default search action
7. EST 2017: Canterbury, UK
- Gareth Howells:
Seventh International Conference on Emerging Security Technologies, EST 2017, Canterbury, United Kingdom, September 6-8, 2017. IEEE 2017, ISBN 978-1-5386-4018-0 - Leila Benarous, Benamar Kadri:
Ensuring privacy and authentication for V2V resource sharing. 1-6 - David Zooker Zabib, Maoz Vizentovski, Alexander Fish, Osnat Keren, Yoav Weizman:
Vulnerability of secured IoT memory against localized back side laser fault injection. 7-11 - Solomon Ogbomon Uwagbole, William J. Buchanan, Lu Fan:
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. 12-17 - Amal Durou, Ibrahim A. Aref, Mosa Elbendak, Somaya Al-Máadeed, Ahmed Bouridane:
Measuring and optimising performance of an offline text writer identification system in terms of dimensionality reduction techniques. 19-25 - Nicolas Sidere, Francisco Cruz, Mickaël Coustaty, Jean-Marc Ogier:
A dataset for forgery detection and spotting in document images. 26-31 - Mohamed Hassan, Lutta Pantaleon:
An investigation into the impact of rooting android device on user data integrity. 32-37 - Charity Brown, Charlie D. Frowd, Emma Portch:
Tell me again about the face: Using repeated interviewing techniques to improve feature-based facial composite technologies. 38-43 - Josh P. Davis, Donata Tamonyte:
Masters of disguise: Super-recognisers' superior memory for concealed unfamiliar faces. 44-49 - John Gregor Fraser, Ahmed Bouridane:
Have the security flaws surrounding BITCOIN effected the currency's value? 50-55 - Rohan Durve, Ahmed Bouridane:
Windows 10 security hardening using device guard whitelisting and Applocker blacklisting. 56-61 - Shi Pan, Farzin Deravi:
Facial action units for presentation attack detection. 62-67 - Hongyuan Jing, Tanya Vladimirova:
Novel algorithm for landmine detection using C-scan ground penetrating radar signals. 68-73 - Samaneh Shafee, Boshra Rajaei:
A secure steganography algorithm using compressive sensing based on HVS feature. 74-78 - Alexander J. Martin, Peter J. B. Hancock, Charlie D. Frowd:
Breathe, relax and remember: An investigation into how focused breathing can improve identification of EvoFIT facial composites. 79-84 - Aristotle Onumo, Andrea J. Cullen, Irfan-Ullah Awan:
Empirical study of the impact of e-government services on cybersecurity development. 85-90 - Thomas Edward Allen Barton, M. A. Hannan Bin Azhar:
Forensic analysis of popular UAV systems. 91-96 - Emma Portch, Karen Logan, Charlie D. Frowd:
Interviewing and visualisation techniques: Attempting to further improve EvoFIT facial composites. 97-102 - Julian Murphy, Gareth Howells, Klaus D. McDonald-Maier:
Multi-factor authentication using accelerometers for the Internet-of-Things. 103-107 - David Beckett, Sakir Sezer:
HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 request flood DDoS attacks. 108-113 - Yazeed Alkhurayyif, George R. S. Weir:
Readability as a basis for information security policy assessment. 114-121 - Muhammad Yusof, Madihah Mohd Saudi, Farida Ridzuan:
A new mobile botnet classification based on permission and API calls. 122-127 - David Beckett, Sakir Sezer:
HTTP/2 Tsunami: Investigating HTTP/2 proxy amplification DDoS attacks. 128-133 - Adrian Stoica, Yumi Iwashita, Christopher Assad, Michael S. Ryoo, Gareth Howells:
A holistic approach to interpreting human states in smart environments providing high quality of life. 133-137 - Atiku Abubakar, Bernardi Pranggono:
Machine learning based intrusion detection system for software defined networks. 138-143 - Adedayo Odesile, Geethapriya Thamilarasu:
Distributed intrusion detection using mobile agents in wireless body area networks. 144-149 - Adewale Adetomi, Godwin Enemali, Tughrul Arslan:
Towards an efficient intellectual property protection in dynamically reconfigurable FPGAs. 150-156 - Sotirios Chatzidimitriadis, Paul Oprea, Michael Gillham, Konstantinos Sirlantzis:
Evaluation of 3D obstacle avoidance algorithm for smart powered wheelchairs. 157-162 - Alaa S. Al-Waisy, Rami Qahwaji, Stanley S. Ipson, Shumoos Al-Fahdawi:
A multimodal biometrie system for personal identification based on deep learning approaches. 163-168 - Hamed Alsufyani, Sanaul Hoque, Farzin Deravi:
Automated skin region quality assessment for texture-based biometrics. 169-174 - Supriya Yadav, Gareth Howells:
Analysis of ICMetrics features/technology for wearable devices IOT sensors. 175-178 - Khattab M. Ali Alheeti, Klaus D. McDonald-Maier:
An enhanced AODV protocol for external communication in self-driving vehicles. 179-184 - Melanie Pitchford, Danielle Green, Charlie D. Frowd:
The impact of misleading information on the identifiability of feature-based facial composites. 185-190 - Redouane Khemmar, Fabien Bonardi, Jean-Yves Ertaud, Xavier Savatier:
Biometrie authentication platform-based multisensor fusion. 191-195 - N. Poornima, Seetharaman Gopalakrishnan, Tughrul Arslan, T. N. Prabakar, M. Santhi:
Design of R3TOS based reliable low power network on chip. 196-203 - Vassilis Prevelakis, Wael Adi:
LS-ARP: A lightweight and secure ARP. 204-208 - Ayoub Mars, Wael Adi, Saleh Mulhem, Emad Hamadaqa:
Random stream cipher as a PUF-like identity in FPGA environment. 209-214 - Saleh Mulhem, Wael Adi, Ayoub Mars, Vassilis Prevelakis:
Chaining trusted links by deploying secured physical identities. 215-220 - Emad Hamadaqa, Ayoub Mars, Wael Adi, Saleh Mulhem:
Clone-resistant vehicular RKE by deploying SUC. 221-225
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.