Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccc2/ccc2019.bht:"
@inproceedings{DBLP:conf/ccc2/Agbinya19, author = {Johnson I. Agbinya}, title = {Human Palm Geometry Modelling for Biometric Security Systems}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {160--164}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00011}, doi = {10.1109/CCC.2019.00011}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/Agbinya19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/AhmedB19, author = {Mohiuddin Ahmed and Abu S. S. M. Barkat Ullah}, title = {Performance Analysis of Hard Clustering Techniques for Big IoT Data Analytics}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {62--66}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.000-8}, doi = {10.1109/CCC.2019.000-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/AhmedB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/AlagrashAAD19, author = {Yasamin Alagrash and Faisal Alghayadh and Ahmad Alshammari and Debatosh Debnath}, title = {Cloud Computing: {A} Framework for Balancing Accountability and Privacy Based on Multi-Agent System}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {6--12}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00-16}, doi = {10.1109/CCC.2019.00-16}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/AlagrashAAD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/AldawoodS19, author = {Hussain Aldawood and Geoffrey Skinner}, title = {Challenges of Implementing Training and Awareness Programs Targeting Cyber Security Social Engineering}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {111--117}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00004}, doi = {10.1109/CCC.2019.00004}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/AldawoodS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/ArisarNSJ19, author = {Muzammil M. K. Arisar and Lianju Ning and Zhongyuan Sun and Imran Ali Jokhio}, title = {A Comprehensive Investigation of Telecom Business Models and Strategies}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {129--135}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00007}, doi = {10.1109/CCC.2019.00007}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/ArisarNSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/Aziz19, author = {Ahsan Aziz}, title = {Coercion-Resistant E-Voting Scheme with Blind Signatures}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {143--151}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00009}, doi = {10.1109/CCC.2019.00009}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/Aziz19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/BakkarA19, author = {Mahmoud Bakkar and Ammar Alazab}, title = {Designing Security Intelligent Agent for Petrol Theft Prevention}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {123--128}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00006}, doi = {10.1109/CCC.2019.00006}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/BakkarA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/BakkarA19a, author = {Mahmoud Bakkar and Ammar Alazab}, title = {Information Security: Definitions, Threats and Management in Dubai Hospitals Context}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {152--159}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00010}, doi = {10.1109/CCC.2019.00010}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/BakkarA19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/BaralA19, author = {Gitanjali Baral and Nalin Asanka Gamagedara Arachchilage}, title = {Building Confidence not to be Phished Through a Gamified Approach: Conceptualising User's Self-Efficacy in Phishing Threat Avoidance Behaviour}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {102--110}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.000-1}, doi = {10.1109/CCC.2019.000-1}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/BaralA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/HasanRA019, author = {Walid K. A. Hasan and Yachao Ran and Johnson I. Agbinya and Guiyun Tian}, title = {A Survey of Energy Efficient IoT Network in Cloud Environment}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {13--21}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00-15}, doi = {10.1109/CCC.2019.00-15}, timestamp = {Tue, 11 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/HasanRA019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/HylaP19, author = {Tomasz Hyla and Jerzy Pejas}, title = {eHealth Integrity Model Based on a Permissioned Blockchain}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {172--177}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00013}, doi = {10.1109/CCC.2019.00013}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/HylaP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/IslamAA19, author = {Nahina Islam and Ammar Alazab and Mamoun Alazab}, title = {A Reinforcement Learning Based Algorithm Towards Energy Efficient 5G Multi-Tier Network}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {96--101}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.000-2}, doi = {10.1109/CCC.2019.000-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/IslamAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/KbarA19, author = {Ghassan Kbar and Ammar Alazab}, title = {A Comprehensive Protection Method for Securing the Organization's Network Against Cyberattacks}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {118--122}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00005}, doi = {10.1109/CCC.2019.00005}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/KbarA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/Khan0AZ19, author = {Riaz Ullah Khan and Rajesh Kumar and Mamoun Alazab and Xiaosong Zhang}, title = {A Hybrid Technique To Detect Botnets, Based on {P2P} Traffic Similarity}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {136--142}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00008}, doi = {10.1109/CCC.2019.00008}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/Khan0AZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/KhanZA019, author = {Riaz Ullah Khan and Xiaosong Zhang and Mamoun Alazab and Rajesh Kumar}, title = {An Improved Convolutional Neural Network Model for Intrusion Detection in Networks}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {74--77}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.000-6}, doi = {10.1109/CCC.2019.000-6}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/KhanZA019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/LiK19, author = {Shumin Li and Rajan Kadel}, title = {Design of a Hybrid {RFID-WLAN} Based Smart Parking and Vehicle Finding System}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {56--61}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.000-9}, doi = {10.1109/CCC.2019.000-9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/LiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/ManzoorJKJ19, author = {Kulsoom Manzoor and Sana Hoor Jokhio and Tariq Jamil Saifullah Khanzada and Imran Ali Jokhio}, title = {Enhanced {TL-LEACH} routing protocol for large-scale {WSN} applications}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {35--39}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00-12}, doi = {10.1109/CCC.2019.00-12}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/ManzoorJKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/MurataITH19, author = {Kazuki Murata and Atsushi Ito and Yukitsugu Takahashi and Hiroyuki Hatano}, title = {A Study on Growth Stage Classification of Paddy Rice by {CNN} using {NDVI} Images}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {85--90}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.000-4}, doi = {10.1109/CCC.2019.000-4}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/MurataITH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/NozakiY19, author = {Yusuke Nozaki and Masaya Yoshikawa}, title = {Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {30--34}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00-13}, doi = {10.1109/CCC.2019.00-13}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/NozakiY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/PantaASYJBA19, author = {Yuba Raj Panta and Sami Azam and Bharanidharan Shanmugam and Kheng Cher Yeo and Mirjam Jonkman and Friso De Boer and Mamoun Alazab}, title = {Improving Accessibility for Mobility Impaired People in Smart City using Crowdsourcing}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {47--55}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00-10}, doi = {10.1109/CCC.2019.00-10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/PantaASYJBA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/PatelSF19, author = {Hitendra Patel and Sajan Sheth and S. M. Farhad}, title = {Cloud Based Temperature and Humidity Alert System to Prevent Food Poisoning}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00-17}, doi = {10.1109/CCC.2019.00-17}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/PatelSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/RAJKP19, author = {Vinayakumar R. and Mamoun Alazab and Alireza Jolfaei and Soman K. P. and Prabaharan Poornachandran}, title = {Ransomware Triage Using Deep Learning: Twitter as a Case Study}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {67--73}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.000-7}, doi = {10.1109/CCC.2019.000-7}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/RAJKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/SaikrishnaR19, author = {Vidya Saikrishna and Sid Ray}, title = {{MML} Inference of Hierarchical Probabilistic Finite State Machine}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {78--84}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.000-5}, doi = {10.1109/CCC.2019.000-5}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/SaikrishnaR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/ShehzadAKMAS19, author = {Kamran Shehzad and Muhammad Afrasayab and Murad Khan and Muhammad Azhar Mushtaq and Rana Laique Ahmed and M. Mohsin Saleemi}, title = {Use of Blockchain in Internet of things: {A} Systematic Literature Review}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {165--171}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00012}, doi = {10.1109/CCC.2019.00012}, timestamp = {Tue, 08 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/ShehzadAKMAS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/ShokeenSKAJA19, author = {Rahul Shokeen and Bharanidharan Shanmugam and Krishnan Kannoorpatti and Sami Azam and Mirjam Jonkman and Mamoun Alazab}, title = {Vulnerabilities Analysis and Security Assessment Framework for the Internet of Things}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {22--29}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00-14}, doi = {10.1109/CCC.2019.00-14}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccc2/ShokeenSKAJA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/ZarinU19, author = {Adiba Zarin and Jia Uddin}, title = {A Hybrid Fake Banknote Detection Model using OCR, Face Recognition and Hough Features}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {91--95}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.000-3}, doi = {10.1109/CCC.2019.000-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/ZarinU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccc2/ZhaoSML19, author = {Ning Zhao and Junjie Shen and Xiaolin Ma and Yuhe Liu}, title = {Analysis on Nonlinear Characters of Built-in Sensor in Smart Device under the Condition of Voice Actuating}, booktitle = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, pages = {40--46}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCC.2019.00-11}, doi = {10.1109/CCC.2019.00-11}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/ZhaoSML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccc2/2019, title = {Cybersecurity and Cyberforensics Conference, {CCC} 2019, Melbourne, Australia, May 8-9, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8848308/proceeding}, isbn = {978-1-7281-2600-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccc2/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.