Abstract is missing.
- An access control approach for privacy-preserving passive network monitoringGeorgios V. Lioudakis, Fotios Gogoulos, Anna Antonakopoulou, Aziz S. Mousas, Iakovos S. Venieris, Dimitra I. Kaklamani. 1-8 [doi]
- A conceptual framework for business driven integrationUgo Barchetti, Anna Lisa Guido, Luca Mainetti. 1-6 [doi]
- Detecting misbehaving nodes in MANET with an artificial immune system based on type-2 fuzzy setsAndrea Visconti, Hooman Tahayori. 1-2 [doi]
- Modeling Quality Management System: A multi-agent approachHajer Ben Mahmoud Dammak, Raouf Ketata, Taieb Ben Romdhane, Samir Ben Ahmed. 1-6 [doi]
- E-profile-based security for critical transactions in web applicationsJean Stephan, Nagi Wakim, Youakim Badr. 1-2 [doi]
- A semantic-based conversational agent frameworkKaren O Shea, Zuhair Bandar, Keeley A. Crockett. 1-8 [doi]
- Evaluation of question classification systems using differing featuresAli Harb, Michel Beigbeder, Jean-Jacques Girardot. 1-6 [doi]
- Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platformsLishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis. 1-8 [doi]
- Towards securing e-transactions in e-government systems of Saudi ArabiaAmina Gamlo, Omaima Bamasak. 1-7 [doi]
- Context-sensitive authorization for asynchronous communicationsVincent Hourdin, Jean-Yves Tigli, Stephane Lavirotte, Gaëtan Rey, Michel Riveill. 1-7 [doi]
- On the fractal characteristics of Internet network traffic and its utilization in covert communicationsRashiq Rafiq Marie, Jonathan M. Blackledge, Helmut E. Bez. 1-6 [doi]
- Improvement of authentication of anycast communicationChenglian Liu. 1-3 [doi]
- Security in Tele-Lab - Protecting an online virtual lab for security trainingChristian Willems, Wesam Dawoud, Thomas Klingbeil, Christoph Meinel. 1-7 [doi]
- Towards security goals in summative e-assessment securityKikelomo Maria Apampa, Gary Wills, David Argles. 1-5 [doi]
- Solving security issues using Information Security Awareness PortalAnnette Tolnai, Sebastiaan H. von Solms. 1-5 [doi]
- On the fly generation of mobile learning structured multimedia content from the webMohammed Alzaabi, Jawad Berri, Mohamed Jamal Zemerly. 1-7 [doi]
- The impact of information security on Latin AmericaJoel Mana Gonçalves, Fabio Neves Fernandes. 1-5 [doi]
- The elements influencing the online price dispersion on Iranian electronic retailersMahmoodreza Arefi, Amir Masoud Amini. 1-8 [doi]
- Efficient information retrieval via proxy caching mechanisms within a lossy environmentAnkit Anand, Xiao-Hong Peng, Richard Haywood. 1-6 [doi]
- A survey of SQL injection defense mechanismsKasra Amirtahmasebi, Seyed Reza Jalalinia, Saghar Khadem. 1-8 [doi]
- An expert system for stress managementAwanis Romli, Arnidcha P. Cha. 1-6 [doi]
- A project management ontology as a reference for e-Government projectsDemetrios Sarantis, Dimitris Askounis. 1-8 [doi]
- The VoIP intrusion detection through a LVQ-based neural networkZheng Lu, Taoxin Peng. 1-6 [doi]
- Water quality classification using neural networks: Case study of canals in Bangkok, ThailandSirilak Areerachakul, Siripun Sanguansintukul. 1-5 [doi]
- Multi-platform Bluetooth remote controlJarle Hansen, Gheorghita Ghinea. 1-2 [doi]
- Tree distribution classifier for automatic spoken Arabic digit recognitionNacereddine Hammami, Mokhtar Sellam. 1-4 [doi]
- A model and design of a security provider for Java applicationsAbdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer. 1-7 [doi]
- A new algorithm for controlling the mean queue length in a buffer with time varying arrival rateRasha Fares, Mike Woodward. 1-6 [doi]
- Dataset threshold for the performance estimators in supervised machine learning experimentsZanifa Omary, Fredrick Mtenzi. 1-8 [doi]
- Data virtualization in grid environments through the GRelC Data Access and Integration ServiceSandro Fiore, Alessandro Negro, Giovanni Aloisio. 1-6 [doi]
- The elephant in the room: Health information system security and the user-level environmentJuanita Fernando. 1-7 [doi]
- Pattern approach to business-to-business transactionsMoses Niwe, Janis Stirna. 1-6 [doi]
- Usability driven website design - An equine sports case studyRebecca Wilkins, Abel Nyamapfene. 1-6 [doi]
- Design of analog to digital converter for SDR (Software Defined Radio)K. V. Shriram, K. Venkateshwaran, V. Vaithiyanathan, V. Subashri. 1-5 [doi]
- The application of association rules algorithm on web search engineLu Nan, Zhou Chun-Guang, Lai-Zhong Cui. 1-8 [doi]
- An approach for developing comparative security metrics for healthcare organizationsSaid Jafari, Fredrick Mtenzi, Ronan Fitzpatrick, Brendan O Shea. 1-6 [doi]
- Server virtualization by user behaviour model using a data mining technique - A preliminary studyDulyawit Prangchumpol, Siripun Sanguansintukul, Panjai Tantasanawong. 1-5 [doi]
- Data retrieval from online social network profiles for social engineering applicationsSophia Alim, Ruqayya Abdulrahman, Daniel Neagu, Mick J. Ridley. 1-5 [doi]
- Signifying ontology complexity for knowledge sharingPornpit Wongthongtham, Behrang Zadjabbari. 1-5 [doi]
- Webometric analysis of Central Universities in India: A studySamir Kumar Jalal, Subal Chandra Biswas, Parthasarathi Mukhopadhyay. 1-9 [doi]
- A framework for online counter terrorismKiyana Zolfaghar, Arash Barfar, Shahriar Mohammadi. 1-5 [doi]
- RBStreX: Hardware XML parser for embedded systemChee Er Chang, Faisal Mohd-Yasin, Azhar Kassim Mustapha. 1-6 [doi]
- Compact and user-friendly representation of IPv6 addressing approach and maskingMuhammad Ehsan ul Haq, Muhammad Raza Perwaz, Kabeer Ahmed. 1-5 [doi]
- How does politics affect electronic healthcare adoptionZanifa Omary, Fredrick Mtenzi, Bing Wu. 1-8 [doi]
- Privacy and trust policies within SOADavid S. Allison, Hany F. El Yamany, Miriam A. M. Capretz. 1-6 [doi]
- Trust-based framework for security enhancement of P2PSIP communication systemsXianghan Zheng, Vladimir A. Oleshchuk. 1-6 [doi]
- IDS 3G - Third generation for intrusion detection: Applying forecasts and return on security investment to cope with unwanted trafficElvis Pontes, Adilson Eduardo Guelfi. 1-6 [doi]
- Freshness of Web search engines: Improving performance of Web search engines using data mining techniquesSadegh Kharazmi, Ali Farahmand Nejad, Hassan Abolhassani. 1-7 [doi]
- Low power design for silent pass authentication systemKhaled Alghathbar. 1 [doi]
- A networked registration scheme for enhancing trustJ. Adrian Pickering, Christopher Gutteridge. 1-5 [doi]
- Untraceability in the applied pi-calculusMyrto Arapinis, Tom Chothia, Eike Ritter, Mark Ryan. 1-6 [doi]
- Secure TCP/IP communications over DVB-S/DVB-RCS using chaotic sequencesDaniel Caragata, Safwan El Assad, Ion Tutanescu, Emil Sofron. 1-6 [doi]
- Yet another approach for dynamic web service compositionKaouthar Boumhamdi, Zahi Jarir. 1-5 [doi]
- Sequenced picture captcha: generation and its strength analysisAbhimanyu Jain, Ashish Jain, Aditya Raj, Tushar Pahwa. 1-8 [doi]
- Simplified link reliability enhancement schemes for wireless networksBoon Hoi Lim, Chong Eng Tan. 1-6 [doi]
- Cloud Computing: The impact on digital forensic investigationsStephen Biggs, Stilianos Vidalis. 1-6 [doi]
- Grasping contextual awareness inside aworkspace at the entrance to support group interactionHironori Egi, Hiroshi Shigeno, Ken-ichi Okada. 1-8 [doi]
- Open issues in RFID securityDang Nguyen Duc, Hyunrok Lee, Divyan M. Konidala, Kwangjo Kim. 1-5 [doi]
- The website censusAbdul Qadeer, Waqar Mahmood, Abdul Waheed. 1-6 [doi]
- Who regulates the regulator: Oversight of the Canadian Radio-television and telecommunications CommissionDaphne Rixon, Mary Furey. 1-9 [doi]
- Information security management in e-learningNajwa Hayaati Mohd Alwi, Ip-Shing Fan. 1-6 [doi]
- A heuristic-based runtime ranking for service compositionFrederico Guilherme Álvares de Oliveira Júnior, José Maria Parente de Oliveira. 1-6 [doi]
- A multi-agent development approach based on the MDA for modelling information systemsAziz El Fazziki, Sana Nouzri, Mohammed Sadgal. 1-6 [doi]
- E-government adoption in the Hashemite Kingdom of Jordan: Factors from social perspectivesMohammad Kamel Alomari, Kuldeep Sandhu, Peter Woods. 1-7 [doi]
- Towards secure information systems in online bankingZakaria Karim, Karim Mohammed Rezaul, Aliar Hossain. 1-6 [doi]
- A comparative study on client server technology and web technology in design and implementation of an embedded system used for monitoring and controlling of physical parametersSiddhartha Baruah, Anjana Kakoty Mahanta, Kanak Chandra Sarma. 1-6 [doi]
- Seamless integration of unidirectional broadcast links into QoS-constrained broadband Wireless Mesh Access NetworksMathias Kretschmer, Gheorghita Ghinea. 1-2 [doi]
- A formal security proof for the ZRTP ProtocolRiccardo Bresciani, Andrew Butterfield. 1-6 [doi]
- Light-weight implementation options for curve-based cryptography: HECC is also ready for RFIDJunfeng Fan, Lejla Batina, Ingrid Verbauwhede. 1-6 [doi]
- The composite algebraic structure over capabilities and actions of a systemPetr Pinkas, Jana Klecková. 1-6 [doi]
- The society and electronic government usageCyril Ehijie Azenabor, Mohammad Dastbaz, Charles A. Shoniregun, Chris Imafidon. 1-8 [doi]
- Architectures for identity managementMaya I. Chehab, Ali E. Abdallah. 1-8 [doi]
- Applying semantic web and user behavior analysis to enforce the intrusion detection systemYi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva, Ali Al-Dahoud. 1-5 [doi]
- Noisy password security techniqueKhaled Alghathbar, Hanan A. Mahmoud. 1-5 [doi]
- Critical analyses of alerts swamping and intrusion redundancyJoshua Ojo Nehinbe. 1-8 [doi]
- Multi-agent systems to build a computational middleware: A chatterbot case studyAndré Filipe de Moraes Batista, Maria das Graças Bruno Marietto, Gislene Cristina de O. Barbosa, Robson dos Santos França, Guiou Kobayashi. 1-2 [doi]
- Intelligent strategies and techniques for effective cyber security, infrastructure protection and privacyEmmanuel Hooper. 1-7 [doi]
- Detection of applications within encrypted tunnels using packet size distributionsGhulam Mujtaba, David Parish. 1-6 [doi]
- Web visualization support for disaster managementPetr Gajdos, Michal Radecký. 1-6 [doi]
- Performance evaluation of IEEE 802.11 DCF in comparison with IEEE 802.11e EDCABilal Rauf, M. Faisal Amjad, Kabeer Ahmed. 1-6 [doi]
- A simple high-availability multiple-agent key recovery systemKanokwan Kanyamee, Chanboon Sathitwiriyawong. 1-6 [doi]
- Towards development of a trust grid to balance between organization s interests and employee s privacyGhulam Ali, Noor Ahmed Shaikh, Zubair Ahmed Shaikh. 1-6 [doi]
- A research on the establishment of enterprise information architectureTsang-Hung Wu, Shyh-Chang Liu. 1-6 [doi]
- Towards successful 3D virtual learning - a case study on teaching human computer interactionIndika Perera, Colin Allison, Ross Nicoll, Thomas Sturgeon. 1-6 [doi]
- A secure audio steganography approachMazdak Zamani, Azizah Bt Abdul Manaf, Rabiah Bt Ahmad, Farhang Jaryani, Hamed Taherdoost, Akram M. Zeki. 1-6 [doi]
- Managing trade-offs between information loss and latency in real-time distributed systemsHoda Maalouf. 1-6 [doi]
- Grid resource discovery based on web servicesDeniz Cokuslu, Abdelkader Hameurlain, Kayhan Erciyes. 1-6 [doi]
- PKI and UDDI based trust centre: An attempt to improve web service securityWiem Rekik, Maher Khemakhem, Abdelfettah Belghith, Jacques Fayolle. 1-4 [doi]
- Practical study of a defense against low-rate TCP-targeted DoS attackPetros Efstathopoulos. 1-6 [doi]
- On securing privacy in composite web service transactionsRattikorn Hewett, Phongphun Kijsanayothin. 1-6 [doi]
- A computer based strategy design for automobile spare part logistics network optimizationGao Yi, Lin Xinda, Wang Dong. 1-6 [doi]
- Cross-domain classification: Trade-off between complexity and accuracyElisabeth Lex, Christin Seifert, Michael Granitzer, Andreas Juffinger. 1-6 [doi]
- State of the art in wireless LAN security - Results and implications of an empirical study concerning German companies and federal authoritiesDaniel Fischer, Bernd Markscheffel. 1-5 [doi]
- A novel true random binary sequence generator based On a chaotic double scroll oscillator combination with a pseudo random generator for cryptographic applicationsRichard A. Guinee, Marta Blaszczyk. 1-6 [doi]
- Traffic simulation and intelligent agentsMichal Radecký, Petr Gajdos. 1-6 [doi]
- Metrics for network forensics conviction evidenceAhmad Roshidi Amran, Raphael C.-W. Phan, David J. Parish. 1-8 [doi]
- An analysis of Information Systems Security Management (ISSM): The hierarchical organizations vs. emergent organizationAzah-Anir Norman, Norizan Mohd Yasin. 1-8 [doi]
- Software distribution as a malware infection vectorFelix Gröbert, Ahmad-Reza Sadeghi, Marcel Winandy. 1-6 [doi]
- Modified Slotted ALOHA protocol for RFID tag collisionsWei Zhou, Gaurav Kapoor, Selwyn Piramuthu. 1-2 [doi]
- A robust trust establishment framework using Dempster-Shafer theory for MANETsMohammad Karami, Mohammad Fathian. 1-7 [doi]
- Identity management in a mobile service orientated gridTom Kirkham, Kleopatra Konstanteli, Julian R. Gallop, Constantinos Lalos, Ian J. Johnson. 1-6 [doi]
- Object based dynamic separation of duty in RBACMuhammad Asif Habib, Christian Praher. 1-5 [doi]
- User interface in virtual learning environmentSiamak Barzegar, Mohammad Shojafar, Mohammad Reza Keyvanpour. 1-6 [doi]
- Email classification: Solution with back propagation techniqueTaiwo Ayodele, Shikun Zhou, Rinat Khusainov. 1-6 [doi]
- An integrated framework For modelling the adoptive behaviour of online product recommendationsWen-Shan Lin. 1-5 [doi]
- Community-oriented software engineering ontology evolutionPornpit Wongthongtham, Natsuda Kasisopha, Surasak Komchaliaw. 1-4 [doi]
- Detecting errors in digital communications with CRC codes implemented with FPGAConstantin Anton, Laurentiu Ionescu, Ion Tutanescu, Alin Mazare, Gheorghe Serban. 1-6 [doi]
- Use of the new Smart Identity Card to reinforce electronic voting guaranteesJusto Carracedo Gallardo, Emilia Pérez Belleboni. 1-6 [doi]
- Neural cryptography applied to key management protocol with mutual authentication in RFID systemsMacedo Firmino, Glaucio B. Brandao, Ana M. G. Guerreiro, Ricardo A. de M. Valentim. 1-6 [doi]
- Unduplicable quantum data medium based secret decryption and verificationLaszlo Gyongyosi, Sándor Imre. 1-5 [doi]
- Multiple criteria routing algorithms to increase durability path in mobile ad hoc networksShayesteh Tabatabaei. 1-5 [doi]
- Power games in RFID securityAri Juels. 1 [doi]
- Islamic knowledge ontology creationSaidah Saad, Naomie Salim, Hakim Zainal. 1-6 [doi]
- An extended multi-layered blackboard approach for the optimization of world-spanning query execution plansPeter Paul Beran, Erich Schikuta. 1-7 [doi]
- Lightweight implementation of Hummingbird cryptographic algorithm on 4-bit microcontrollersXinxin Fan, Honggang Hu, Guang Gong, Eric M. Smith, Daniel Engels. 1-7 [doi]
- Transactions and service level agreements for online music distributionAndreas Finger, Holger Meyer, Tim Rieger, Andreas Heuer. 1-7 [doi]
- Generic framework for recommendation system using collective intelligenceAlkesh Patel, Ajit Balakrishnan. 1-6 [doi]
- Knowledge Management (KM) in automobile: Application of a value chain (VC) approach using KM toolsSanath Sukumaran, M. V. Shetty. 1-6 [doi]
- RFID lightweight mutual authentication using shrinking generatorMouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly. 1-6 [doi]
- Towards spatial awareness in recommender systemsCarsten Stiller, Fred Roß, Christoph Ament. 1-7 [doi]
- An autonomic multiagent system ontology-based for management of security of informationRyan Ribeiro de Azevedo, Eric Rommel Dantas Galvão, Rubean Caitano dos Santos, Cleyton Mário de Oliveira Rodrigues, Fred Freitas, Marcelo J. Siqueira. 1-9 [doi]
- Verification of security properties of payment protocol using AVISPAA. R. Rizwana Shaikh, Satish Devane. 1-6 [doi]
- Secure biometric system for accessing home appliances via InternetArpita Mondal, Kaushik Roy 0002, Prabir Bhattacharya. 1-7 [doi]
- Aggregating policies in user centric, real-time and distributed applicationsThomas Kirkham, Ingo Dahn, David Chadwick, Marc Santos, Sandra Winfield. 1-6 [doi]
- Mixed load balance strategy to improve performance efficacy for three tiers Peer-to-Peer network topologyYi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva. 1-7 [doi]
- A study on Security Status Matrix (SSM) in Urban ComputingHoon Ko, Carlos Ramos. 1-6 [doi]
- Finding an effective and secured information system in e-commerce environmentMohammad Rahman, Karim Mohammed Rezaul, Aliar Hossain. 1-8 [doi]
- e-Conviviality in web systems by the wisdom of crowdsSascha Kaufmann, Christoph Schommer. 1-2 [doi]
- Intelligent email prediction system (IEPS)Taiwo Ayodele, Shikun Zhou, Rinat Khusainov. 1-5 [doi]
- Significant of features selection for detecting network intrusionsWafa S. Al-Sharafat, Reyadh Naoum. 1-6 [doi]
- Web 2.0 integration in a context-aware mobile PIM applicationTor-Morten Grønli, George Ghinea. 1-2 [doi]
- A novel approach using transformation techniques and decision tree algorithm on images for performing Digital WatermarkingSamir B. Patel, Tejas B. Mehta, Shrikant N. Pradhan. 1-6 [doi]
- MagicNET: XACML authorization policies for mobile agentsAlessandro Giambruno, Muhammad Awais Shibli, Sead Muftic, Antonio Lioy. 1-7 [doi]
- Scalable relational query results handling in service oriented architecturesAlexander Wöhrer, Thomas Lustig, Peter Brezany. 1-7 [doi]
- A rotary PIN entry scheme resilient to shoulder-surfingPeipei Shi, Bo Zhu, Amr M. Youssef. 1-7 [doi]
- Secure e-learning using a holistic and immune security frameworkJeffy Mwakalinga, Stewart Kowalski, Louise Yngström. 1-6 [doi]
- Network and content aware information managementSergey Boldyrev, Ian Oliver, Ronald Brown, Juha-Matti Tuupola, Arto Palin, Antti Lappeteläinen. 1-7 [doi]
- A comparison of search engine using tag title and abstract with CiteULike - An initial evaluationPijitra Jomsri, Siripun Sanguansintukul, Worasit Choochaiwattana. 1-5 [doi]
- Intertextual distance for Arabic texts classificationRami Ayadi, Mohsen Maraoui, Mounir Zrigui. 1-6 [doi]
- Syntactic learning for ESEDA.1, a tool for enhanced speech emotion detection and analysisJulia Sidorova, Toni Badia. 1-6 [doi]
- Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare dataRose Tinabo, Fredrick Mtenzi, Brendan O Shea. 1-6 [doi]