Stop the war!
Остановите войну!
for scientists:
default search action
IAS 2014: Okinawa, Japan
- 10th International Conference on Information Assurance and Security, IAS 2014, Okinawa, Japan, November 28-30, 2014. IEEE 2014, ISBN 978-1-4799-8099-4
- Sara El-Refaay, Marianne A. Azer, Nashwa Abdelbaki:
Cluster Head election in Wireless Sensor Networks. 1-5 - Sye Loong Keoh, Zhaohui Tang:
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. 6-11 - Tanapat Ruengsatra, Kulit Na Nakorn, Kultida Rojviboonchai, Krerk Piromsopa:
ETC: Effective trustworthy communication with two-mode authentication for disaster recovery. 12-17 - Jinxin Ma, Puhan Zhang, Guowei Dong, Shuai Shao, Jiangxiao Zhang:
TWalker: An efficient taint analysis tool. 18-22 - Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk:
Automatic generation of correlation rules to detect complex attack scenarios. 23-28 - Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd Yamani Idna Bin Idris, Suleman Khan, Zaidi Razak, Muhammad Rezal Kamel Ariffin:
Passive video forgery detection techniques: A survey. 29-34 - Abdelhamid Makiou, Youcef Begriche, Ahmed Serhrouchni:
Improving Web Application Firewalls to detect advanced SQL injection attacks. 35-40 - Shesha Shila Bharadwaj Renukuntla, Shatrunjay Rawat:
Optimization of excerpt query process for Packet Attribution System. 41-46 - Mayssa Jemel, Ahmed Serhrouchni:
Security assurance of local data stored by HTML5 web application. 47-52 - Sherif Saad, Issa Traoré, Marcelo Luiz Brocardo:
Context-aware intrusion alerts verification approach. 53-59 - Nur Azman Abu, Muhammad Rezal Kamel Ariffin:
A novel psychovisual model on an independent video frame for an almost lossless compression. 60-65 - Jaebum Sim, Jungchan Na:
Secure firmware architecture using virtual hard disks. 66-70 - Cheng-Hong Wang, Donghong Zhang, Hualin Lu, Jing Zhao, Zhenyu Zhang, Zheng Zheng:
An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness. 71-76 - Saliha Artabaz, Karima Benatchba, Mouloud Koudil, Dellys Hachemi Nabil, Ahmed Bouridane:
Extraction method of Region of Interest from hand palm: Application with contactless and touchable devices. 77-82
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.