M. R. Mouhamed, Hossam M. Zawbaa, Eiman Tamah Al-Shammari, A. Hassanien, V. Snás̃el
{"title":"Blind Watermark Approach for Map Authentication Using Support Vector Machine","authors":"M. R. Mouhamed, Hossam M. Zawbaa, Eiman Tamah Al-Shammari, A. Hassanien, V. Snás̃el","doi":"10.1007/978-3-642-40597-6_7","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_7","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122489461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ammar Alazab, M. Hobbs, J. Abawajy, Ansam Khraisat
{"title":"Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware","authors":"Ammar Alazab, M. Hobbs, J. Abawajy, Ansam Khraisat","doi":"10.1007/978-3-642-40597-6_15","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_15","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122890024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qing Tan, Nashwa El-Bendary, Frédérique C. Pivot, A. Lam
{"title":"Elderly Healthcare Data Protection Application for Ambient Assisted Living","authors":"Qing Tan, Nashwa El-Bendary, Frédérique C. Pivot, A. Lam","doi":"10.1007/978-3-642-40597-6_17","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_17","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129742342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An HMM-Based Reputation Model","authors":"Ehab ElSalamouny, V. Sassone","doi":"10.1007/978-3-642-40597-6_9","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_9","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"42 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120874511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards IT-Legal Framework for Cloud Computing","authors":"Sameh Hussein, Nashwa Abdelbaki","doi":"10.1007/978-3-642-40597-6_10","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_10","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression","authors":"M. Fakhr","doi":"10.1007/978-3-642-40597-6_8","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_8","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127987426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps","authors":"Mona M. Soliman, A. Hassanien, H. Onsi","doi":"10.1007/978-3-642-40597-6_11","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_11","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics","authors":"M. Salas","doi":"10.1007/978-3-642-40597-6_18","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_18","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amira Abdel-Aziz, A. Hassanien, A. Azar, Sanaa El-Ola Hanafi
{"title":"Machine Learning Techniques for Anomalies Detection and Classification","authors":"Amira Abdel-Aziz, A. Hassanien, A. Azar, Sanaa El-Ola Hanafi","doi":"10.1007/978-3-642-40597-6_19","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_19","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN","authors":"Alyaa Amer, Ayman A. Abdel-Hamid, M. A. El-Nasr","doi":"10.1007/978-3-642-40597-6_3","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_3","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}