International Conference on Advances in Security of Information and Communication Networks最新文献

筛选
英文 中文
Blind Watermark Approach for Map Authentication Using Support Vector Machine 基于支持向量机的地图认证盲水印方法
M. R. Mouhamed, Hossam M. Zawbaa, Eiman Tamah Al-Shammari, A. Hassanien, V. Snás̃el
{"title":"Blind Watermark Approach for Map Authentication Using Support Vector Machine","authors":"M. R. Mouhamed, Hossam M. Zawbaa, Eiman Tamah Al-Shammari, A. Hassanien, V. Snás̃el","doi":"10.1007/978-3-642-40597-6_7","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_7","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122489461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware 一种针对Web应用恶意软件的智能入侵检测与防御系统的开发
Ammar Alazab, M. Hobbs, J. Abawajy, Ansam Khraisat
{"title":"Developing an Intelligent Intrusion Detection and Prevention System against Web Application Malware","authors":"Ammar Alazab, M. Hobbs, J. Abawajy, Ansam Khraisat","doi":"10.1007/978-3-642-40597-6_15","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_15","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122890024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Elderly Healthcare Data Protection Application for Ambient Assisted Living 环境辅助生活老年人医疗保健数据保护应用
Qing Tan, Nashwa El-Bendary, Frédérique C. Pivot, A. Lam
{"title":"Elderly Healthcare Data Protection Application for Ambient Assisted Living","authors":"Qing Tan, Nashwa El-Bendary, Frédérique C. Pivot, A. Lam","doi":"10.1007/978-3-642-40597-6_17","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_17","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129742342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An HMM-Based Reputation Model 基于hmm的声誉模型
Ehab ElSalamouny, V. Sassone
{"title":"An HMM-Based Reputation Model","authors":"Ehab ElSalamouny, V. Sassone","doi":"10.1007/978-3-642-40597-6_9","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_9","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"42 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120874511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards IT-Legal Framework for Cloud Computing 面向云计算的it法律框架
Sameh Hussein, Nashwa Abdelbaki
{"title":"Towards IT-Legal Framework for Cloud Computing","authors":"Sameh Hussein, Nashwa Abdelbaki","doi":"10.1007/978-3-642-40597-6_10","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_10","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression 基于稀疏编码的高有效载荷音频水印对MP3压缩的鲁棒性
M. Fakhr
{"title":"High Payload Audio Watermarking Using Sparse Coding with Robustness to MP3 Compression","authors":"M. Fakhr","doi":"10.1007/978-3-642-40597-6_8","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_8","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127987426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps 一种基于渐进式网格和自组织映射的盲鲁棒3d水印方案
Mona M. Soliman, A. Hassanien, H. Onsi
{"title":"A Blind Robust 3D-Watermarking Scheme Based on Progressive Mesh and Self Organization Maps","authors":"Mona M. Soliman, A. Hassanien, H. Onsi","doi":"10.1007/978-3-642-40597-6_11","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_11","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130377365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics 使用ECC加密和生物识别技术的OTA智能设备生态系统安全框架
M. Salas
{"title":"A Secure Framework for OTA Smart Device Ecosystems Using ECC Encryption and Biometrics","authors":"M. Salas","doi":"10.1007/978-3-642-40597-6_18","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_18","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Machine Learning Techniques for Anomalies Detection and Classification 异常检测和分类的机器学习技术
Amira Abdel-Aziz, A. Hassanien, A. Azar, Sanaa El-Ola Hanafi
{"title":"Machine Learning Techniques for Anomalies Detection and Classification","authors":"Amira Abdel-Aziz, A. Hassanien, A. Azar, Sanaa El-Ola Hanafi","doi":"10.1007/978-3-642-40597-6_19","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_19","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN 基于移动代理的分层WSN的键支持密钥存储和查找方案
Alyaa Amer, Ayman A. Abdel-Hamid, M. A. El-Nasr
{"title":"Chord-Enabled Key Storage and Lookup Scheme for Mobile Agent-Based Hierarchical WSN","authors":"Alyaa Amer, Ayman A. Abdel-Hamid, M. A. El-Nasr","doi":"10.1007/978-3-642-40597-6_3","DOIUrl":"https://doi.org/10.1007/978-3-642-40597-6_3","url":null,"abstract":"","PeriodicalId":404650,"journal":{"name":"International Conference on Advances in Security of Information and Communication Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130285209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信