ICGS3/e-DemocracyPub Date : 2012-10-08DOI: 10.1007/978-3-642-33448-1_2
Stergios G. Tsiafoulis, V. Zorkadis, E. Pimenidis
{"title":"Maximum Entropy Oriented Anonymization Algorithm for Privacy Preserving Data Mining","authors":"Stergios G. Tsiafoulis, V. Zorkadis, E. Pimenidis","doi":"10.1007/978-3-642-33448-1_2","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_2","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116871001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICGS3/e-DemocracyPub Date : 2012-10-08DOI: 10.1007/978-3-642-33448-1_8
V. Vlachos, C. Ilioudis, A. Papanikolaou
{"title":"On the Evolution of Malware Species","authors":"V. Vlachos, C. Ilioudis, A. Papanikolaou","doi":"10.1007/978-3-642-33448-1_8","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_8","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130580699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICGS3/e-DemocracyPub Date : 2012-09-12DOI: 10.1007/978-3-642-33448-1_15
Russell Ogilvie, G. Weir
{"title":"Genre-Based Information Hiding","authors":"Russell Ogilvie, G. Weir","doi":"10.1007/978-3-642-33448-1_15","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_15","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICGS3/e-DemocracyPub Date : 2011-08-24DOI: 10.1007/978-3-642-33448-1_31
Anastasia Mavridou, M. Papa
{"title":"A Situational Awareness Architecture for the Smart Grid","authors":"Anastasia Mavridou, M. Papa","doi":"10.1007/978-3-642-33448-1_31","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_31","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114199671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICGS3/e-DemocracyPub Date : 2011-08-24DOI: 10.1007/978-3-642-33448-1_26
H. Jannati, A. Falahati
{"title":"Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags","authors":"H. Jannati, A. Falahati","doi":"10.1007/978-3-642-33448-1_26","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_26","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115382630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICGS3/e-DemocracyPub Date : 2011-08-24DOI: 10.1007/978-3-642-33448-1_18
R. Krishnamurthy, K. Revett, H. Jahankhani
{"title":"On the Deployment of Artificial Immune Systems for Biometrics","authors":"R. Krishnamurthy, K. Revett, H. Jahankhani","doi":"10.1007/978-3-642-33448-1_18","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_18","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134094942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICGS3/e-DemocracyPub Date : 2011-08-24DOI: 10.1007/978-3-642-33448-1_36
H. Jahankhani, Thulasirajh Jayaraveendran, William Kapuku-Bwabw
{"title":"Improved Awareness on Fake Websites and Detecting Techniques","authors":"H. Jahankhani, Thulasirajh Jayaraveendran, William Kapuku-Bwabw","doi":"10.1007/978-3-642-33448-1_36","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_36","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125453847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
ICGS3/e-DemocracyPub Date : 2011-08-24DOI: 10.1007/978-3-642-33448-1_22
Dimitrios Koumaridis, Emmanouil Stiakakis, C. Georgiadis
{"title":"Analyzing the Economic Impacts of Security Breaches Due to Outsourcing","authors":"Dimitrios Koumaridis, Emmanouil Stiakakis, C. Georgiadis","doi":"10.1007/978-3-642-33448-1_22","DOIUrl":"https://doi.org/10.1007/978-3-642-33448-1_22","url":null,"abstract":"","PeriodicalId":185751,"journal":{"name":"ICGS3/e-Democracy","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}