Abstract is missing.
- Real-time Security & Dependability monitoring: Make it a bundleLuigi Coppolino, Salvatore D'Antonio, Valerio Formicola, Luigi Romano. 1-6 [doi]
- Effectiveness in open-set speaker identificationRawande Karadaghi, Heinz Hertlein, Aladdin M. Ariyaeeinia. 1-6 [doi]
- EMBERS: EpheMeral biometrically enhanced real-time location SystemSung Choi, Michael Bierma, Yung Ryn Choe, David Zage. 1-6 [doi]
- RHU Keystroke: A mobile-based benchmark for keystroke dynamics systemsMohamad El-Abed, Mostafa Dafer, Ramzi El Khayat. 1-4 [doi]
- Transparent cut detection sensor: Proposal of the security device that makes information leakage by photo/video shooting diffucultMasaki Fujikawa, Ryosuke Kamai, Sou Tsunetsugu, Michiko Ogawa. 1-6 [doi]
- On the effect of time efficiency in DSV under stressRamon Blanco-Gonzalo, Raul Sánchez-Reillo, Norman Poh. 1-5 [doi]
- A probabilistic framework for improved password strength metricsJavier Galbally, Iwen Coisel, Ignacio Sanchez. 1-6 [doi]
- Characteristics of buffer overflow attacks tunneled in HTTP trafficIvan Homoliak, Daniel Ovsonka, Karel Koranda, Petr Hanácek. 1-6 [doi]
- Low computational cost multilayer graph-based segmentation algorithms for hand recognition on mobile phonesDaniel de Santos Sierra, Miguel F. Arriaga-Gómez, Gonzalo Bailador, Carmen Sanchez-Avila. 1-5 [doi]
- Secure faults detection for preventing fire risk in PV systemsSimona Capparella, Maria Carmen Falvo. 1-5 [doi]
- Machine actionable indicators of compromiseDoug Rhoades. 1-5 [doi]
- An anti-intrusion protection barrier based on 2D radar technologySara Marina Salvador, Riccardo Maggiora, Daniele Milanesio, Giorgio Rodighiero. 1-4 [doi]
- A model for development, transition and technology transfer leading to commercialization of security technologyEd Rao, Jim Remer, Doug Bauer. 1-5 [doi]
- A comparative study on texture and surface descriptors for ear biometricsAnika Pflug, Pascal Nicklas Paul, Christoph Busch. 1-6 [doi]
- Securing software cryptographic primitives for embedded systems against side channel attacksGiovanni Agosta, Alessandro Barenghi, Gerardo Pelosi. 1-6 [doi]
- Assessment of the authenticity of Dynamic Biometric Signature: The results of experimentsVladimir Smejkal, Jindrich Kodl. 1-5 [doi]
- Biometrics within the SuperIdentity project: A new approach to spanning multiple identity domainsRichard M. Guest, Oscar Miguel-Hurtado, Sarah V. Stevenage, Greg J. Neil, Sue Black. 1-6 [doi]
- A low-resource 32-bit datapath ECDSA design for embedded applicationsNoura Ben Hadjy Youssef, Wajih El Hadj Youssef, Mohsen Machhout, Rached Tourki, Kholdoun Torki. 1-6 [doi]
- Supply chain lifecycle decision analyticsGio Kao, Han Lin, Brandon Eames, Jason J. Haas, Alexis Fisher, John Michalski, Jon Blount, Jason R. Hamlet, Erik Lee, John Gauthier, Gregory Wyss, Ryan Helinski, Dustin Franklin. 1-7 [doi]
- Advanced portal-based multistatic millimeter-wave radar imaging for person security screeningCarey M. Rappaport, Borja Gonzalez-Valdes, José Ángel Martínez Lorenzo. 1-5 [doi]
- Rapid inspection of general aviation aircraft for security threats and contrabandDan Cristian Dinca, Jeffrey Schubert. 1-5 [doi]
- Enhancing security in public transportation services of Roma: The PANDORA systemPierluigi Pelargonio, Marco Pugliese. 1-6 [doi]
- TARGI - A novel tool and method for target identificationTereza Malachova, Jindrich Malach, Zdenek Vintr. 1-5 [doi]
- System on Chip (SoC): New generation of video surveillance systemsJosep Aguilera, Fernan Gallego, Carles Silva. 1-5 [doi]
- Impact of character spacing on the performance of Automatic Number Plate Recognition (ANPR) systems through simulationS. Ramalingam, M. Rhead, R. Gurney. 1-6 [doi]
- Automatic optical reading of passport informationFernando Martín Rodríguez. 1-4 [doi]
- A reasoning approach for modelling and predicting terroristic attacks in urban environmentsFrancesco Archetti, Divna Djordjevic, Ilaria Giordani, Raul Sormani, Francesco Tisato. 1-6 [doi]
- Privacy leakages in Smart Home wireless technologiesIgnacio Sanchez, Riccardo Satta, Igor Nai Fovino, Gianmarco Baldini, Gary Steri, David Shaw, Andrea Ciardulli. 1-6 [doi]
- Preventing real-world relay attacks on contactless devicesMartin Henzl, Petr Hanácek, Matej Kacic. 1-6 [doi]
- Liveness detection for biometric authentication in mobile applicationsZahid Akhtar, Christian Micheloni, Gian Luca Foresti. 1-6 [doi]
- Investigating multimedia contentsAlessia De Rosa, Alessandro Piva, Marco Fontani, Massimo Iuliani. 1-6 [doi]
- Security issues for data sharing and service interoperability in eHealth systems: The Nu.Sa. test bedEmanuele Frontoni, Marco Baldi, Primo Zingaretti, Vincenzo Landro, Paolo Misericordia. 1-6 [doi]
- Best practices for the security evaluation of biometric systemsBelen Fernandez-Saavedra, Raul Sánchez-Reillo, Judith Liu-Jimenez, Jorge Gutierrez Ruiz. 1-6 [doi]
- Automatic security system for recognizing unexpected motions through video surveillanceFlavia Demarinis, Antonella Accettura, Fabio Garzia, Roberto Cusani. 1-5 [doi]
- A fidelity framework for small arms combatMark Murton, Paul Johnston, Russell Waymire, Deborah Belasich. 1-7 [doi]
- Dependencies analysis in emergency scenariosRoberto Setola, Domenico Lorusso, Maria Carla De Maggio. 1-6 [doi]
- A safer way to share a car based on SNS to increase use efficiency of released vehiclesMyunghee Son, Okgee Min, Jonghyun Kim, Sung Hoon Baek. 1-6 [doi]
- Gait biometrics with a Microsoft Kinect sensorJoanna Putz-Leszczynska, Miroslaw Granacki. 1-5 [doi]
- An on-line intrusion detection approach to identify low-rate DoS attacksMaurizio Aiello, Enrico Cambiaso, Maurizio Mongelli, Gianluca Papaleo. 1-6 [doi]
- A comparative survey on supervised classifiers for face recognitionMiguel F. Arriaga-Gómez, Ignacio de Mendizábal-Vázquez, Rodrigo Ros-Gomez, Carmen Sanchez-Avila. 1-6 [doi]
- A novel background subtraction method based on color invariants and grayscale levelsLorena Guachi, Giuseppe Cocorullo, Pasquale Corsonello, Fabio Frustaci, Stefania Perri. 1-5 [doi]
- Evaluation of wavelet measures on automatic detection of emotion in noisy and telephony speech signalsJuan Camilo Vásquez-Correa, N. Garcia, Jesus Francisco Vargas Bonilla, Juan Rafael Orozco-Arroyave, Julián David Arias-Londoño, M. O. Lucia Quintero. 1-6 [doi]
- Security challenges in building automation and SCADAAlessio Antonini, Alessandro Barenghi, Gerardo Pelosi, Saman A. Zonouz. 1-6 [doi]
- Secret key sharing by means of reconfigurable antenna systemsDaniele Pinchera, Marco Donald Migliore. 1-3 [doi]
- GPU: Application for CCTV systemsVictor Bautista Saiz, Fernan Gallego. 1-4 [doi]
- Partial crypto-reconfiguration of nodes based on FPGA for WSNL. A. Cardona, B. Lorente, C. Ferrer. 1-4 [doi]
- Leakage-resilient memory-based physical unclonable function using phase change materialLe Zhang, Chip-Hong Chang, Alessandro Cabrini, Guido Torelli, Zhi-Hui Kong. 1-6 [doi]
- Towards Security as a Service (SecaaS): On the modeling of Security Services for Cloud ComputingAngelo Furfaro, Alfredo Garro, Andrea Tundis. 1-6 [doi]
- The multisensory integrated modules for trainingRoberto Mugavero, Giovanni Saggio, Valentina Sabato, Mariano Bizzarri. 1-6 [doi]
- Quantitative evaluation of attack/defense scenarios through Decision Network modelling and analysisDaniele Codetta Raiteri, Luigi Portinale, Roberta Terruggia. 1-6 [doi]
- Bridging Gaps: An application of feature warping to online signature verificationAndreas Nautsch, Christian Rathgeb, Christoph Busch. 1-6 [doi]
- Instruction set extensions of AES algorithms for 32-bit processorsNoura Ben Hadjy Youssef, Wajih El Hadj Youssef, Mohsen Machhout, Rached Tourki, Kholdoun Torki. 1-5 [doi]
- An investigation into biometric signature capture device performance and user acceptanceMichael Brockly, Stephen J. Elliott, Jarron Burdine, Michael Frost, Matthew Riedle, Richard M. Guest. 1-5 [doi]
- Strengths, weaknesses and recommendations in implementing biometrics in mobile devicesRaul Sanchez-Reillo, Daniel Sierra-Ramos, Roberto Estrada-Casarrubios, Jose A. Amores-Duran. 1-6 [doi]
- Security risk assessment of process plants: The role of layoutRoberto Bubbico, Barbara Mazzarotta. 1-6 [doi]
- Simulating the impact of remote screening on search comb capacityAndy Belyavin. 1-6 [doi]
- An efficient DCT-SVD based algorithm for digital image watermarkingJustin Varghese, Omer Bin Hussain, Bijoy Babu, Jamshid M. Basheer, Subash Saudia, Mohamed Ramadan Saadi, Mohamed Samiulla Khan. 1-6 [doi]
- Developing an industry standard for data communications between PIDS equipment and third party systemsJeremy Weese. 1-3 [doi]
- Web-based interface for real-time movement monitoringOndrej Kainz, Frantisek Jakab. 1-4 [doi]
- The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced securityApostolis Zarras. 1-6 [doi]
- Security and usability of authenticating process of online banking: User experience studyMaha M. Althobaiti, Pam J. Mayhew. 1-6 [doi]
- Enhancing transport security: Characterization and identification of the main security challenges in 5 transport subsectorsSimona Cavallini, Francesca D'Onofrio, Sara Bouchon, Claudia Giusto. 1-6 [doi]
- A framework along with guidelines for designing secure mobile enterprise applicationsBasel Hasan, Viktor Dmitriyev, Jorge Marx Gómez, Joachim Kurzhöfer. 1-6 [doi]
- Automated dependability analysis of a HDPE reactorEl-Arkam Mechhoud, Mounira Rouainia. 1-5 [doi]
- Evacuation study by crowd dynamics micro-simulation to support disaster prevention and management: The case of SIMULATOR projectSara Manzoni, Simone Sterlacchini. 1-6 [doi]
- Aerial surveillance and airborne remote sensing techniques in Guardia di Finanza: An operational experience: Guardia di Finanza and CRdC BENECON, police officers and university researchers to protect and safeguard social fairness and legalityFlaviano Tessitore. 1-6 [doi]
- Energy-resolving photon-counting detectors in CT based explosive detection systems (EDS): Can additional material signatures be extracted to help the detection task?Sondre Skatter, Stephan Olesinski. 1-6 [doi]
- Skype traffic detection: A decision theory based toolMario Di Mauro, Maurizio Longo. 1-6 [doi]
- Revealing fire survivors hidden behind smoke and flames by IR active imaging systemsVittorio Bianco, Melania Paturzo, A. Finizio, Lisa Miccio, Pietro Ferraro. 1-3 [doi]
- A machine learning approach for Twitter spammers detectionClaudia Meda, Federica Bisio, Paolo Gastaldo, Rodolfo Zunino. 1-6 [doi]
- An electrical grid and its SCADA under cyber attacks: Modelling versus a Hybrid Test BedEster Ciancamerla, B. Fresilli, Michele Minichino, T. Patriarca, Serguei Iassinovski. 1-6 [doi]
- A framework for Internet data real-time processing: A machine-learning approachMario Di Mauro, Cesario Di Sarno. 1-6 [doi]
- Face image abstraction by Ford-Fulkerson algorithm and invariant feature descriptor for human identificationDakshina Ranjan Kisku, Debanjan Chatterjee, S. Trivedy, Massimo Tistarelli. 1-6 [doi]
- Video compression technique impact on efficiency of person identification in CCTV systemsStanislav Vítek, Milos Klima, Lukas Krasula. 1-5 [doi]
- Surrogate techniques for testing fraud detection algorithms in credit card operationsAddisson Salazar, Gonzalo Safont, Luis Vergara. 1-6 [doi]
- Security monitoring based on joint automatic speaker recognition and blind source separationMichele Scarpiniti, Fabio Garzia. 1-6 [doi]
- The use of hyperspectral analysis for ink identification in handwritten documentsAythami Morales, Miguel A. Ferrer, Moisés Díaz Cabrera, Cristina Carmona, Gordon L. Thomas. 1-5 [doi]
- Supervised classification methods applied to keystroke dynamics through mobile devicesIgnacio de Mendizábal-Vázquez, Daniel de Santos Sierra, Javier Guerra Casanova, Carmen Sanchez-Avila. 1-6 [doi]
- Certification of airport security officers using multiple-choice tests: A pilot studyDiana Hardmeier, Catharina Muller, Adrian Schwaninger. 1-6 [doi]
- A multi-method approach towards identifying situational factors and their relevance for X-ray screeningStefan Michel, Nicole Hattenschwiler, Milena Kuhn, Nadine Strebel, Adrian Schwaninger. 1-6 [doi]
- Screening technology based on DMS as an effective tool to help protect public and vital infrastructure from threatsA. Zalewska, T. Sikora, A. Buczkowska. 1-4 [doi]
- Sensitivity analysis and countermeasures for transformation-based location obfuscationL. Gonzalez, Mayra Zurbarán, Pedro M. Wightman, Daladier Jabba, Miguel Jimeno, Eduardo Zurek. 1-6 [doi]
- Centralized security governance for air navigation services: Innovative strategies to confront emerging threats against Civil AviationFrancesco Di Maio. 1-6 [doi]
- Temporal analysis of intrusion detectionMofreh A. Hogo. 1-6 [doi]