and Ashish Jain and Aditya Raj and Tushar Pahwa}, title = {Sequenced picture captcha: generation and its strength analysis}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5435097}, doi = {10.1109/ICITST.2009.5435097}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JainJRP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JalalBM09, author = {Samir Kumar Jalal and Subal Chandra Biswas and Parthasarathi Mukhopadhyay}, title = {Webometric analysis of Central Universities in India: {A} study}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402605}, doi = {10.1109/ICITST.2009.5402605}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JalalBM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/JomsriSC09, author = {Pijitra Jomsri and Siripun Sanguansintukul and Worasit Choochaiwattana}, title = {A comparison of search engine using "tag title and abstract" with CiteULike - An initial evaluation}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402563}, doi = {10.1109/ICITST.2009.5402563}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/JomsriSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Juels09, author = {Ari Juels}, title = {Power games in {RFID} security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402509}, doi = {10.1109/ICITST.2009.5402509}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Juels09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KanyameeS09, author = {Kanokwan Kanyamee and Chanboon Sathitwiriyawong}, title = {A simple high-availability multiple-agent key recovery system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402606}, doi = {10.1109/ICITST.2009.5402606}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KanyameeS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KaramiF09, author = {Mohammad Karami and Mohammad Fathian}, title = {A robust trust establishment framework using Dempster-Shafer theory for MANETs}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402628}, doi = {10.1109/ICITST.2009.5402628}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KaramiF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KarimRH09, author = {Zakaria Karim and Karim Mohammed Rezaul and Aliar Hossain}, title = {Towards secure information systems in online banking}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402619}, doi = {10.1109/ICITST.2009.5402619}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KarimRH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KaufmannS09, author = {Sascha Kaufmann and Christoph Schommer}, title = {e-Conviviality in web systems by the wisdom of crowds}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402530}, doi = {10.1109/ICITST.2009.5402530}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KaufmannS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KhanN09, author = {Khaisar Muneebulla Khan and Umesha Naik}, title = {Open source software for personal information managers and personal knowledge management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--12}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402558}, doi = {10.1109/ICITST.2009.5402558}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KhanN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KharazmiNA09, author = {Sadegh Kharazmi and Ali Farahmand Nejad and Hassan Abolhassani}, title = {Freshness of Web search engines: Improving performance of Web search engines using data mining techniques}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402607}, doi = {10.1109/ICITST.2009.5402607}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KharazmiNA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KirkhamDCSW09, author = {Thomas Kirkham and Ingo Dahn and David W. Chadwick and Marc Santos and Sandra Winfield}, title = {Aggregating policies in user centric, real-time and distributed applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402553}, doi = {10.1109/ICITST.2009.5402553}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KirkhamDCSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KirkhamKGLJ09, author = {Tom Kirkham and Kleopatra Konstanteli and Julian R. Gallop and Constantinos Lalos and Ian J. Johnson}, title = {Identity management in a mobile service orientated grid}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402547}, doi = {10.1109/ICITST.2009.5402547}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KirkhamKGLJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KoR09, author = {Hoon Ko and Carlos Ramos}, title = {A study on Security Status Matrix {(SSM)} in Urban Computing}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402573}, doi = {10.1109/ICITST.2009.5402573}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KoR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/KretschmerG09, author = {Mathias Kretschmer and Gheorghita Ghinea}, title = {Seamless integration of unidirectional broadcast links into QoS-constrained broadband Wireless Mesh Access Networks}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402587}, doi = {10.1109/ICITST.2009.5402587}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/KretschmerG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LexSGJ09, author = {Elisabeth Lex and Christin Seifert and Michael Granitzer and Andreas Juffinger}, title = {Cross-domain classification: Trade-off between complexity and accuracy}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402559}, doi = {10.1109/ICITST.2009.5402559}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LexSGJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LimT09, author = {Boon Hoi Lim and Chong Eng Tan}, title = {Simplified link reliability enhancement schemes for wireless networks}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402599}, doi = {10.1109/ICITST.2009.5402599}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LimT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Lin09, author = {Wen{-}Shan Lin}, title = {An integrated framework For modelling the adoptive behaviour of online product recommendations}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402552}, doi = {10.1109/ICITST.2009.5402552}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Lin09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LioudakisGAMVK09, author = {Georgios V. Lioudakis and Fotios Gogoulos and Anna Antonakopoulou and Aziz S. Mousas and Iakovos S. Venieris and Dimitra I. Kaklamani}, title = {An access control approach for privacy-preserving passive network monitoring}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402632}, doi = {10.1109/ICITST.2009.5402632}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LioudakisGAMVK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Liu09, author = {Chenglian Liu}, title = {Improvement of authentication of anycast communication}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--3}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402618}, doi = {10.1109/ICITST.2009.5402618}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Liu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/LuP09, author = {Zheng Lu and Taoxin Peng}, title = {The VoIP intrusion detection through a LVQ-based neural network}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402626}, doi = {10.1109/ICITST.2009.5402626}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/LuP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Maalouf09, author = {Hoda W. Maalouf}, title = {Managing trade-offs between information loss and latency in real-time distributed systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402614}, doi = {10.1109/ICITST.2009.5402614}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Maalouf09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MarieBB09, author = {Rashiq Rafiq Marie and Jonathan M. Blackledge and Helmut E. Bez}, title = {On the fractal characteristics of Internet network traffic and its utilization in covert communications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402542}, doi = {10.1109/ICITST.2009.5402542}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MarieBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MondalRB09, author = {Arpita Mondal and Kaushik Roy and Prabir Bhattacharya}, title = {Secure biometric system for accessing home appliances via Internet}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402631}, doi = {10.1109/ICITST.2009.5402631}, timestamp = {Mon, 10 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MondalRB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MujtabaP09, author = {Ghulam Mujtaba and David J. Parish}, title = {Detection of applications within encrypted tunnels using packet size distributions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402624}, doi = {10.1109/ICITST.2009.5402624}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MujtabaP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MwakalingaKY09, author = {Jeffy Mwakalinga and Stewart Kowalski and Louise Yngstr{\"{o}}m}, title = {Secure e-learning using a holistic and immune security framework}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402508}, doi = {10.1109/ICITST.2009.5402508}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MwakalingaKY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NanCC09, author = {Nan Lu and Chunguang Zhou and Laizhong Cui}, title = {The application of association rules algorithm on web search engine}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402610}, doi = {10.1109/ICITST.2009.5402610}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NanCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Nehinbe09, author = {Joshua Ojo Nehinbe}, title = {Critical analyses of alerts swamping and intrusion redundancy}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402617}, doi = {10.1109/ICITST.2009.5402617}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Nehinbe09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NiweS09, author = {Moses Niwe and Janis Stirna}, title = {Pattern approach to business-to-business transactions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402523}, doi = {10.1109/ICITST.2009.5402523}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NiweS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/NormanY09, author = {Azah Anir Norman and Norizan Mohd Yasin}, title = {An analysis of Information Systems Security Management {(ISSM):} The hierarchical organizations vs. emergent organization}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402551}, doi = {10.1109/ICITST.2009.5402551}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/NormanY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OSheaBC09, author = {Karen O'Shea and Zuhair Bandar and Keeley A. Crockett}, title = {A semantic-based conversational agent framework}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402582}, doi = {10.1109/ICITST.2009.5402582}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OSheaBC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OliveiraO09, author = {Frederico Guilherme {\'{A}}lvares de Oliveira J{\'{u}}nior and Jos{\'{e}} Maria Parente de Oliveira}, title = {A heuristic-based runtime ranking for service composition}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402539}, doi = {10.1109/ICITST.2009.5402539}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OliveiraO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OmaryM09, author = {Zanifa Omary and Fredrick Mtenzi}, title = {Dataset threshold for the performance estimators in supervised machine learning experiments}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402500}, doi = {10.1109/ICITST.2009.5402500}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OmaryM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OmaryMW09, author = {Zanifa Omary and Fredrick Mtenzi and Bing Wu}, title = {How does politics affect electronic healthcare adoption}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402502}, doi = {10.1109/ICITST.2009.5402502}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/OmaryMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PatelB09, author = {Alkesh Patel and Ajit Balakrishnan}, title = {Generic framework for recommendation system using collective intelligence}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402612}, doi = {10.1109/ICITST.2009.5402612}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PatelB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PatelMP09, author = {Samir B. Patel and Tejas B. Mehta and Shrikant N. Pradhan}, title = {A novel approach using transformation techniques and decision tree algorithm on images for performing Digital Watermarking}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402565}, doi = {10.1109/ICITST.2009.5402565}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PatelMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PereraANS09, author = {Indika Perera and Colin Allison and Ross Nicoll and Thomas Sturgeon}, title = {Towards successful 3D virtual learning - a case study on teaching human computer interaction}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5435085}, doi = {10.1109/ICITST.2009.5435085}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/PereraANS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PickeringG09, author = {J. Adrian Pickering and Christopher Gutteridge}, title = {A networked registration scheme for enhancing trust}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402620}, doi = {10.1109/ICITST.2009.5402620}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PickeringG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PinkasK09, author = {Petr Pinkas and Jana Kleckov{\'{a}}}, title = {The composite algebraic structure over capabilities and actions of a system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402562}, doi = {10.1109/ICITST.2009.5402562}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PinkasK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PontesG09, author = {Elvis Pontes and Adilson Eduardo Guelfi}, title = {{IDS} 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted traffic}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402622}, doi = {10.1109/ICITST.2009.5402622}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PontesG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/PrangchumpolST09, author = {Dulyawit Prangchumpol and Siripun Sanguansintukul and Panjai Tantasanawong}, title = {Server virtualization by user behaviour model using a data mining technique - {A} preliminary study}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402611}, doi = {10.1109/ICITST.2009.5402611}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/PrangchumpolST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/QadeerMW09, author = {Abdul Qadeer and Waqar Mahmood and Abdul Waheed}, title = {The website census}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402623}, doi = {10.1109/ICITST.2009.5402623}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/QadeerMW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RadeckyG09, author = {Michal Radeck{\'{y}} and Petr Gajdos}, title = {Traffic simulation and intelligent agents}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402576}, doi = {10.1109/ICITST.2009.5402576}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RadeckyG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RahimiMR09, author = {Arian Rahimi and Sharhriar Mohammadi and Rozita Rahimi}, title = {An efficient Iris authentication using chaos theory-based cryptography for e-commerce transactions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402532}, doi = {10.1109/ICITST.2009.5402532}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RahimiMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RahmanRH09, author = {Mohammad Rahman and Karim Mohammed Rezaul and Aliar Hossain}, title = {Finding an effective and secured information system in e-commerce environment}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402521}, doi = {10.1109/ICITST.2009.5402521}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RahmanRH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RaufAA09, author = {Bilal Rauf and M. Faisal Amjad and Kabeer Ahmed Bhatti}, title = {Performance evaluation of {IEEE} 802.11 {DCF} in comparison with {IEEE} 802.11e {EDCA}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402597}, doi = {10.1109/ICITST.2009.5402597}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/RaufAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RekikKBF09, author = {Wiem Rekik and Maher Khemakhem and Abdelfettah Belghith and Jacques Fayolle}, title = {{PKI} and {UDDI} based trust centre: An attempt to improve web service security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--4}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402549}, doi = {10.1109/ICITST.2009.5402549}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/RekikKBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RixonF09, author = {Daphne Rixon and Mary Furey}, title = {Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications Commission}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402589}, doi = {10.1109/ICITST.2009.5402589}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RixonF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/RomliC09, author = {Awanis M. Romli and Arnidcha P. Cha}, title = {An expert system for stress management}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402579}, doi = {10.1109/ICITST.2009.5402579}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/RomliC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SaadSZ09, author = {Saidah Saad and Naomie Salim and Hakim Zainal}, title = {Islamic knowledge ontology creation}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402635}, doi = {10.1109/ICITST.2009.5402635}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/SaadSZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SarantisA09, author = {Demetrios Sarantis and Dimitris Askounis}, title = {A project management ontology as a reference for e-Government projects}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--8}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402526}, doi = {10.1109/ICITST.2009.5402526}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SarantisA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShaikhD09, author = {A. R. Rizwana Shaikh and Satish Devane}, title = {Verification of security properties of payment protocol using {AVISPA}}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402598}, doi = {10.1109/ICITST.2009.5402598}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShaikhD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShemailiYZ09, author = {Mouza Ahmad Bani Shemaili and Chan Yeob Yeun and Mohamed Jamal Zemerly}, title = {{RFID} lightweight mutual authentication using shrinking generator}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402511}, doi = {10.1109/ICITST.2009.5402511}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShemailiYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShiZY09, author = {Peipei Shi and Bo Zhu and Amr M. Youssef}, title = {A rotary {PIN} entry scheme resilient to shoulder-surfing}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402625}, doi = {10.1109/ICITST.2009.5402625}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShiZY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ShriramVVS09, author = {Shriram K. Vasudevan and K. Venkateshwaran and V. Vaithiyanathan and Subashri Vasudevan}, title = {Design of analog to digital converter for {SDR} (Software Defined Radio)}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402602}, doi = {10.1109/ICITST.2009.5402602}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ShriramVVS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SidorovaB09, author = {Julia Sidorova and Toni Badia}, title = {Syntactic learning for ESEDA.1, a tool for enhanced speech emotion detection and analysis}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402574}, doi = {10.1109/ICITST.2009.5402574}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SidorovaB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/StephanWB09, author = {Jean Stephan and Nagi Wakim and Youakim Badr}, title = {E-profile-based security for critical transactions in web applications}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402525}, doi = {10.1109/ICITST.2009.5402525}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/StephanWB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/StillerRA09, author = {Carsten Stiller and Fred Ro{\ss} and Christoph Ament}, title = {Towards spatial awareness in recommender systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402633}, doi = {10.1109/ICITST.2009.5402633}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/StillerRA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/SukumaranS09, author = {Sanath Sukumaran and M. V. Shetty}, title = {Knowledge Management {(KM)} in automobile: Application of a value chain {(VC)} approach using {KM} tools}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402554}, doi = {10.1109/ICITST.2009.5402554}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/SukumaranS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Tabatabaei09, author = {Shayesteh Tabatabaei}, title = {Multiple criteria routing algorithms to increase durability path in mobile ad hoc networks}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402627}, doi = {10.1109/ICITST.2009.5402627}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitst/Tabatabaei09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TahajodID09, author = {Maryam Tahajod and Azadeh Iranmehr and Mohammad Reza Darajeh}, title = {A roadmap to develop enterprise security architecture}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402639}, doi = {10.1109/ICITST.2009.5402639}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TahajodID09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TinaboMO09, author = {Rose Tinabo and Fredrick Mtenzi and Brendan O'Shea}, title = {Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402501}, doi = {10.1109/ICITST.2009.5402501}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TinaboMO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/TolnaiS09, author = {Annette Tolnai and Sebastiaan H. von Solms}, title = {Solving security issues using Information Security Awareness Portal}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402560}, doi = {10.1109/ICITST.2009.5402560}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/TolnaiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Vasilescu09, author = {Rares Vasilescu}, title = {Architectural model for a high performance content management system}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402570}, doi = {10.1109/ICITST.2009.5402570}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Vasilescu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ViscontiT09, author = {Andrea Visconti and Hooman Tahayori}, title = {Detecting misbehaving nodes in {MANET} with an artificial immune system based on type-2 fuzzy sets}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402588}, doi = {10.1109/ICITST.2009.5402588}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ViscontiT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WangY09, author = {Tzong{-}I Wang and Ting Yuan Yeh}, title = {A fault-tolerant mechanism for reducing pollution attacks in peer-to-peer networks}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402601}, doi = {10.1109/ICITST.2009.5402601}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WangY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WilkinsN09, author = {Rebecca Wilkins and Abel Nyamapfene}, title = {Usability driven website design - An equine sports case study}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402571}, doi = {10.1109/ICITST.2009.5402571}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WilkinsN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WillemsDKM09, author = {Christian Willems and Wesam Dawoud and Thomas Klingbeil and Christoph Meinel}, title = {Security in Tele-Lab - Protecting an online virtual lab for security training}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402506}, doi = {10.1109/ICITST.2009.5402506}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WillemsDKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WohrerLB09, author = {Alexander W{\"{o}}hrer and Thomas Lustig and Peter Brezany}, title = {Scalable relational query results handling in service oriented architectures}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--7}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402517}, doi = {10.1109/ICITST.2009.5402517}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WohrerLB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WongthongthamKK09, author = {Pornpit Wongthongtham and Natsuda Kasisopha and Surasak Komchaliaw}, title = {Community-oriented software engineering ontology evolution}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--4}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402557}, doi = {10.1109/ICITST.2009.5402557}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WongthongthamKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WongthongthamZ09, author = {Pornpit Wongthongtham and Behrang Zadjabbari}, title = {Signifying ontology complexity for knowledge sharing}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402638}, doi = {10.1109/ICITST.2009.5402638}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WongthongthamZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/WuL09, author = {Tsang{-}Hung Wu and Shyh{-}Chang Liu}, title = {A research on the establishment of enterprise information architecture}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402556}, doi = {10.1109/ICITST.2009.5402556}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/WuL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/YiXD09, author = {Gao Yi and Lin Xinda and Wang Dong}, title = {A computer based strategy design for automobile spare part logistics network optimization}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402534}, doi = {10.1109/ICITST.2009.5402534}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/YiXD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZamaniMAJTZ09, author = {Mazdak Zamani and Azizah Bt Abdul Manaf and Rabiah Bt Ahmad and Farhang Jaryani and Hamed Taherdoost and Akram M. Zeki}, title = {A secure audio steganography approach}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402644}, doi = {10.1109/ICITST.2009.5402644}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZamaniMAJTZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhengO09, author = {Xianghan Zheng and Vladimir A. Oleshchuk}, title = {Trust-based framework for security enhancement of {P2PSIP} communication systems}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402533}, doi = {10.1109/ICITST.2009.5402533}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhengO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZhouKP09, author = {Wei Zhou and Gaurav Kapoor and Selwyn Piramuthu}, title = {Modified Slotted {ALOHA} protocol for {RFID} tag collisions}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--2}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402629}, doi = {10.1109/ICITST.2009.5402629}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZhouKP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/ZolfagharBM09, author = {Kiyana Zolfaghar and Arash Barfar and Shahriar Mohammadi}, title = {A framework for online counter terrorism}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1--5}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402641}, doi = {10.1109/ICITST.2009.5402641}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/ZolfagharBM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2009, title = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST15451.2009}, doi = {10.1109/ICITST15451.2009}, isbn = {978-1-4244-5648-2}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.