Abstract is missing.
- Metadata extraction and classification of YouTube videos using sentiment analysisShanta Rangaswamy, Shubham Ghosh, Srishti Jha, Soodamani Ramalingam. 1-2 [doi]
- Vulnerabilities of biometric systems integrated in mobile devices: An evaluationInes Goicoechea-Telleria, Judith Liu-Jimenez, Raul Sánchez-Reillo, Wendy Ponce-Hernandez. 1-8 [doi]
- The Prom Problem: Fair and privacy-enhanced matchmaking with identity linked wishesDwight Home, Suku Nair. 1-8 [doi]
- Computer network security: Then and nowEdward L. Witzke. 1-7 [doi]
- Limit state earned value analysis impact on network security project management decisionsMichael Staley. 1-7 [doi]
- On the application of symbolic regression and genetic programming for cryptanalysis of symmetric encryption algorithmTomas Smetka, Ivan Homoliak, Petr Hanácek. 1-8 [doi]
- Extending abstraction-refinement methods for compliance checking of inter-organizational business processes with incomplete informationAndrea Callia D'Iddio, Christian H. Schunck, Franco Arcieri, Maurizio Talamo. 1-7 [doi]
- On the evaluation of human ratings for signature recognitionDerlin Morocho, Javier Hernandez-Ortega, Aythami Morales, Julian Fiérrez, Javier Ortega-Garcia. 1-5 [doi]
- System for monitoring natural disasters using natural language processing in the social network TwitterMiguel Maldonado, Darwin Alulema, Derlin Morocho, Marida Proano. 1-6 [doi]
- Cryptographic library performance comparison for instant messaging system centralized dataR. Camilo Logreira, Z. Jimmy Florez, Mario Muñoz. 1-5 [doi]
- Vehicle detection for traffic flow analysisS. Ramalingam, V. Varsani. 1-8 [doi]
- Architecture of instant messaging systems for secure data transmisionJimmy Anderson Florez Zuluaga, R. Camilo Logreira, Mario Muñoz, Jesus Francisco Vargas Bonilla. 1-7 [doi]
- Base camp quality of life standardization and improvementPatrick K. Kuiper, Stephan E. Kolitz, Vahid Tarokh. 1-8 [doi]
- Airport security system standards development: Challenges and outcomesChrister J. Wilkinson, Art Kosatka. 1-6 [doi]
- Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributesRazieh Nokhbeh Zaeem, Suratna Budalakoti, K. Suzanne Barber, Muhibur Rasheed, Chandrajit Bajaj. 1-8 [doi]
- Underwater threat detection and tracking using multiple sensors and advanced processingAndy Meecham, Tim Acker. 1-7 [doi]
- Digital flight plans for server access control: Restricting anomalous activity with path-based declarations of intentionsRonald Loui, Lucinda Caughey. 1-6 [doi]
- Interaction evaluation of a mobile voice authentication systemOscar Miguel-Hurtado, Ramon Blanco-Gonzalo, Richard Guest, Chiara Lunerti. 1-8 [doi]
- The influence of stress on biometric signature stabilityVladimir Smejkal, Ladislav Sieger, Jindrich Kodl. 1-5 [doi]
- Field trial results using a novel integration of unique millimeterwave Doppler radar for high performance non-obtrusive life sign (breathing and heart beating) monitoring of high suicide risk prisonner in observation cellAndre Gagnon. 1-9 [doi]
- Gait recognition using smartphonePablo Fernández López, Judith Liu-Jimenez, Carlos Sanchez-Redondo, Raul Sánchez-Reillo. 1-7 [doi]
- A modern approach to security: Using systems engineering and data-driven decision-makingLester A. Cano. 1-5 [doi]
- Evidence of correlation between fingerprint quality and skin attributesRyan Hancock, Stephen Elliott. 1-4 [doi]
- Biometric encryption system for increased securityRanjith Jayapal, Pramod. 1-3 [doi]
- A comparative analysis on the performance of static handwritten verification systems on realistic scenariosRodrigo Ros-Gomez, Helga C. Quiros-Sandoval, Ramon Blanco-Gonzalo, Raul Sánchez-Reillo. 1-7 [doi]
- Transitioning security software and hardware systems for use on unsecured or externally connected networksRyan Kulchyski. 1-3 [doi]
- An integrated multidisciplinary model for security management and related supporting integrated technological systemFabio Garzia. 1-8 [doi]
- Human activity recognition using optical flow based feature setS. Santhosh Kumar, Mala John. 1-5 [doi]
- Human interaction recognition through deep learning networkS. Jeba Berlin, Mala John. 1-4 [doi]
- Biometric identification via retina scanning with liveness detection using speckle contrast imagingNazariy K. Shaydyuk, Timothy Cleland. 1-5 [doi]
- Automated comparison of X-ray images for cargo scanningWicher Visser, Adrian Schwaninger, Diana Hardmeier, Alexander Flisch, Marius Costin, Caroline Vienne, Frank Sukowski, Ulf Hassler, Irene Dorion, Abraham Marciano, Ger Koomen, Micha Slegt, Andrea Cesare Canonica. 1-8 [doi]
- An Internet of Everything based integrated security system for smart archaeological areasFabio Garzia, Luca Papi. 1-8 [doi]
- A fuzzy interval valued fusion technique for multi-modal 3D face recognitionSoodamani Ramalingam, Uma Maheswari. 1-8 [doi]
- Dealing with occlusions in face recognition by region-based fusionEster Gonzalez-Sosa, Rubén Vera-Rodríguez, Julian Fiérrez, Javier Ortega-Garcia. 1-6 [doi]
- The development of a test harness for biometric data collection and validationMichael E. Brockly, Stephen J. Elliott, Robert W. Proctor, Richard M. Guest. 1-7 [doi]
- Evidence accrual technique for information assuranceStephen C. Stubberud, Kathleen A. Kramer. 1-6 [doi]
- Intrusion prevention system of automotive network CAN busSam Abbott-McCune, Lisa A. Shay. 1-8 [doi]
- Online and offline conformance checking of inter-organizational business processes with incomplete process logsAndrea Callia D'Iddio, Christian H. Schunck, Franco Arcieri, Maurizio Talamo. 1-8 [doi]
- Techniques in hacking and simulating a modem automotive controller area networkSam Abbott-McCune, Lisa A. Shay. 1-7 [doi]
- Threat Image Projection (TIP) into X-ray images of cargo containers for training humans and machinesThomas W. Rogers, Nicolas Jaccard, Emmanouil D. Protonotarios, James Ollier, Edward J. Morton, Lewis D. Griffin. 1-7 [doi]
- A new approach to automatic signature complexity assessmentOscar Miguel-Hurtado, Richard Guest, Thomas Chatzisterkotis. 1-7 [doi]
- Challenges to securing the Internet of ThingsWilliam M. S. Stout, Vincent E. Urias. 1-8 [doi]
- Consensus forecasting of zero-day vulnerabilities for network securityDavid Last. 1-8 [doi]
- A novel long-range perimeter security sensor based on hybrid michelson and Mach-Zehnder interferometersKeith Harman, Shailesh Singh. 1-8 [doi]
- A novel DdTS technology based on fiber optics for early leak detection in pipelinesChaofan Wang, Michael Olson, Nyambuu Doijkhand, Shailesh Singh. 1-8 [doi]
- Mission success: Assured communications and agile organizationsMarius S. Vassiliou, David S. Alberts, Syed Shah. 1-7 [doi]
- The Internet of Everything based integrated security system of the World War One Commemorative Museum of Fogliano Redipuglia in ItalyFabio Garzia, Luigivalerio Sant'Andrea. 1-8 [doi]
- Detection of UAV hijacking and malfunctions via variations in flight data statisticsJason McNeely, Michael Hatfield, Abir Hasan, Nusrat Jahan. 1-8 [doi]
- A secure order-preserving indexing scheme for outsourced dataSomayeh Sobati Moghadam, Gérald Gavin, Jérôme Darmont. 1-7 [doi]
- Tamper evident tape integrity analyzerEd Rao, Jim Remer. 1-6 [doi]
- RSA based biometric encryption system using FPGA for increased securityMichael Bourg, Pramod Govindan. 1-4 [doi]
- MTD assessment framework with cyber attack modelingBrian P. Van Leeuwen, William M. S. Stout, Vincent Urias. 1-8 [doi]
- Covert ground and port surveillance using Hyperbox®: Rayleigh backscattering from fiber opticsJefferson E. Odhner. 1-5 [doi]