


default search action
10th ICITST 2015: London, UK
- 10th International Conference for Internet Technology and Secured Transactions, ICITST 2015, London, United Kingdom, December 14-16, 2015. IEEE 2015, ISBN 978-1-9083-2052-0
Keynote Speakers
- Kevin Warwick:
ICITST honorary chair and distinguished keynote speaker: The cyborg experiments. 15 - Frank Zhigang Wang:
Keynote speaker 1: Computer Evolution over the next decade: Fact or fiction? 16 - Martin Visser:
Keynote speaker 2: Swimming against the current - Dealing with ICS cyber threats in the Water Sector. 17-18 - Aspen Olmsted:
Keynote speaker 3: Secure software engineering in the cloud. 19 - Frank W. Geels:
Keynote speaker 4: Socio-technical transitions towards sustainability. 20 - Maryline Chetto
:
Keynote speaker 5: Issues in energy harvesting cyber-physical systems. 21
Workshops
Workshop 1: Chaos-Information Hiding and Security (C-IHS-2015)
- Mirko Koscina, Daniel Caragata:
Bench-marking of traditional cryptographic algorithms and chaos-based algorithms with DNA operations. 26-31 - Nabil Abdoun
, Safwan El Assad, Mohammad AbuTaha, Rima Assaf, Olivier Déforges, Mohamad Khalil
:
Hash function based on efficient Chaotic Neural Network. 32-37 - Ons Jallouli, Safwan El Assad, Maryline Chetto
, René Lozi
, Daniel Caragata:
A novel chaotic generator based on weakly-coupled discrete skewtent maps. 38-43 - Mohammed AbuTaha, Safwan El Assad, Mousa Farajallah
, Audrey Queudet, Olivier Déforges:
Chaos-based cryptosystems using dependent diffusion: An overview. 44-49
Workshop 2: Cloud Applications and Security (CAS'15)
- Kennedy A. Torkura, Feng Cheng, Christoph Meinel:
A proposed framework for proactive vulnerability assessments in cloud deployments. 51-57 - G. Reshmi, C. S. Rakshmy:
A survey of authentication methods in mobile cloud computing. 58-63
Workshop 3: The 7th International Workshop on RFID Security and Cryptography 2015 (RISC'15)
- Buti Al Delail, Chan Yeob Yeun
:
Recent advances of smart glass application security and privacy. 65-69 - Ebrahim Al Alkeem, Chan Yeob Yeun
, M. Jamal Zemerly
:
Security and privacy framework for ubiquitous healthcare IoT devices. 70-75
Sessions
Session 1: Information Security
- Lifei Zhan, Yuesheng Zhu:
Passive forensics for image splicing based on PCA noise estimation. 78-83 - Naomi Kuze
, Shu Ishikura, Takeshi Yagi, Daiki Chiba
, Masayuki Murata
:
Crawler classification using ant-based clustering scheme. 84-89 - Emad Sherif
, Steven Furnell
, Nathan L. Clarke
:
Awareness, behaviour and culture: The ABC in cultivating security compliance. 90-94 - Himanshu Vats, Ron Ruhl, Shaun Aghili:
Fingerprint security for protecting EMV payment cards. 95-101
Session 2: Cloud Security
- Daniel Pletea, Saeed Sedghi, Meilof Veeningen, Milan Petkovic:
Secure distributed key generation in attribute based encryption systems. 103-107 - Kheng Kok Mar, Chee Yong Law, Victoria Chin:
Secure personal cloud storage. 108-113 - Vimal Kumar SathiyaBalan, Pavol Zavarsky, Dale Lindskog, Sergey Butakov:
Study of applicability of Chinese remainder theorem based group key management for cloud environment. 114-119 - Min-Gu Kim, Sung Bum Pan:
A study on the flame detection and object classification technique using the color information. 120-123
Session 3: Internet Applications and Technology
- Azerikatoa D. Ayoung
, Boyce Sigweni, Pamela Abbott
:
Case-based reasoning system for predicting the sustainability of a telecentre. 125-130 - Richard Dennis, Gareth Owen:
Rep on the block: A next generation reputation system based on the blockchain. 131-138 - Aspen Olmsted
:
Long running, consistent, web service transactions. 139-144 - David Lebron, Hossain Shahriar
, Rubana Yasmin Lupu:
Security concerns and mitigation approaches for MOOC-based applications. 145-150
Session 4: Internet Applications and Technology
- Gui-hyun Baek, Su-kyoung Kim, Ki-hong Ahn:
Framework for automatically construct ontology knowledge base from semi-structured datasets. 152-157 - Fatema Al Mansoori, Chan Yeob Yeun
:
Emerging new trends of location based systems security. 158-163 - Payingat Jilna
, P. P. Deepthi, U. K. Jayaraj:
Optimized hardware design and implementation of EC based key management scheme for WSN. 164-169 - Md. Rahatur Rahman, Shamim Akhter
:
Bi-directional traffic management support system with decision tree based dynamic routing. 170-175
Session 5: Information Security
- Mincheol Kim
:
Application of theory of reasoned action in u-health system. 177-178 - Maha Althobaiti
, Pam J. Mayhew:
Usable security of authentication process: New approach and practical assessment. 179-180 - Gabriele Spenger, Jörg Keller:
Security aspects of PRNGs with large state spaces. 181-185 - Muhammad Parvez, Pavol Zavarsky, Nidal Khoury:
Analysis of effectiveness of black-box web application scanners in detection of stored SQL injection and stored XSS vulnerabilities. 186-191
Session 6: Information Security
- Soojin Yoon, JongHun Jung, Hwankuk Kim
:
Attacks on Web browsers with HTML5. 193-197 - Aisha Suliaman Alazri:
The awareness of social engineering in information revolution: Techniques and challenges. 198-201 - Duygu Sinanc Terzi
, Ramazan Terzi, Seref Sagiroglu:
A survey on security and privacy issues in big data. 202-207 - Ronald M. Campbell, Keshnee Padayachee
, Themba Masombuka
:
A survey of honeypot research: Trends and opportunities. 208-212
Session 7: Information Security
- Rohit Beniwal, Pavol Zavarsky, Dale Lindskog:
Study of compliance of Apple's location based APIs with recommendations of the IETF Geopriv. 214-219 - Batsayan Das, Lakshmipadmaja Maddali, Harshita Vani Nallagonda:
Role-based privilege isolation: A novel authorization model for Android smart devices. 220-225 - Qutaibah Althebyan
, Rami Mohawesh
, Qussai Yaseen
, Yaser Jararweh
:
Mitigating insider threats in a cloud using a knowledgebase approach while maintaining data availability. 226-231
Session 8: Internet Applications and e-Technology
- Shafiq ur Réhman:
iBook: An interactive book system. 233-237 - Ahmad Al-Khasawneh
:
Toward power consumption in partitioned Wireless Sensors Networks routing technique. 238-241 - Mehdi Fallahpour, David Megías
:
Transparent high capacity audio watermarking in wavelet domain. 242-247
Session 9: Ubi/Cloud Computing
- Bandar Aldawsari, Thar Baker
, David England:
Towards a holistic brokerage system for multi-cloud environment. 249-255 - Kennedy A. Torkura, Feng Cheng, Christoph Meinel:
Application of quantitative security metrics in cloud computing. 256-262 - François Siewe, Ahmed Al-alshuhai:
From use case diagrams to executable context-aware ambients. 263-268
Session 10: Information Security
- Chit Nyi Nyi Hlyne, Pavol Zavarsky, Sergey Butakov
:
SCAP benchmark for Cisco router security configuration compliance. 270-276 - Clinton Medbery, Aspen Olmsted
:
HeartSync: Mobile pacemaker failure detector. 277-279 - Ali Farooq
, Syed Rameez Ullah Kakakhel
, Seppo Virtanen
, Jouni Isoaho
:
A taxonomy of perceived information security and privacy threats among IT security students. 280-286
Session 11: Internet Applications and Technology
- Christos Ntrigkogias, Nineta Polemi:
Assessment of research efforts in surveillance systems. 288-294 - Abhijit Kiran Valluri:
Equilibrium properties of rate control protocols. 295-301 - Ibrahim Lahmer, Ning Zhang:
MapReduce: A critical analysis of existing authentication methods. 302-313 - Ruairí de Fréin
:
Load-adjusted video quality prediction methods for missing data. 314-319
Session 12: Information Security
- Masahiro Yamada, Masanobu Morinaga, Yuki Unno, Satoru Torii, Masahiko Takenaka:
RAT-based malicious activities detection on enterprise internal networks. 321-325 - Yannis Soupionis, Thierry Benoist:
Cyber-physical testbed - The impact of cyber attacks and the human factor. 326-331 - Norulzahrah Mohd. Zainudin
, Suzaimah Ramli
, Tuan Khalisah Tan Zizi, Nor Asiakin Hasbullah
, Norazlin Ibrahim
:
Facial expression change detection algorithm using optical flow technique. 332-335 - Rwan Mahmoud, Tasneem Yousuf, Fadi A. Aloul, Imran A. Zualkernan
:
Internet of things (IoT) security: Current status, challenges and prospective measures. 336-341
Session 13: Information Security
- Sabah Al-Fedaghi:
Conceptual maps for physical security. 343-348 - Nineta Polemi, Spyros Papastergiou:
Current efforts in ports and supply chains risk assessment. 349-354 - Gabriel Biedima Peterside, Pavol Zavarsky, Sergey Butakov
:
Automated security configuration checklist for a cisco IPsec VPN router using SCAP 1.2. 355-360
Session 14: Internet Applications and Technology
- Waqas Aman
, Einar Snekkenes:
Managing security trade-offs in the Internet of Things using adaptive security. 362-368 - Fatiha Merazka
, Fulvio Babich:
Dynamic forward error correction algorithm over IP network services for ITU-T G.722.2 codec. 369-372 - Ishmael Makitla, Jabu Mtsweni:
A generalized web service response time metric to support collaborative and corroborative web service monitoring. 373-377
Session 15: Network Security Issues and Applications
- Stefan Kimak, Jeremy Ellman
:
The role of HTML5 IndexedDB, the past, present and future. 379-383 - Abdulrazaq Almutairi, David J. Parish, James A. Flint:
Predicting multi-stage attacks based on IP information. 384-390 - Darren Hurley-Smith
, Jodie Wetherall, Andrew A. Adekunle:
Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. 391-398
Session 16: Information Security
- Sajjad Ahmed Ghauri
, Hasan Humayun, Mobeen Iqbal:
Low complexity linear equalization of doubly selective channel. 400-405 - Saud Alotaibi, Steven Furnell
, Nathan L. Clarke
:
Transparent authentication systems for mobile device security: A review. 406-413 - Shirish Kumar Singh, Bharavi Mishra, Saket Singh
:
Detecting intelligent malware on dynamic Android analysis environments. 414-419
Session 17: Internet Applications and Technology
- Wong Seng Yue
, Wong Lai Wan:
The effectiveness of digital game for introductory programming concepts. 421-425 - Guanyuan Feng, Xuezhi Tan, Lin Ma:
Visual location recognition using smartphone sensors for indoor environment. 426-430 - Rachid Aouami, Essaid Sabir
, Mounir Rifi, Mohamed Ouzzif:
Fountain-code-enabled DCF for optimazing throughput in wireless sensors. 431-436
Session 18: Internet Applications and Technology
- Peter Hillmann
, Lars Stiemert, Gabi Dreo Rodosek, Oliver Rose:
Dragoon: Advanced modelling of IP geolocation by use of latency measurements. 438-445 - Mashail N. Alkhomsan, Alaa Al-Arjan, Abrar Al-Amro, Khalid Al-Nafjan:
Usability evaluation of Twitter on Android platform for elderly Arab users using morae evaluation tool. 446-447 - Wahiba Hentabli, Fatiha Merazka
:
An extension of RSA_512 to RSA_1024 core under hardware platform based on montgomery powering. 448-453

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.