


default search action
7. EST 2017: Canterbury, UK
- Gareth Howells:

Seventh International Conference on Emerging Security Technologies, EST 2017, Canterbury, United Kingdom, September 6-8, 2017. IEEE 2017, ISBN 978-1-5386-4018-0 - Leila Benarous

, Benamar Kadri:
Ensuring privacy and authentication for V2V resource sharing. 1-6 - David Zooker Zabib, Maoz Vizentovski, Alexander Fish

, Osnat Keren, Yoav Weizman:
Vulnerability of secured IoT memory against localized back side laser fault injection. 7-11 - Solomon Ogbomon Uwagbole, William J. Buchanan

, Lu Fan:
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. 12-17 - Amal Durou, Ibrahim A. Aref

, Mosa Elbendak, Somaya Al-Máadeed
, Ahmed Bouridane:
Measuring and optimising performance of an offline text writer identification system in terms of dimensionality reduction techniques. 19-25 - Nicolas Sidere, Francisco Cruz, Mickaël Coustaty

, Jean-Marc Ogier:
A dataset for forgery detection and spotting in document images. 26-31 - Mohamed Hassan

, Lutta Pantaleon
:
An investigation into the impact of rooting android device on user data integrity. 32-37 - Charity Brown

, Charlie D. Frowd, Emma Portch:
Tell me again about the face: Using repeated interviewing techniques to improve feature-based facial composite technologies. 38-43 - Josh P. Davis

, Donata Tamonyte:
Masters of disguise: Super-recognisers' superior memory for concealed unfamiliar faces. 44-49 - John Gregor Fraser, Ahmed Bouridane:

Have the security flaws surrounding BITCOIN effected the currency's value? 50-55 - Rohan Durve, Ahmed Bouridane:

Windows 10 security hardening using device guard whitelisting and Applocker blacklisting. 56-61 - Shi Pan, Farzin Deravi:

Facial action units for presentation attack detection. 62-67 - Hongyuan Jing, Tanya Vladimirova:

Novel algorithm for landmine detection using C-scan ground penetrating radar signals. 68-73 - Samaneh Shafee

, Boshra Rajaei:
A secure steganography algorithm using compressive sensing based on HVS feature. 74-78 - Alexander J. Martin, Peter J. B. Hancock

, Charlie D. Frowd:
Breathe, relax and remember: An investigation into how focused breathing can improve identification of EvoFIT facial composites. 79-84 - Aristotle Onumo, Andrea J. Cullen, Irfan-Ullah Awan:

Empirical study of the impact of e-government services on cybersecurity development. 85-90 - Thomas Edward Allen Barton, M. A. Hannan Bin Azhar

:
Forensic analysis of popular UAV systems. 91-96 - Emma Portch, Karen Logan, Charlie D. Frowd:

Interviewing and visualisation techniques: Attempting to further improve EvoFIT facial composites. 97-102 - Julian Murphy, Gareth Howells, Klaus D. McDonald-Maier

:
Multi-factor authentication using accelerometers for the Internet-of-Things. 103-107 - David Beckett, Sakir Sezer:

HTTP/2 Cannon: Experimental analysis on HTTP/1 and HTTP/2 request flood DDoS attacks. 108-113 - Yazeed Alkhurayyif

, George R. S. Weir:
Readability as a basis for information security policy assessment. 114-121 - Muhammad Yusof, Madihah Mohd Saudi

, Farida Ridzuan
:
A new mobile botnet classification based on permission and API calls. 122-127 - David Beckett, Sakir Sezer:

HTTP/2 Tsunami: Investigating HTTP/2 proxy amplification DDoS attacks. 128-133 - Adrian Stoica

, Yumi Iwashita, Christopher Assad, Michael S. Ryoo, Gareth Howells:
A holistic approach to interpreting human states in smart environments providing high quality of life. 133-137 - Atiku Abubakar

, Bernardi Pranggono
:
Machine learning based intrusion detection system for software defined networks. 138-143 - Adedayo Odesile, Geethapriya Thamilarasu:

Distributed intrusion detection using mobile agents in wireless body area networks. 144-149 - Adewale Adetomi, Godwin Enemali

, Tughrul Arslan:
Towards an efficient intellectual property protection in dynamically reconfigurable FPGAs. 150-156 - Sotirios Chatzidimitriadis

, Paul Oprea, Michael Gillham, Konstantinos Sirlantzis
:
Evaluation of 3D obstacle avoidance algorithm for smart powered wheelchairs. 157-162 - Alaa S. Al-Waisy

, Rami Qahwaji
, Stanley S. Ipson, Shumoos Al-Fahdawi
:
A multimodal biometrie system for personal identification based on deep learning approaches. 163-168 - Hamed Alsufyani, Sanaul Hoque

, Farzin Deravi:
Automated skin region quality assessment for texture-based biometrics. 169-174 - Supriya Yadav, Gareth Howells:

Analysis of ICMetrics features/technology for wearable devices IOT sensors. 175-178 - Khattab M. Ali Alheeti

, Klaus D. McDonald-Maier
:
An enhanced AODV protocol for external communication in self-driving vehicles. 179-184 - Melanie Pitchford, Danielle Green, Charlie D. Frowd:

The impact of misleading information on the identifiability of feature-based facial composites. 185-190 - Redouane Khemmar, Fabien Bonardi, Jean-Yves Ertaud, Xavier Savatier:

Biometrie authentication platform-based multisensor fusion. 191-195 - N. Poornima, Seetharaman Gopalakrishnan, Tughrul Arslan, T. N. Prabakar

, M. Santhi:
Design of R3TOS based reliable low power network on chip. 196-203 - Vassilis Prevelakis, Wael Adi:

LS-ARP: A lightweight and secure ARP. 204-208 - Ayoub Mars, Wael Adi, Saleh Mulhem, Emad Hamadaqa:

Random stream cipher as a PUF-like identity in FPGA environment. 209-214 - Saleh Mulhem, Wael Adi, Ayoub Mars, Vassilis Prevelakis:

Chaining trusted links by deploying secured physical identities. 215-220 - Emad Hamadaqa, Ayoub Mars, Wael Adi, Saleh Mulhem:

Clone-resistant vehicular RKE by deploying SUC. 221-225

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














