掌桥科研
一站式科研服务平台
科技查新
收录引用
专题文献检索
外文数据库(机构版)
更多产品
首页
成为会员
我要充值
退出
我的积分:
中文会员
开通
中文文献批量获取
外文会员
开通
外文文献批量获取
我的订单
会员中心
我的包量
我的余额
登录/注册
文献导航
中文期刊
>
中文会议
>
中文学位
>
中国专利
>
外文期刊
>
外文会议
>
外文学位
>
外国专利
>
外文OA文献
>
外文科技报告
>
中文图书
>
外文图书
>
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
工业技术
基础科学
医药卫生
农业科学
教科文艺
经济财政
社会科学
哲学政法
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
自然科学总论
数学、物理、化学、力学
天文学、地球科学
生物科技
医学、药学、卫生
航空航天、军事
农林牧渔
机械、仪表工业
化工、能源
冶金矿业
电子学、通信
计算机、自动化
土木、建筑、水利
交通运输
轻工业技术
材料科学
电工技术
一般工业技术
环境科学、安全科学
图书馆学、情报学
社会科学
其他
美国国防部AD报告
美国能源部DE报告
美国航空航天局NASA报告
美国商务部PB报告
外军国防科技报告
美国国防部
美国参联会主席指示
美国海军
美国空军
美国陆军
美国海军陆战队
美国国防技术信息中心(DTIC)
美军标
美国航空航天局(NASA)
战略与国际研究中心
美国国土安全数字图书馆
美国科学研究出版社
兰德公司
美国政府问责局
香港科技大学图书馆
美国海军研究生院图书馆
OALIB数据库
在线学术档案数据库
数字空间系统
剑桥大学机构知识库
欧洲核子研究中心机构库
美国密西根大学论文库
美国政府出版局(GPO)
加利福尼亚大学数字图书馆
美国国家学术出版社
美国国防大学出版社
美国能源部文献库
美国国防高级研究计划局
美国陆军协会
美国陆军研究实验室
英国空军
美国国家科学基金会
美国战略与国际研究中心-导弹威胁网
美国科学与国际安全研究所
法国国际关系战略研究院
法国国际关系研究所
国际宇航联合会
美国防务日报
国会研究处
美国海运司令部
北约
盟军快速反应部队
北约浅水行动卓越中心
北约盟军地面部队司令部
北约通信信息局
北约稳定政策卓越中心
美国国会研究服务处
美国国防预算办公室
美国陆军技术手册
一般OA
科技期刊论文
科技会议论文
图书
科技报告
科技专著
标准
其它
美国卫生研究院文献
分子生物学
神经科学
药学
外科
临床神经病学
肿瘤学
细胞生物学
遗传学
公共卫生&环境&职业病
应用微生物学
全科医学
免疫学
动物学
精神病学
兽医学
心血管
放射&核医学&医学影像学
儿科
医学进展
微生物学
护理学
生物学
牙科&口腔外科
毒理学
生理学
医院管理
妇产科学
病理学
生化技术
胃肠&肝脏病学
运动科学
心理学
营养学
血液学
泌尿科学&肾病学
生物医学工程
感染病
生物物理学
矫形
外周血管病
药物化学
皮肤病学
康复学
眼科学
行为科学
呼吸学
进化生物学
老年医学
耳鼻喉科学
发育生物学
寄生虫学
病毒学
医学实验室检查技术
生殖生物学
风湿病学
麻醉学
危重病护理
生物材料
移植
医学情报
其他学科
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
人类生活必需品
作业;运输
化学;冶金
纺织;造纸
固定建筑物
机械工程;照明;加热;武器;爆破
物理
电学
马克思主义、列宁主义、毛泽东思想、邓小平理论
哲学、宗教
社会科学总论
政治、法律
军事
经济
文化、科学、教育、体育
语言、文字
文学
艺术
历史、地理
自然科学总论
数理科学和化学
天文学、地球科学
生物科学
医药、卫生
农业科学
工业技术
交通运输
航空、航天
环境科学、安全科学
综合性图书
主题
主题
题名
作者
关键词
摘要
高级搜索 >
外文期刊
外文会议
外文学位
外国专利
外文图书
外文OA文献
中文期刊
中文会议
中文学位
中国专利
中文图书
外文科技报告
清除
历史搜索
清空历史
首页
>
外文会议
>
International Conference for Internet Technology and Secured Transactions
International Conference for Internet Technology and Secured Transactions
召开年:
2014
召开地:
London(GB)
出版时间:
-
会议文集:
-
会议论文
热门论文
全部论文
全选(
0
)
清除
导出
1.
Exposing data leakage in Data Integration Systems
机译:
暴露数据集成系统中的数据泄漏
作者:
Akeel Fatimah Y.
;
Wills Gary B.
;
Gravell Andrew M.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
data integration;
data privacy;
security of data;
trusted computing;
data integration systems;
data leakage threats;
depth threat analysis;
improved DIS architecture;
privacy requirements;
security requirements;
Access control;
Computer architecture;
Data integration;
Data privacy;
Internet;
Organizations;
data integration systems;
data leakage;
privacy;
security;
trust;
2.
Highly available, consistent, business rule filters
机译:
高可用性,一致的业务规则过滤器
作者:
Olmsted Aspen
;
Stalvey RoxAnn
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Web services;
business data processing;
data integration;
Buddy System;
Web Service transactions;
Web service availability;
Web service consistency;
Web service durability;
Web service interception hooks;
filter architecture;
highly available consistent business rule filters;
integration hooks;
pipe architecture;
replica update propagation method;
runtime configurable interception hooks;
Availability;
Business;
Databases;
Information filters;
Unified modeling language;
Web services;
consistency;
distributed database;
model semantics;
modeling;
web services;
3.
Using query frequencies in tree-based revocation for certificateless authentication in VANETs
机译:
在基于树的吊销中使用查询频率进行VANET中的无证书身份验证
作者:
Caballero-Gil Pino
;
Martin-Fernandez Francisco
;
Caballero-Gil Candido
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
certification;
cryptographic protocols;
query processing;
road vehicles;
tree data structures;
vehicular ad hoc networks;
VANET;
authenticated dynamic hash k-ary trees;
certificateless authentication;
data structure;
pseudonyms;
public service vehicle;
query frequencies;
tree-based revocation;
vehicular ad-hoc network;
Authentication;
Proposals;
Public key;
Standards;
Vehicles;
Authentication;
CRL;
Huffman Coding;
VANET;
hash k-ary tree;
4.
Optimal MTU for realtime video broadcast with packet loss — A QoE perspective
机译:
具有丢包率的实时视频广播的最佳MTU-QoE观点
作者:
Nawaz Omer
;
Minnas Tahir Nawaz
;
Fiedler Markus
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Internet;
multimedia communication;
quality of experience;
video coding;
H.264 based live video streams;
Internet traffic;
PEVQ;
QoE perspective;
full-reference video assessment software;
high-performance video delivery networks;
multimedia applications;
optimal MTU;
packet loss;
quality of experience based metrics;
realtime video broadcast;
user satisfaction levels;
Packet loss;
Protocols;
Quality of service;
Software;
Streaming media;
Video coding;
Multimedia communication;
Quality of Experience;
Streaming media;
5.
Modeling anonymous human behavior using social media
机译:
使用社交媒体模拟匿名人类行为
作者:
Kohli Shruti
;
Gupta Ankit
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
behavioural sciences computing;
information retrieval;
natural language processing;
psychology;
social networking (online);
Hindi language songs;
anonymous human behavior modeling;
human psychology;
information extraction;
social networking sites;
user generated YouTube data;
video sharing Web site;
Collaboration;
Media;
Software;
Web 2.0;
YouTube;
Human Behaviour;
Social Media;
Web Mining;
YouTube;
6.
Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data
机译:
通过关注OWL解决链接数据的共指和安全性问题:与:链接数据相似度匹配评分的方法
作者:
Yousuf Muhammad Ali
;
Akeel Fatimah Y.
;
Fadhel Nawfal F.
;
Wills Gary B.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
knowledge representation languages;
security of data;
semantic Web;
statistical analysis;
OWL;
URI data management;
Web ontology language;
data security;
linked data;
matching algorithm;
similarity matching score;
similarity-based numeric identification score;
statistical data;
Educational institutions;
Java;
Joining processes;
Libraries;
Resource description framework;
Coreference;
Linked Data;
Semantic Web;
Similarity Metrics;
Web 2.0;
owL;
sameAs;
7.
Secure virtualised environment
机译:
安全的虚拟化环境
作者:
Chouhan Pushpinder Kaur
;
Sezer Sakir
;
Yangseo Choi
;
Ikkyun Kim
;
Chunghwan Jung
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
computer network security;
computer viruses;
telecommunication traffic;
virtual machines;
virtualisation;
SVSS;
Xen virtualised environment;
antivirus control module;
cloud computing;
computing resource consolidation;
effectiveness enhancement;
efficiency enhancement;
elastic framework;
hypervisor;
malicious activity detection module;
malicious activity detection techniques;
network traffic analysis techniques;
pay-as-you-go model;
resource utilization rate;
secure virtualised environment;
server virtualisation security system;
system resource utilization analysis techniques;
traffic behavior monitoring module;
trusted cloud computing;
virtual machines;
virtualisation layer;
virtualisation security management module;
virtualisation technology;
Cloud computing;
Malware;
Monitoring;
Operating systems;
Virtual machine monitors;
Virtual machining;
8.
A new technique to partition and manage data security in cloud databases
机译:
在云数据库中分区和管理数据安全性的新技术
作者:
Ben Omran Osama M.
;
Panda Brajendra
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
data privacy;
relational databases;
security of data;
bipartite matching algorithm;
client site;
cloud computing;
cloud databases;
cloud service adoption;
data center;
data codes;
data collection;
data distribution;
data privacy loss;
data scattering;
data security management;
data security partitioning;
data storage;
database table protection;
load cost minimization;
secure data management capability;
sensitive data leakage;
sensitive data storage;
service providers;
Algorithm design and analysis;
Cloud computing;
Data privacy;
Databases;
Diseases;
Security;
SQL;
cloud computing;
data encryption;
data security;
sensitive information;
9.
Security audit of data flows across enterprise systems and networks
机译:
跨企业系统和网络的数据流的安全审核
作者:
Joukov Nikolai
;
Shorokhov Vladislav
;
Tantsuyev Dmytro
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
electronic data interchange;
financial data processing;
security of data;
critical data flow documentation;
critical data flow identification;
data exchange;
data flow security audit;
diagramming system;
enterprise IT environments;
enterprise networks;
enterprise systems;
hardware models;
information sources;
payment card industry data security standard version 3;
security perimeters;
software components;
software models;
Databases;
Decision support systems;
Documentation;
Network topology;
Security;
Servers;
Software;
Cardholder Data Environment (CDE);
Payment Card Industry Data Security Standard v. 3 (PCI DSS v. 3);
Security audit;
dataflows across systems and networks;
security planning;
10.
Creation of educative content on the web
机译:
在网络上创建教育内容
作者:
Ammar Brika
;
Fahima Nader
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Internet;
XML;
educational computing;
hypermedia markup languages;
text analysis;
HTML document structuring;
Web 2.0;
XHTML;
XML standards;
educative content creation;
execution layer information;
formatting issue;
pedagogical design;
presentation issue;
semisemantic layer;
textual content structuring;
Education;
Internet;
Media;
Production;
Semantics;
Writing;
Creation of pedagogical content;
Semantic Web;
hypermedia structures;
hypermedia technical objects;
learning objects;
11.
Data concealing of supply chain transactions using the Distributed Trust Backbone
机译:
使用分布式信任骨干网隐藏供应链交易的数据
作者:
Pruksasri Potchara
;
van den Berg Jan
;
Hofman Wout
;
Yao-Hua Tan
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
business data processing;
international trade;
pipeline processing;
security of data;
supply chain management;
DTB model;
computer systems;
data confidentiality;
data pipeline principle;
distributed trust backbone;
information security;
international supply chain;
large-scale business system;
private sectors;
public sectors;
secure information exchange;
supply chain information systems;
supply chain systems;
supply chain transactions;
Communities;
Logic gates;
Pipelines;
Protocols;
Security;
Supply chains;
Data Pipeline;
access control;
data concealing;
supply chain security;
12.
Model for analysing Anti-Phishing Authentication Ceremonies
机译:
反网络钓鱼身份验证仪式分析模型
作者:
Hatunic-Webster Edina
;
Mtenzi Fred
;
OShea Brendan
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
computer crime;
cryptographic protocols;
decision making;
human factors;
user interfaces;
APAC framework;
antiphishing authentication ceremony analysis;
communication processing;
contextual analysis;
decision-making;
human factors;
human-in-the-loop security framework;
human-protocol behaviour;
human-protocol interaction;
network security protocol;
online authentication protocols;
security ceremony;
social analysis;
technical analysis;
user interface;
Analytical models;
Authentication;
Computational modeling;
Information processing;
Protocols;
Servers;
Anti-Phishing Authentication;
Ceremonies;
Modeling Human-Protocol Behaviour;
13.
Study on the robustness to retyping attacks of fingerprinted digital documents in the frequential domain
机译:
频繁域中指纹数字文档重定型攻击的鲁棒性研究
作者:
Munoz-Hernandez Mario Diego
;
Garcia-Hernandez Jose Juan
;
Morales-Sandoval Miguel
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
character recognition;
document image processing;
feature extraction;
image watermarking;
object recognition;
text detection;
fingerprinted digital documents;
fingerprinted image-based digital document robustness;
image-based digital document watermarking;
lossless format fingerprinted documents;
lossy format fingerprinted documents;
object character recognition software;
organizational environments;
retyping attack robustness;
semantic approach;
syntactic approach;
text extraction;
visual distortion;
watermarked text-based digital documents;
Fingerprint recognition;
Optical character recognition software;
Robustness;
Semantics;
Syntactics;
Watermarking;
14.
Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networks
机译:
全球移动通信(GSM)网络中的多级访问优先级信道分配策略
作者:
Moses Kuboye Bamidele
;
Kayode Alese Boniface
;
Sunday Adewale Olumide
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Markov processes;
cellular radio;
mobility management (mobile radio);
probability;
GSM spectrum;
Markov chain model;
blocking probabilities models;
cellular communication technology;
dropping probabilities models;
global system for mobile communications networks;
handoff call;
multidimensional Erlang B model;
multilevel access priority channel allocation strategies;
new call;
retrial call;
scarce radio resources;
special call;
steady state probabilities;
voice services;
Channel allocation;
Educational institutions;
GSM;
Ground penetrating radar;
Markov processes;
Mobile communication;
Quality of service;
Calls;
GSM;
Priority;
Subscribers;
Traffic;
15.
Recommendation systems for software engineering: A survey from software development life cycle phase perspective
机译:
软件工程推荐系统:从软件开发生命周期阶段的角度进行的调查
作者:
Pakdeetrakulwong Udsanee
;
Wongthongtham Pornpit
;
Siricharoen Waralak V.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
decision making;
formal specification;
formal verification;
information filtering;
program testing;
recommender systems;
software development management;
decision making;
information filtering;
recommendation systems;
requirement engineering;
software development field;
software development life cycle phase perspective;
software engineering;
Educational institutions;
Internet;
Ontologies;
Recommender systems;
Social network services;
Software;
Software engineering;
recommendation systems;
software development;
software engineering;
16.
Android forensics: Correlation analysis
机译:
Android取证:相关性分析
作者:
Kasiaras Dimitrios
;
Zafeiropoulos Thomas
;
Clarke Nathan
;
Kambourakis Georgios
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
data visualisation;
digital forensics;
smart phones;
Android device;
Android forensics;
cognitive load;
correlation analysis;
criminal activities;
intelligent correlation;
intelligent visualization;
mobile phone subscribers;
smartphones;
Correlation;
Databases;
File systems;
Forensics;
Internet;
Smart phones;
17.
An Attribute-Based Signature using rivest shamir adleman scheme
机译:
使用rivest shamir adleman方案的基于属性的签名
作者:
Nwosu L.A.
;
Thompson A.F.
;
Alese B.K.
;
Obe O.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
data privacy;
digital signatures;
public key cryptography;
ABS system;
Rivest Shamir Adleman scheme;
attribute-based signature system;
bilinear pairings;
cryptography signature based system;
message signature;
multiauthority situation;
Algorithm design and analysis;
Ciphers;
Computer science;
Encryption;
Logic gates;
Public key;
attribute-based signature;
cryptographic technique;
key-generation;
privacy;
18.
Efficient multicore implementation of an advanced generator of discrete chaotic sequences
机译:
离散混沌序列高级生成器的高效多核实现
作者:
Desnos Karol
;
El Assad Safwan
;
Arlicot Aurore
;
Pelcat Maxime
;
Menard Daniel
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
C language;
chaos generators;
data flow computing;
multiprocessing systems;
random sequences;
C language;
PiSDF-MoC;
chaotic discrete integer valued sequence generator;
general purpose processor;
generator design performance;
generator implementation performance;
multicore implementation;
parallelization;
parameterized-and-interfaced synchronous dataflow model-of-computation;
scalable-parallel-time efficient structure;
very-long minimal-chaotic sequence;
Bit rate;
Chaotic communication;
Generators;
Multicore processing;
Optimization;
Parallel processing;
Chaotic generator;
dataflow model of computation;
multicore implementation;
performance analysis;
pseudo-random number generator;
19.
Survey of network access security in UMTS/LTE networks
机译:
UMTS / LTE网络中的网络访问安全性调查
作者:
Caragata Daniel
;
El Assad Safwan
;
Ahmad Kassem
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
3G mobile communication;
Long Term Evolution;
radio networks;
telecommunication security;
telecommunication standards;
LTE standards;
UMTS standards;
UMTS-LTE networks;
broadband communications;
mobile communications;
network access;
network access security;
wireless network security;
3G mobile communication;
Authentication;
Cryptography;
Mobile computing;
Protocols;
LTE;
UMTS;
mobile communications;
network access;
security;
20.
Performance and economies of ‘bot-less’ application-layer DDoS attacks
机译:
“无机器人”应用层DDoS攻击的性能和经济性
作者:
Vlajic Natalija
;
Slopek Armin
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Web sites;
computer network security;
telecommunication traffic;
unsolicited e-mail;
Web-bugs;
attack traffic;
bot-less application-layer DDoS attacks;
bot-less attack execution;
puppetnets;
spam email;
Browsers;
Computer crime;
Computer hacking;
Computers;
Electronic mail;
Internet;
Servers;
DDoS;
botnet;
cost model;
puppetnet;
spam email;
web-bugs;
21.
Architectural framework proposed of behavioural classroom simulation based second life environment
机译:
基于第二生活环境的行为课堂模拟的架构框架
作者:
Alotaibi Fahad
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
authoring languages;
avatars;
teacher training;
SL scripting language;
architectural framework;
behavioural classroom simulation based Second Life 3D environment;
expert teacher;
intelligent agent;
observer avatar;
performance monitoring;
programing control;
smartbot machine;
teacher avatar;
trainee teacher;
Animation;
Avatars;
Observers;
Second Life;
Three-dimensional displays;
Training;
Scripting;
Second life;
avatar;
behaviour;
smartbot;
22.
A prediction model based on Big Data analysis using hybrid FCM clustering
机译:
基于混合FCM聚类的基于大数据分析的预测模型
作者:
Seokhwan Yang
;
Jaechun Kim
;
Mokdong Chung
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Big Data;
data analysis;
pattern classification;
pattern clustering;
unsupervised learning;
Big Data analysis;
Co-Biz;
automatic classification;
hybrid FCM clustering algorithm;
intelligent systems;
prediction model;
supervised learning;
unsupervised learning;
Algorithm design and analysis;
Classification algorithms;
Clustering algorithms;
Data models;
Prediction algorithms;
Predictive models;
Unsupervised learning;
Big Data Analysis;
FCM Clustering;
Framework;
Machine Learning;
23.
Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case
机译:
电子商务中的隐私和数据保护:以尼日利亚为例,发展中国家的政府监管方法的有效性
作者:
Adelola Tiwalade
;
Dawson Ray
;
Batmaz Firat
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
data protection;
electronic commerce;
fraud;
government policies;
Australian government;
Industry-Based Customer Dispute Resolution Schemes;
Information Commissioner's Office dispute resolution;
Nigeria;
United Kingdom;
United States;
compliance monitoring processes;
data privacy;
data protection;
developing nations;
e-commerce;
government regulation approach;
identity theft;
information privacy protection;
online fraud;
self-regulation approach;
Benchmark testing;
Data privacy;
Economics;
Government;
Internet;
Legislation;
Privacy;
Data protection;
E-commerce;
Nigeria;
Regulation;
24.
Computing domains reputation using flow
机译:
使用流程计算域信誉
作者:
Mishsky Igor
;
Gal-Oz Nurit
;
Gudes Ehud
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
IP networks;
Internet;
computer network security;
graph theory;
DNS based graph;
DNS network structure;
Domain Name System;
IP addresses;
Internet domains;
Internet infrastructure;
cross-domain relationship analysis;
domain reputation;
flow algorithm;
malicious activities;
malicious domain detection;
social trust models;
Attenuation;
Computational modeling;
Databases;
IP networks;
Internet;
Servers;
Vectors;
Flow model;
Trust Reputation;
malicious domains;
25.
C
3
-Sched — A cache covert channel robust cloud computing scheduler
机译:
C
3 sup> -Sched —缓存隐蔽通道健壮的云计算调度程序
作者:
Betz Johann
;
Westhoff Dirk
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cache storage;
cloud computing;
security of data;
virtual machines;
Csup3/sup-Sched;
cache access time measurement;
cache covert channel;
cloud infrastructure sandboxing mechanism;
operational cost reducing;
pertenant virtual machine;
power consumption;
response time;
robust cloud computing scheduler;
security risk;
system security;
Cloud computing;
Noise;
Pollution;
Processor scheduling;
Receivers;
Security;
Virtual machining;
Cloud;
Covert Channel;
Scheduler;
Virtual Machine;
26.
A robust audio fingerprinting method using spectrograms saliency maps
机译:
使用频谱图显着性图的鲁棒音频指纹识别方法
作者:
Guzman-Zavaleta Z. Jezabel
;
Feregrino-Uribe Claudia
;
Menendez-Ortiz Alejandra
;
Garcia-Hernandez Jose Juan
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
audio signal processing;
fingerprint identification;
signal representation;
audio identification;
audio signal;
colored noise addition;
global fingerprint extraction;
indexing;
monetization;
monitoring;
music information retrieval;
navigation;
pitch shifting;
robust audio fingerprinting method;
signal processing attacks;
spectrogram representation;
spectrogram saliency maps;
speed change;
temporal desynchronization attacks;
time shifting;
video identification;
Audio recording;
Feature extraction;
Fingerprint recognition;
Internet;
Noise;
Robustness;
Spectrogram;
Audio Fingerprinting;
Content Based Audio Copy Detection;
Content Based Audio Identification;
Saliency Maps;
Spectrogram;
27.
Characterizing social networks based on interior processes of nodes
机译:
基于节点内部流程表征社交网络
作者:
Al-Fedaghi Sabah
;
AlMeshari Heba
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Web design;
graph theory;
network theory (graphs);
social networking (online);
statistical analysis;
Website design;
Website policies;
content distribution systems;
graph-based statistical network characterizations;
interior node process;
next-generation infrastructure;
online social network;
social phenomenon;
Context;
Context modeling;
Frequency modulation;
Internet;
Monitoring;
Social network services;
Systematics;
analysis;
characteristics;
conceptual model;
modeling;
online social networks;
28.
Preserving privacy in sensor-fog networks
机译:
在传感器雾网络中保护隐私
作者:
Kulkarni Saurabh
;
Saha Shayan
;
Hockenbury Ryler
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
digital television;
distributed algorithms;
public key cryptography;
wireless sensor networks;
TV remote;
fog computing;
privacy;
public key cryptography;
sensor-fog network;
smart television remote;
wireless sensor network;
Accelerometers;
Accuracy;
Computational modeling;
Feature extraction;
Privacy;
Public key cryptography;
TV;
fog;
privacy;
smart;
utility;
29.
Avoiding security integration pitfalls in the cloud
机译:
避免云中的安全集成陷阱
作者:
Pfaff Oliver
;
Ries Sebastian
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
security of data;
cloud computing;
security infrastructure;
security integration pitfall avoidance;
Authentication;
Authorization;
Cloud computing;
Organizations;
Protocols;
Cloud;
SSO;
VPN;
XaaS;
authentication;
authorization;
provisioning;
security infrastructure;
30.
G-interval method for secure chaotic synchronization and information transmission
机译:
用于安全混沌同步和信息传输的G区间方法
作者:
Petrakieva Simona
;
Garasym Oleg
;
Taralova Ina
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
chaos generators;
cryptography;
random number generation;
G-interval method;
Lozi chaotic generator;
chaotic cryptosystem;
observability analysis;
secret key;
secure information transmission;
secure observer-based chaotic synchronization;
Chaotic communication;
Encryption;
Generators;
Internet;
Observers;
Synchronization;
chaotic generator;
observer design;
secure information transmission;
synchronization;
31.
A replication model for students' result processing
机译:
用于学生成绩处理的复制模型
作者:
Otasowie Iyare
;
Aderonke F. Thompson
;
Boniface K. Alese
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
data handling;
educational administrative data processing;
information dissemination;
security of data;
classified information security;
data continuity;
data security;
dissemination system;
dissemination tree mode;
distributed data stream processing;
overlay servers;
replication model;
root servers;
student result processing;
student results dissemination;
tertiary institution;
Computer science;
Distributed databases;
Educational institutions;
Internet;
Security;
Servers;
master system;
overlay servers;
replication model;
root server;
slave system;
32.
Visual explanation of government-data for policy making through open-data inclusion
机译:
通过开放数据包含来可视化解释政府数据以制定政策
作者:
Burkhardt Dirk
;
Nazemi Kawa
;
Retz Wilhelm
;
Kohlhammer Jorn
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
data visualisation;
decision making;
government data processing;
government policies;
open systems;
public administration;
statistical analysis;
decision-makers;
government-data visual explanation;
governmental data-sources;
linked-open data;
open government data;
open-data inclusion;
policy making;
public authorities;
statistical data;
Concrete;
Data visualization;
Decision making;
Government;
Internet;
Semantics;
Visualization;
Decision Making;
E-Govemment;
Information Visualization;
Linked-Open Data Visualization;
Open Government Data Visualization;
Policy Modeling;
Rule Generation;
33.
Image hiding in speech spectrum
机译:
隐藏在语音频谱中的图像
作者:
Djebbar Fatiha
;
Ayad Beghdad
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
data privacy;
fast Fourier transforms;
image processing;
spectral analysis;
speech processing;
steganography;
digital data privacy;
digital image;
fast Fourier transform based steganography technique;
frequency components;
high-frequencies;
image hiding;
magnitude speech spectrum;
stego-speech intelligibility;
stego-speech naturalness;
wideband speech;
Digital images;
Frequency-domain analysis;
Internet;
Signal to noise ratio;
Speech;
Speech coding;
Wideband;
Image processing;
Information hiding;
Magnitude coding;
Speech processing;
34.
Detection of repackaged Android Malware
机译:
检测重新包装的Android恶意软件
作者:
Shahriar Hossain
;
Clincy Victor
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Android (operating system);
invasive software;
KLD metric;
KLD value;
Kullback-Leibler divergence metric;
Smali opcode;
legitimate repackaged malware application;
repackaged Android malware detection;
suspected repackaged malware application;
Internet;
Java;
Malware;
Servers;
Smart phones;
Sociology;
Statistics;
Android malware;
Kullback-Leibler divergence;
Small opcode;
decompliler;
information theory;
repackaging;
35.
Large-scale network packet analysis for intelligent DDoS attack detection development
机译:
用于智能DDoS攻击检测开发的大规模网络数据包分析
作者:
Kato Keisuke
;
Klyuev Vitaly
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Internet;
computer network security;
data analysis;
learning (artificial intelligence);
network servers;
radial basis function networks;
support vector machines;
Center for Applied Internet Data Analysis;
DDoS attacks;
bots;
distributed denial of service attacks;
intelligent DDoS attack detection development;
large-scale network packet analysis;
machine learning techniques;
network security;
network service;
radial basis function kernel;
support vector machine;
Computer crime;
Feature extraction;
IP networks;
Internet;
Kernel;
Support vector machines;
Training;
bigdata analysis;
distributed denial of service attack;
machine teaming;
netowrk security;
36.
Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks
机译:
基于增强学习的认知无线电网络中簇首选择的信任和声誉模型
作者:
Mee Hong Ling
;
Yau Kok-Lim Alvin
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cognitive radio;
learning (artificial intelligence);
pattern clustering;
probability;
telecommunication computing;
telecommunication security;
CR network;
RL-based TRM scheme;
SU;
cluster head selection;
cognitive radio networks;
malicious secondary users;
packet transmission probability;
reinforcement learning-based trust and reputation model;
Cognitive radio;
Collaboration;
Internet;
Learning (artificial intelligence);
Network topology;
Security;
Transmission line measurements;
Security;
cluster head rotation;
cognitive radio;
reinforcement learning;
reputation;
trust;
37.
Enabling consumers to self-verify authenticity of products
机译:
使消费者能够自我验证产品的真实性
作者:
Rana Antonia
;
Ciardulli Andrea
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Internet;
bar codes;
public key cryptography;
retail data processing;
smart phones;
ID-barcode;
authentication system;
consumer;
covert security features;
mass-market product counterfeiting;
online product ID verification system;
overt security features;
product self-verify authenticity;
products packaging;
public-key cryptography;
smartphone app;
track-and-trace technologies;
Counterfeiting;
Databases;
Digital signatures;
Public key;
Seals;
2D-barcode;
anti-counterfeiting;
digital seals;
public-key cryptography;
smartphone;
38.
Barefoot morphology: A person unique feature for forensic identification
机译:
赤脚形态:法医鉴定的独特功能
作者:
Osisanwo F.Y.
;
Adetunmbi A.O.
;
Alese B.K.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
biometrics (access control);
criminal law;
feature extraction;
image matching;
barefoot morphology;
barefoot prints;
crime investigation;
crime scene;
fingerprints;
forensic identification;
human body features;
image partitioning;
image processing techniques;
pattern matching;
person identification;
person unique feature;
Databases;
Educational institutions;
Foot;
Forensics;
Image processing;
Morphology;
Noise;
Image Processing algorithm;
barefoot morphology;
de-noising;
image partitioning;
pattern matching;
39.
Keynote speakers
机译:
主讲嘉宾
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
40.
ohStore: Ontology hierarchy solution to improve RDF data management
机译:
ohStore:用于改进RDF数据管理的本体层次结构解决方案
作者:
Albahli Saleh
;
Melton Austin
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
ontologies (artificial intelligence);
query processing;
relational databases;
RDBMS;
RDF data management improvement;
RDF triple querying;
RDF triple retrieval;
RDF triple storage;
class clustering;
column store database system;
data encoding;
large-scale RDF data storage;
ohStore framework;
ontology hierarchy solution;
property-table;
row store database system;
scaling method improvement;
semantic relatedness;
Indexes;
Ontologies;
Relational databases;
Resource description framework;
Concept cluster;
Data partitioning;
Ontology;
Property table;
RDF data management;
Semantic Web;
Triple Store;
41.
A context broker federation for QoC-driven selection of cloud-based context services
机译:
用于QoC驱动的基于云的上下文服务选择的上下文代理联合
作者:
Badidi Elarbi
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
information dissemination;
ubiquitous computing;
QoC requirements;
QoC-driven selection;
cloud-based context brokers;
cloud-based context services;
context broker federation;
context information collection;
context information dissemination;
context information management;
context service selection;
handheld devices;
quality-of-context requirements;
Cloud computing;
Context;
Context modeling;
Mobile communication;
Mobile handsets;
Sensors;
Personalization;
cloud federation;
context broker;
context services;
quality-of-context;
42.
Performance analysis of Hadoop MapReduce on an OpenNebula cloud with KVM and OpenVZ virtualizations
机译:
具有KVM和OpenVZ虚拟化功能的OpenNebula云上Hadoop MapReduce的性能分析
作者:
Magalhaes Vasconcelos Pedro Roger
;
Azevedo de Araujo Freitas Gisele
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
data handling;
operating system kernels;
resource allocation;
virtual machines;
virtualisation;
CPU;
Hadoop MapReduce;
Hadoop cluster;
I/O reading benchmarks;
I/O writing benchmarks;
KVM;
OpenNebula cloud computing;
OpenVZ virtualizations;
containet-based virtualization;
kernel-based virtual machine;
performance analysis;
resource-intensive applications;
Benchmark testing;
Cloud computing;
Hardware;
Servers;
Virtual machine monitors;
Virtual machining;
Virtualization;
Big Data;
KVM;
MapReduce;
OpenVZ;
cloud computing;
virtualization;
43.
Evaluation of information security risks using hybrid assessment model
机译:
使用混合评估模型评估信息安全风险
作者:
Alese B.K.
;
Oyebade O.
;
Festus Osuolale /A/.
;
Iyare O.
;
Thompson A.F.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Visual BASIC;
organisational aspects;
risk management;
security of data;
software tools;
.Net Framework 4.0;
ASP.Net;
IS risks;
Microsoft Visual Basic.Net;
active server pages technologies;
hybrid assessment model;
industrial concerns;
information security risks;
information technology organizations;
management plans;
risk estimation;
risk exposure;
risk identification;
risk management software tools;
risk mitigation;
risk register application module;
updatable risk matrix module;
Analytical models;
Computer science;
Educational institutions;
Internet;
Organizations;
Registers;
Risk management;
Registers;
Risk;
Scenario;
What-if model;
geek;
risk management;
44.
CBAC4C: Conflict Based Allocation Control for Cloud
机译:
CBAC4C:基于冲突的云分配控制
作者:
Dlamini M.T.
;
Eloff J.H.P.
;
Eloff M.M.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
security of data;
virtual machines;
CBAC4C model;
conflict based allocation control for cloud model;
data leakage problem;
data leakage threats;
inter-VM attacks;
shared cloud infrastructure;
virtual machine;
Cloud computing;
Computational modeling;
Educational institutions;
Resource management;
Security;
Virtual machining;
conflict-based;
data leakage threats;
shared cloud infrastructures;
45.
Decision support and data mining for direct consumer-to-consumer trading
机译:
决策支持和数据挖掘,用于直接的消费者对消费者交易
作者:
Chan Vincent
;
Wu Tony Hao
;
Pang Granfham
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Internet;
Web sites;
customer services;
data mining;
decision support systems;
purchasing;
recommender systems;
search problems;
Internet;
Website user;
data mining techniques;
database tables;
decision support system;
direct consumer-to-consumer trading;
hybrid neighborhood search algorithm;
intelligent system;
item recommending intelligence;
real-time search;
Artificial neural networks;
Communities;
Data mining;
Decision support systems;
Educational institutions;
Internet;
artificial neural network;
data mining;
decision making;
e-Commerce;
online trading;
used goods;
46.
Improving deception in honeynet: Through data manipulation
机译:
改善蜜网中的欺骗:通过数据操纵
作者:
Alese B.K.
;
Akingbola R.A.
;
Dahunsi F.M.
;
Adewale O.S.
;
Ogundele T.J.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
IP networks;
access protocols;
computer network security;
IP addresses;
Internet security;
MAC addresses;
attacker workload;
data content contributes;
data deletion;
data insertion;
data modification;
data theft;
deception improvement;
dynamic data manipulation;
dynamic data mapping;
dynamic data shuffling;
dynamic data sorting;
dynamic data update;
honeynet deployments;
honeypot network;
host machine;
information gathering;
intruder machine;
protocols;
Educational institutions;
IP networks;
Internet;
Monitoring;
Organizations;
Production;
Servers;
Network Security;
data manipulation;
data theft;
deception;
honeynet;
47.
Scaling IPv6 address bindings in support of a moving target defense
机译:
扩展IPv6地址绑定以支持移动目标防御
作者:
Morrell Christopher
;
Ransbottom J. Scot
;
Marchany Randy
;
Tront Joseph G.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
IP networks;
client-server systems;
computer network security;
local area networks;
peer-to-peer computing;
transport protocols;
Ethernet interface;
IPv6 address bindings;
IPv6 address space;
IPv6 moving target defense;
MT6D;
UDP echo server;
UDP requests;
bound interfaces;
client server networks;
client server ratio;
malicious actor;
network security research;
peer to peer scenario;
reconnaissance phase;
statistical improbability;
Internet;
Kernel;
Security;
Servers;
Sockets;
Standards;
Time factors;
IPv6;
Moving Target Defense;
Networking;
Sockets;
48.
Security policy specification templates for critical infrastructure services in the cloud
机译:
云中关键基础架构服务的安全策略规范模板
作者:
Rudolph Manuel
;
Schwarz Reinhard
;
Jung Christian
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
critical infrastructures;
security of data;
cloud computing;
complex machine-readable security policies;
critical infrastructure IT services;
refineable natural-language security policy templates;
security demands;
security policy specification templates;
user-friendly specification method;
Cloud computing;
Geology;
Law;
Natural languages;
Security;
Standards;
49.
Load management model for cloud computing
机译:
云计算的负载管理模型
作者:
Mour Surabhi
;
Srivastava Priyansh
;
Patel Payai
;
Ram Hari
;
Gohil Bhavesh N.
;
Patel Dhiren
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
resource allocation;
virtual machines;
VM allocation;
cloud computing;
live virtual machine migration;
load balanced cloud system;
load management model;
unnoticed migration time;
virtual machine allocation;
Cloud computing;
Load management;
Load modeling;
Measurement;
Prediction algorithms;
Smoothing methods;
Virtual machining;
Dynamic Load Balancing;
Live VM Migration;
VM Distribution;
Virtual Machines (VM);
Virtualizatio;
50.
Value oriented service designing for successful e-Health
机译:
以价值为导向的服务设计,以实现成功的电子医疗
作者:
Dantanarayana Gilmini
;
Jayaweera Prasad
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
health care;
human factors;
medical computing;
object-oriented methods;
open systems;
associated information referencing model;
draft modeling;
e-business solution;
e-health service;
healthcare context;
healthcare e-service solution industry;
lower level value;
service modeling layer;
technical service interoperability;
value object classification schema;
value oriented service designing;
Business;
Collaboration;
Interoperability;
Medical services;
Semantics;
Standards;
Unified modeling language;
Goals;
Motivations;
Services;
Value Object;
eHealth;
51.
Combined security framework for multi-cloud environment
机译:
多云环境的组合安全框架
作者:
Aditya Suresh Kumar
;
Premkumar Kavya
;
Anitha R.
;
Mukherjee Saswati
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
cryptography;
IT industries;
business sector;
cloud computing;
cloud services;
combined security framework;
data outsourcing;
data storage;
multicloud environment;
partial homomorphism;
searchable encryption;
third party managed cloud platform;
Ciphers;
Cloud computing;
Databases;
Encryption;
Cloud Computing;
Cloud Security;
Homomorphic Encryption;
Searchable Encryption;
Secure Socket Layer;
52.
Time cost evaluation of trust based access control for XML databases
机译:
基于信任的XML数据库访问控制的时间成本评估
作者:
Farooqi Norah
;
North Siobhan
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
XML;
authorisation;
database management systems;
trusted computing;
XML databases;
dynamic trust based access control;
external users;
internal users;
malicious transaction prevention;
security level;
time cost evaluation;
trust values;
Access control;
Conferences;
Databases;
Educational institutions;
Internet;
XML;
XML databases;
evaluation;
security;
trust based access control;
53.
Mitigating DoS to authenticated cloud REST APIs
机译:
将DoS缓解到经过身份验证的云REST API
作者:
Michelin Regio /A/.
;
Zorzo Avelino F.
;
De Rose Cesar /A/.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
application program interfaces;
cloud computing;
computer network security;
DoS mitigation;
Internet;
authenticated cloud REST API;
authentication tokens;
client behaviour;
cloud management system;
communication protocols weakness;
denial of service attack;
malicious client;
Authentication;
Cloud computing;
Computer crime;
Databases;
Time factors;
Virtual machining;
DoS;
REST;
cloud;
security;
54.
PPAMH: A novel privacy-preserving approach for mobile healthcare
机译:
PPAMH:一种用于移动医疗的新型隐私保护方法
作者:
Sadki Souad
;
El Bakkali Hanan
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
blood pressure measurement;
data privacy;
health care;
medical computing;
mobile computing;
notebook computers;
patient monitoring;
smart phones;
PPAMH;
blood pressure;
data privacy;
exercise;
food diaries;
mobile device;
mobile technology;
patient monitoring device;
patient sensitive medical data;
privacy-preserving approach-for-mobile healthcare;
real time patient information;
smartphone;
tablet;
Data privacy;
Medical services;
Mobile communication;
Mobile handsets;
Organizations;
Pragmatics;
Privacy;
Future Activity Prediction;
Mobile Healthcare;
Privacy;
Privacy Policies Intelligent Application;
55.
Using classification techniques for creation of predictive intrusion detection model
机译:
使用分类技术创建预测入侵检测模型
作者:
Almutairi Abdulrazaq
;
Parish David
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Bayes methods;
computer network security;
decision trees;
feature extraction;
pattern classification;
search problems;
Bayesian techniques;
KDD'99 intrusion detection data set;
Naïve Bayes;
best-first search mechanism;
classification techniques;
decision tree;
decision tree algorithm J48;
feature extraction;
local attack categories;
network resources;
predictive intrusion detection model;
Classification algorithms;
Data models;
Decision trees;
Intrusion detection;
Predictive models;
Training;
Bayes algorithm;
Classification;
Data mining;
Decision tree;
Intrusion detection;
Snort;
56.
Advanced encryption standard development based quantum key distribution
机译:
基于高级加密标准开发的量子密钥分发
作者:
Mohammad Omer K. Jasim
;
Abbas Safia
;
El-Horbaty El-Sayed M.
;
Salem Abdel-Badeeh M.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
private key cryptography;
quantum cryptography;
AES algorithm;
AES-based DQS-Boxe;
DQS-Boxe-based quantum cipher key;
QKD;
advanced encryption standard algorithm;
advanced encryption standard development;
dynamic quantum S-Boxe-based quantum cipher key;
quantum key distribution;
static S-Boxe;
symmetric encryption algorithm;
Algorithm design and analysis;
Ciphers;
Educational institutions;
Encryption;
Internet;
AES;
Cryptography;
PRNG;
QKD;
cryptanalysis;
encryption/decryption;
secret key;
57.
ESTADO — Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online
机译:
ESTADO —通过安全,透明和临时的在线数据传输为工业设备提供智能服务
作者:
Lesjak Christian
;
Ruprechter Thomas
;
Bock Holger
;
Haid Josef
;
Brenner Eugen
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
computer network security;
data acquisition;
data protection;
industrial engineering;
maintenance engineering;
near-field communication;
ESTADO;
Industry 4.0;
Infineon security controller;
ad-hoc connectivity;
data protection;
data transmission;
deployment aspect;
device customers;
device state tracking;
industrial device;
industrial equipment;
interconnected devices;
maintenance service providers;
near-field communication;
nonpermanent NFC based connection;
online secured-transparent-ad-hoc data transmission;
operational efficiency;
regular status information transmission;
security aspect;
service providers;
smart maintenance services;
system design;
usability aspect;
Data acquisition;
Internet;
Maintenance engineering;
Mobile communication;
Mobile handsets;
Security;
Servers;
Near Field Communication (NFC);
data acquisition;
security;
smart services;
58.
Security information sharing for smart grids: Developing the right data model
机译:
智能电网的安全信息共享:开发正确的数据模型
作者:
Leszczyna Rafal
;
Wrobel Michal R.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
data models;
information management;
power engineering computing;
security of data;
smart power grids;
data model;
distributed character;
heterogeneous character;
information sharing;
security information sharing platform;
smart grid;
Data models;
Information management;
Security;
Smart grids;
Standards;
Unified modeling language;
Information sharing;
Security;
Smart grid;
59.
An applied methodology for information security and assurance: A study case for cloud computing
机译:
信息安全和保证的应用方法论:云计算的研究案例
作者:
Villalon-Fonseca Ricardo
;
Solano-Rojas Braulio J.
;
Marin-Raventos Gabriela
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
security of data;
UCR;
Universidad de Costa Rica;
assurance process;
cloud computing;
computer technologies;
hierarchical approach;
information assurance;
information security;
information technologies;
private cloud;
security controls;
security countermeasures;
security requirements;
security standards;
Cloud computing;
Computational modeling;
Hardware;
Information security;
Servers;
Standards;
Cloud Computing;
Information Assurance;
Methodology;
Requirement Analysis;
Security;
60.
Empirical study of automatic dataset labelling
机译:
自动数据集标记的实证研究
作者:
Aparicio-Navarro Francisco J.
;
Kyriakopoulos Konstantinos G.
;
Parish David J.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
computer network security;
feature selection;
telecommunication traffic;
unsupervised learning;
wireless LAN;
IEEE 802.11 network testbed;
automatic dataset labelling;
boundary threshold;
communication networks;
feature selection;
labelled network traffic datasets;
supervised intrusion detection systems;
training process;
unsupervised anomaly based IDS;
wireless-specific attacks;
IEEE 802.11 Standards;
Internet;
Intrusion detection;
Labeling;
Measurement;
Telecommunication traffic;
Training;
Automatic Labelling;
IEEE 802.11 Datasets;
Network Traffic Labelling;
Unsupervised Anomaly LDS;
61.
Implementation aspects of software guards: A case study
机译:
软件卫士的实现方面:一个案例研究
作者:
Osti Andre /A/.
;
Botelho Bruno /A/. P.
;
Uto Nelson
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
computer crime;
software fault tolerance;
Adobe flash applications;
malicious code;
self-checking algorithm;
self-checking algorithms;
software guards;
software piracy protection;
Data structures;
Equations;
Internet;
Registers;
Security;
Software;
Software algorithms;
Adobe Flash;
integrity check;
software guards;
software protection;
62.
Towards a model on security challenges during closed source software to OSS migrations
机译:
建立从开源软件到OSS迁移期间的安全挑战模型
作者:
Ajigini Olusegun Ademolu
;
van der Poll John /A/.
;
Kroeze Jan H.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
public domain software;
security of data;
source code (software);
CSS security aspects;
OSS antonym;
OSS migrations;
OSS security aspects;
closed source software;
open source software;
open source system migrations;
security challenges;
security threats;
source code redistribution;
Cascading style sheets;
Internet;
Open source software;
Operating systems;
Security;
Unified modeling language;
Closed source software;
Information protection;
Information security;
Open source software;
Summative content analysis;
security model;
sensitive information;
63.
A chaos-based authentication and key management scheme for M2M communication
机译:
基于混沌的M2M通信认证和密钥管理方案
作者:
Boubakri Wided
;
Abdallah Walid
;
Boudriga Noureddine
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
chaos;
cryptography;
radiofrequency identification;
M2M communication networks;
RFID;
autonomous fashion;
chaos-based authentication;
key management scheme;
machine to machine communication;
multicast traffics;
mutual authentication;
security architecture;
security attacks;
unicast traffics;
Authentication;
Chaotic communication;
Encryption;
Logic gates;
Public key;
Radiofrequency identification;
M2M;
RFI;
chaotic encryption;
key management;
64.
Software solutions for high-security voice and data communication for smartphones
机译:
用于智能手机的高安全性语音和数据通信的软件解决方案
作者:
Dressler P.
;
Fischer D.
;
Markscheffel B.
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
data communication;
security of data;
smart phones;
voice communication;
BlackBerry 10;
Germany;
Jadhav and Sonar model;
SecuSUITE;
SiMKo3;
cost-benefit ratio;
functionality;
high-security data communication;
high-security voice communication;
quality;
smartphones;
software selection;
software solutions;
terminal equipment;
vendor;
Data communication;
Encryption;
Smart phones;
Software;
Standards;
IT security;
catalogue of criteria;
high-security voice and data communication;
smartphone;
65.
Graphical and text based challenge questions for secure and usable authentication in online examinations
机译:
基于图形和文本的挑战性问题,用于在线考试中的安全和可用身份验证
作者:
Ullah Abrar
;
Xiao Hannan
;
Barker Trevor
;
Lilley Mariana
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
authorisation;
computer graphics;
knowledge based systems;
learning (artificial intelligence);
PBAF approach;
face-to-face interaction;
graphical challenge questions;
image-based graphical authentication;
impersonation attack;
knowledge-based authentication mechanisms;
login identifier;
online examination environments;
online learning environment;
passwords;
physical interaction;
profile based authentication framework;
secure authentication;
text based challenge questions;
traffic light system;
usable authentication;
Authentication;
Educational institutions;
Image recognition;
Internet;
Syntactics;
Usability;
Online learning;
authentication;
challenge questions;
examination;
profile;
security;
usability;
66.
NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic
机译:
NBA掩盖了HTTPS流量中隐藏的网络漏洞的利用
作者:
Homoliak Ivan
;
Ovsonka Daniel
;
Gregr Matej
;
Hanacek Petr
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
computer network security;
data mining;
pattern classification;
telecommunication traffic;
transport protocols;
AIPS;
ASNM network features;
Apache;
BadBlue;
DCOM RPC;
HTTP protocols;
HTTP secure protocol;
HTTPS protocols;
HTTPS traffic;
IDS;
NBA;
SNORT detection;
SNORT network features;
Samba;
advanced security network metrics;
automated intrusion prevention system;
binominal classification;
buffer overflow vulnerabilities;
classification accuracy;
data mining analysis;
hyper text transfer protocol;
legitimate traffic simulations;
obfuscated network buffer overflow attacks detection properties;
obfuscated network vulnerability exploitation;
polynominal classification;
virtual network environment;
Buffer overflows;
Data mining;
Feature extraction;
Internet;
Logic gates;
Protocols;
Servers;
IDS;
NBA;
buffer overflow;
network vulnerabilities;
protocol tunneling;
traffic obfuscation;
67.
Automation of detection of security vulnerabilities in web services using dynamic analysis
机译:
使用动态分析自动检测Web服务中的安全漏洞
作者:
Kumar Rahul
;
Indraveni K.
;
Goel Aakash Kumar
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
Web services;
XML;
data integrity;
security of data;
SOAP request model;
SOAP response model;
WSDL enumeration;
Web communications;
Web services;
XML format;
automatic security vulnerability detection;
automation script;
data integrity;
data maintenance;
dynamic analysis;
unchangeable dynamic vulnerabilities;
vulnerability classification;
Automation;
Payloads;
Security;
Simple object access protocol;
Testing;
XML;
Attack;
Automation;
Dynamic Analysis;
Enumeration;
Payload;
Response;
SOAP Request;
Security;
Testing;
Vulnerability;
WSDL;
Web Service;
XML;
68.
Traffic generator based on behavioral pattern
机译:
基于行为模式的流量生成器
作者:
Kacic Matej
;
Ovsonka Daniel
;
Hanacek Petr
;
Barabas Maros
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
computer network security;
telecommunication traffic;
transport protocols;
HTTP communication;
network traffic analysis;
network traffic generation;
predefined behavioral pattern;
reputation system;
Databases;
Generators;
Internet;
Protocols;
Telecommunication traffic;
Testing;
Timing;
Network traffic generator;
behavioral pattern;
http traffic;
malware injection;
security;
wireless;
69.
Towards E-democracy in the middle east: E-voting adoption
机译:
迈向中东电子民主:采用电子投票
作者:
Alomari Mohammad Kamel
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
government data processing;
politics;
House of Representative;
Jordan;
Middle East;
e-democracy;
e-government adoption model;
e-voting adoption;
election process;
governmental initiative;
online voting system;
people interaction;
voting procedures;
Computational modeling;
Electronic government;
Electronic voting;
Internet;
Nominations and elections;
Technological innovation;
Jordan;
adoption;
e-government;
e-voting;
technology;
70.
Security challenges of E-government adoption based on end users' perspective
机译:
基于最终用户角度的电子政务采用的安全挑战
作者:
Alharbi Nawaf
;
Papadaki Maria
;
Dowland Paul
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
government data processing;
human factors;
security of data;
UTAUT model;
e-government adoption;
e-government security;
e-government services;
end user perspective;
security challenges;
security-focused adoption model;
unified theory of acceptance and use of technology model;
user acceptance;
user awareness;
Adaptation models;
Educational institutions;
Electronic government;
Internet;
Privacy;
Security;
Adoption Models;
E-government Security;
Security Challenges;
UTAUT;
71.
A robust multicast authentication scheme based on asymmetric key signature
机译:
基于非对称密钥签名的鲁棒组播认证方案
作者:
Christianah /A/. Opayinka
;
Boniface K. Alese
;
Aderonke F. Thompson
;
Olufunso D. Alowolodu
;
Festus /A/. Osuolale
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cryptography;
digital signatures;
multicast communication;
asymmetric key signature;
computation overhead;
hash values;
information dispersal algorithm;
multicast message packet design;
multicast streams;
robust multicast packet authentication scheme;
signature amortization technique;
Authentication;
Cryptography;
Digital signatures;
Markov processes;
Packet loss;
Receivers;
Information Dispersal Algorithm;
Signature Amortization Technique;
multicast Authentication;
72.
A survey of cloud computing taxonomies: Rationale and overview
机译:
云计算分类法调查:基本原理和概述
作者:
Polash Fahad
;
Abuhussein Abdullah
;
Shiva Sajjan
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
cloud computing;
pattern classification;
security of data;
software performance evaluation;
CC taxonomy;
cloud computing concepts;
cloud computing taxonomies;
cloud computing terminology;
conceptual taxonomy;
performance taxonomy;
security taxonomy;
Cloud computing;
Computational modeling;
Hardware;
NIST;
Security;
Taxonomy;
cloud computing;
cloud performance;
cloud security;
cloud services;
taxonomy;
73.
A conceptual analysis of information security education, information security training and information security awareness definitions
机译:
信息安全教育,信息安全培训和信息安全意识定义的概念分析
作者:
Amankwa Eric
;
Loock Marianne
;
Kritzinger Elmarie
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
industrial training;
organisational aspects;
security of data;
conceptual analysis;
delivery method attribute;
employee education;
employee training;
focus attribute;
information security awareness;
information security education;
information security training;
purpose attribute;
reference point;
working definitions;
Computers;
Educational institutions;
Information security;
NIST;
Training;
information security awareness;
information security education;
information security training;
74.
Semantic variability modeling in business processes: A comparative study
机译:
业务流程中的语义可变性建模:比较研究
作者:
El Faquih Loubna
;
Sbai Hanae
;
Fredj Mounia
会议名称:
《International Conference for Internet Technology and Secured Transactions》
|
2014年
关键词:
business data processing;
information systems;
ontologies (artificial intelligence);
software product lines;
BPM reuse enhancement;
IT view;
business process alignment;
business process management;
business process reuse;
business view;
configurable process model configuration;
configurable process model creation;
configurable process models;
dynamic business environment;
evolving configurable process model;
human intervention;
information system alignment;
modeling language;
ontology;
process engineering;
semantic annotations;
semantic variability modeling;
service engineering;
software engineering domains;
software product line engineering;
Analytical models;
Business;
OWL;
Ontologies;
Semantics;
Software;
Unified modeling language;
Configurable process model;
Ontology;
Semantic;
Variability;
意见反馈
回到顶部
回到首页