Abstract is missing.
- Malware family identification with BIRCH clusteringGregorio Pitolli, Leonardo Aniello, Giuseppe Laurenza, Leonardo Querzoni, Roberto Baldoni. 1-6 [doi]
- Accurate multi-target surveillance system over wide areasFrancisco-Javier Romero-Paisano, Félix Pérez-Martínez, Susan Martinez-Cordero, Jaime Calvo-Gallego. 1-6 [doi]
- Voice and face interaction evaluation of a mobile authentication platformOscar Miguel-Hurtado, Richard Guest, Chiara Lunerti. 1-6 [doi]
- Language dependent challenge-based keystroke dynamicsPatrick Bours, Sukanya Brahmanpally. 1-6 [doi]
- Unmanned aerial system detection and assessment through temporal frequency analysisBryana L. Woo, Gabriel C. Birch, Jaclynn J. Stubbs, Camron Kouhestani. 1-5 [doi]
- Analysis of the attack potential in low cost spoofing of fingerprintsInes Goicoechea-Telleria, Judith Liu-Jimenez, Helga C. Quiros-Sandoval, Raul Sánchez-Reillo. 1-6 [doi]
- Token-based policy management (TBPM): A reliable data classification and access management schema in cloudsFaraz Fatemi Moghaddam, Philipp Wieder, Ramin Yahyapour. 1-6 [doi]
- Person authentication using nearest feature line embedding transformation and biased discriminant analysisCheng-Ta Hsieh, Chin-Chuan Han, Chang-Hsing Lee, Kuo-Chin Fan. 1-5 [doi]
- Ensuring information security by using Haskell's advanced type systemMatteo Di Pirro, Mauro Conti, Riccardo Lazzeretti. 1-6 [doi]
- Imaging time series for internet of things radio frequency fingerprintingGianmarco Baldini, Gary Steri, Raimondo Giuliani, Claudio Gentile. 1-6 [doi]
- A quantitative CVSS-based cyber security risk assessment methodology for IT systemsM. Ugur Aksu, M. Hadi Dilek, Emin Islam Tatli, Kemal Bicakci, H. Ibrahim Dirik, M. Umut Demirezen, Tayfun Aykir. 1-8 [doi]
- Mobile device for detection of biological threatTomasz Sikora, Lukasz Osuchowski, Miroslaw Maziejuk, Wieslaw Lisowski. 1-4 [doi]
- The Shakespeare experiment: Preliminary results for the recognition of a person based on the sound of walkingPatrick Bours, Adrian Evensen. 1-6 [doi]
- A comparative study of palmprint feature extraction methods for contact-less biometrics under different environmental conditionsBelén Ríos-Sánchez, Miguel Viana-Matesanz, Carmen Sanchez-Avila. 1-6 [doi]
- Person re-identification from CCTV silhouettes using generic fourier descriptorRawabi Alsedais, Richard M. Guest. 1-6 [doi]
- Stability of a dynamic biometric signature created on various devicesVladimir Smejkal, Jindrich Kodl, Ladislav Sieger, Frantisek Hortai, Petr Tesar. 1-5 [doi]
- How to implement EU data protection regulation for R&D on personal dataRaul Sánchez-Reillo, Ines Ortega-Fernandez, Wendy Ponce-Hernandez, Helga C. Quiros-Sandoval. 1-7 [doi]
- Encrypted computing: Speed, security and provable obfuscation against insidersPeter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001. 1-6 [doi]
- Competence measure in social networksSamar Muslah Albladi, George R. S. Weir. 1-6 [doi]
- Principal component analysis for ear-based biometric verificationDavid Querencias-Uceta, Belén Rios-Sánchez, Carmen Sanchez-Avila. 1-6 [doi]
- Image processing techniques for improving vascular hand biometricsPaloma Tirado-Martin, Ramon Blanco-Gonzalo, Alba Alvarez-Nieto, Alvaro Romero-Diaz. 1-5 [doi]
- Unique signatures from printed circuit board design patterns and surface mount passivesJason R. Hamlet, Mitchell T. Martin, Nathan J. Edwards. 1-6 [doi]
- AutoPass: An automatic password generatorFatma Al Maqbali, Chris J. Mitchell. 1-6 [doi]
- X-band ubiquitous radar system: First experimental resultsAlvaro Duque de Quevedo, Fernando Ibanez Urzaiz, Javier Gismero-Menoyo, Alberto Asensio-Lopez. 1-6 [doi]
- Understanding and granting android permissions: A user surveySelvakumar Ramachandran, Andrea Dimitri, Maulahikmah Galinium, Muhammad Tahir, Indirajith Viji Ananth, Christian H. Schunck, Maurizio Talamo. 1-6 [doi]
- Divide, recombine and conquer: Syntactic patterns-reassembly algorithm applied to password guessing processIwen Coisel, Ignacio Sanchez, Javier Galbally. 1-6 [doi]
- CIC-AB: Online ad blocker for browsersArash Habibi Lashkari, Amy Seo, Gerard Drapper Gil, Ali A. Ghorbani. 1-7 [doi]
- One leak will sink a ship: WebRTC IP address leaksNasser Mohammed Al-Fannah. 1-5 [doi]
- A tamper-resistant digital token-based rights management systemM. Fahim Ferdous Khan, Ken Sakamura. 1-6 [doi]
- Trustworthy design architecture: Cyber-physical systemSung Choi, Adrian Chavez, Marcos Torres, Cheolhyeon Kwon, Inseok Hwang. 1-9 [doi]
- Real-time behavioral DGA detection through machine learningFederica Bisio, Salvatore Saeli, Pierangelo Lombardo, Davide Bernardi, Alan Perotti, Danilo Massa. 1-6 [doi]
- Mobile biometrics: Towards a comprehensive evaluation methodologyAttaullah Buriro, Zahid Akhtar, Bruno Crispo, Sandeep Gupta. 1-6 [doi]
- Exploring automatic extraction of body-based soft biometricsRubén Vera-Rodríguez, Patricia Marin-Belinchon, Ester Gonzalez-Sosa, Pedro Tome, Javier Ortega-Garcia. 1-6 [doi]
- A multi-language approach towards the identification of suspicious users on social networksAndrea Tundis, Max Mühlhäuser. 1-6 [doi]
- Comparing e-learning and blended learning for threat detection in airport security X-ray screeningStefan Michel, Nicole Hattenschwiler, Melina Zeballos, Adrian Schwaninger. 1-6 [doi]
- SoTRAACE - Socio-technical risk-adaptable access control modelPedro Moura, Paulo Fazendeiro, Pedro Marques, Ana Ferreira. 1-6 [doi]
- Using deep learning neural networks for ECG based authenticationIlias Chamatidis, Aggeliki Katsika, Georgios Spathoulas. 1-6 [doi]
- Influence of walking in groups in gait recognitionPablo Fernández López, Jorge Sanchez-Casanova, Judith Liu-Jimenez, Carlos Morcillo-Marin. 1-6 [doi]
- Humans in the loop: Study of semi-automatic signature recognition based on attributesDerlin Morocho, Aythami Morales, Julian Fiérrez, Javier Ortega-Garcia. 1-5 [doi]
- Curvelets for contact-less hand biometrics under varied environmental conditionsBelén Ríos-Sánchez, Miguel Viana-Matesanz, Carmen Sanchez-Avila. 1-6 [doi]
- Relevance of visual inspection strategy and knowledge about everyday objects for X-ray baggage screeningYanik Sterchi, Nicole Hattenschwiler, Stefan Michel, Adrian Schwaninger. 1-6 [doi]
- Use case of waterwork physical protection system robustness evaluation as a part of Slovak critical infrastructureTomas Lovecek, Anton Siser, Ladislav Maris. 1-5 [doi]
- ARM: ANN-based ranking model for privacy and security analysis in smartphone ecosystemsMajid Hatamian, Jetzabel Serna. 1-6 [doi]
- The identification of mobile phones through the fingerprints of their built-in magnetometer: An analysis of the portability of the fingerprintsGianmarco Baldini, Gary Steri, Irene Amerini, Roberto Caldelli. 1-6 [doi]
- Detection of convective clouds using meteorological data fusion for aviation safety supportJimmy Anderson Florez Zuluaga, Jesus Francisco Vargas Bonilla. 1-8 [doi]
- VoKA: Voronoi K-aggregation mechanism for privacy in location-based information systemsMayra Zurbarán, Pedro M. Wightman. 1-6 [doi]
- Computational optical physical unclonable functionsGabriel C. Birch, Bryana L. Woo, Charles F. LaCasse, Jaclynn J. Stubbs, Amber L. Dagel. 1-6 [doi]
- An integrated internet of everything - Genetic algorithms controller - Artificial neural networks framework for security/safety systems management and supportFabio Garzia, Mara Lombardi, Soodamani Ramalingam. 1-6 [doi]
- Influence of changing the parameters of the camera system on video-based motion detectionAndrej Vel'as, Milan Kutaj, Martin Durovec. 1-5 [doi]
- Analysis of local binary patterns and uniform local binary patterns for palm vein biometric recognitionAlicia Aglio-Caballero, Belén Ríos-Sánchez, Carmen Sanchez-Avila, Maria Jose Melcon De Giles. 1-6 [doi]
- Technologies to enable cyber deceptionVincent E. Urias, William M. S. Stout, Jean Luc-Watson, Cole Grim, Lorie M. Liebrock, Monzy Merza. 1-6 [doi]
- The new communication network for an internet of everything based security/safety/general management/visitor's services for the Papal Basilica and Sacred Convent of Saint Francis in Assisi, ItalyMauro Gambetti, Fabio Garzia, Jesus Francisco Vargas Bonilla, Davide Ciarlariello, Miguel A. Ferrer, Sergio Fusetti, Mara Lombardi, Soodamani Ramalingam, Mahalingam Ramasamy, Simone Sacerdoti, Andrea Sdringola, Devi Thirupati, Marcos Faúndez-Zanuy. 1-6 [doi]
- Environmental effects on face recognition in smartphonesChiara Lunerti, Richard M. Guest, Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Jon Baker. 1-6 [doi]
- Cyber-physical risk management for PV photovoltaic plantsAlexander W. Miranda, Steven Goldsmith. 1-8 [doi]
- Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modelingMarcelo Antonio de Carvalho, Paulo Bandiera-Paiva. 1-8 [doi]
- Detection of anomalies in surveillance scenarios using mixture modelsAdrián Tomé, Luis Salgado. 1-4 [doi]
- Process monitoring on sequences of system call count vectorsMichael Dymshits, Benjamin Myara, David Tolpin. 1-5 [doi]
- Design of radio frequency subsystems of a ubiquitous radar in X bandFernando Ibanez Urzaiz, Alvaro Duque de Quevedo, Javier Gismero-Menoyo, Alberto Asensio-Lopez. 1-5 [doi]
- Challenges in detecting UAS with radarPierre Poitevin, Michel Pelletier, Patrick Lamontagne. 1-6 [doi]
- BotViz: A memory forensic-based botnet detection and visualization approachIman Sharafaldin, Amirhossein Gharib, Arash Habibi Lashkari, Ali A. Ghorbani. 1-8 [doi]
- Physical security assessment with convolutional neural network transfer learningJaclynn J. Stubbs, Gabriel C. Birch, Bryana L. Woo, Camron G. Kouhestani. 1-6 [doi]
- Cyber analysis emulation platform for wireless communication network protocolsBrian P. Van Leeuwen, John Eldridge, Vincent Urias. 1-6 [doi]
- ECG biosignals in biometric recognitionJorge Sanchez-Casanova, Antonio Miranda-Escalada, Raul Sánchez-Reillo, Pablo Bartolome-Molina. 1-6 [doi]
- CUDA-SSL: SSL/TLS accelerated by GPUWai-Kong Lee, Xian-Fu Wong, Bok-Min Goi, Raphael C.-W. Phan. 1-6 [doi]
- Minutia-based enhancement of fingerprint samplesPatrick Schuch, Simon-Daniel Schulz, Christoph Busch. 1-6 [doi]
- Assessing the common authorship of a set of questioned signature imagesMoisís Díaz Cabrera, Miguel A. Ferrer. 1-5 [doi]
- Complex safety study of intelligent multi-robot navigation in risk's environmentChaima Bensaci, Youcef Zennir, Denis Pomorski, El-Arkam Mechhoud. 1-6 [doi]
- Generation and evaluation of synthetic models for training people detectorsRafael Martin Nieto, Jesus Molina Merchan, Alvaro García-Martín, Jose M. Martinez. 1-6 [doi]
- Detecting information leaks in Android applications using a hybrid approach with program slicing, instrumentation and taggingLuis Menezes, Roland Wismüller. 1-6 [doi]
- IoT: Secured and automated houseHakar Mohsin Saber, Nawzad Kamaran Al-Salihi. 1-6 [doi]
- Object-size invariant anomaly detection in video-surveillanceJuan C. SanMiguel, José M. Martínez, Luis Caro Campos. 1-6 [doi]
- Exploring a statistical method for touchscreen swipe biometricsAda Pozo, Julian Fiérrez, Marcos Martinez-Diaz, Javier Galbally, Aythami Morales. 1-4 [doi]
- Advanced issues in wireless communication security: Towards a security-demonstrator for smart-home environmentsRobert Fischer 0001, Kevin Lamshoft, Jana Dittmann, Claus Vielhauer. 1-6 [doi]
- Experiences with implementation of information systems within preparation to deal with crisis situations in terms of crisis management and building resilience in the Slovak RepublicJozef Ristvej, Lubomira Sokolova, Jana Starackova, Roman Ondrejka, Maros Lacinak. 1-6 [doi]
- Signal processing on graphs for improving automatic credit card fraud detectionLuis Vergara, Addisson Salazar, Jordi Belda, Gonzalo Safont, Santiago Moral, Sergio Iglesias. 1-6 [doi]