![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/fgit/sectech2010.bht:"
@inproceedings{DBLP:conf/fgit/AbawajyK10, author = {Jemal H. Abawajy and Tai{-}Hoon Kim}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Performance Analysis of Cyber Security Awareness Delivery Methods}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {142--148}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_16}, doi = {10.1007/978-3-642-17610-4\_16}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AbawajyK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/Ahmad10, author = {Mushtaq Ahmad}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Wireless Network Security Vulnerabilities and Concerns}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {207--219}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_23}, doi = {10.1007/978-3-642-17610-4\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/Ahmad10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AlghamdiQAA10, author = {Abdullah Sharaf Alghamdi and Syed Amanullah Quadri and Iftikhar Ahmad and Khalid Al{-}Nafjan}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {A Generic Approach to Security Assured Net-Centric Communications Network Architecture for {C4I} Systems}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {244--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_28}, doi = {10.1007/978-3-642-17610-4\_28}, timestamp = {Wed, 01 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AlghamdiQAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AlosaimyAHE10, author = {Raed Alosaimy and Khaled Alghathbar and Alaaeldin M. Hafez and Mohamed Hamdy Eldefrawy}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {{NMACA} Approach Used to Build a Secure Message Authentication Code}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {290--298}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_34}, doi = {10.1007/978-3-642-17610-4\_34}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AlosaimyAHE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/AmbikaR10, author = {Nagaraj Ambika and G. T. Raju}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Figment Authentication Scheme in Wireless Sensor Network}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {220--223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_24}, doi = {10.1007/978-3-642-17610-4\_24}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/AmbikaR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/BalitanasK10, author = {Maricel O. Balitanas and Tai{-}Hoon Kim}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Insecure Information System's Solution Using Isolation Method}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {276--281}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_32}, doi = {10.1007/978-3-642-17610-4\_32}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/BalitanasK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ChungK10, author = {Bo{-}heung Chung and Jung{-}nye Kim}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {68--73}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_8}, doi = {10.1007/978-3-642-17610-4\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/ChungK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/ClarkHCEC10, author = {A. J. Clark and Patton Holliday and Robyn Chau and Harris Eisenberg and Melinda Chau}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {250--258}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_29}, doi = {10.1007/978-3-642-17610-4\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/ClarkHCEC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/DharKK10, author = {Pranab Kumar Dhar and Cheol Hong Kim and Jong{-}Myon Kim}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {114--125}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_13}, doi = {10.1007/978-3-642-17610-4\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/DharKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/DharKKK10, author = {Pranab Kumar Dhar and Mohammad Ibrahim Khan and Cheol Hong Kim and Jong{-}Myon Kim}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {104--113}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_12}, doi = {10.1007/978-3-642-17610-4\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/DharKKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/EldefrawyKA10, author = {Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan and Khaled Alghathbar}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {One-Time Password System with Infinite Nested Hash Chains}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {161--170}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_18}, doi = {10.1007/978-3-642-17610-4\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/EldefrawyKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/Gafurov10, author = {Davrondzhon Gafurov}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Emerging Biometric Modalities: Challenges and Opportunities}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {29--38}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_4}, doi = {10.1007/978-3-642-17610-4\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/Gafurov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/GafurovB10, author = {Davrondzhon Gafurov and Patrick Bours}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {179--186}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_20}, doi = {10.1007/978-3-642-17610-4\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/GafurovB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/GafurovBYB10, author = {Davrondzhon Gafurov and Patrick Bours and Bian Yang and Christoph Busch}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Impact of Finger Type in Fingerprint Authentication}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {1--7}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_1}, doi = {10.1007/978-3-642-17610-4\_1}, timestamp = {Wed, 06 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/GafurovBYB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/HegdePSSVP10, author = {Chetana Hegde and H. Rahul Prabhu and D. S. Sagar and P. Deepa Shenoy and K. R. Venugopal and Lalit M. Patnaik}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Human Authentication Based on {ECG} Waves Using Radon Transform}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {197--206}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_22}, doi = {10.1007/978-3-642-17610-4\_22}, timestamp = {Mon, 23 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/HegdePSSVP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/HuangM10, author = {Wei Huang and Arthur Mynnet}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on {HABITAT} Model}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {259--268}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_30}, doi = {10.1007/978-3-642-17610-4\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/HuangM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/HuangWF10, author = {Hsiang{-}Cheh Huang and Ting{-}Hsuan Wang and Wai{-}Chi Fang}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Histogram-Based Reversible Data Hiding with Quadtree Concepts}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {126--133}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_14}, doi = {10.1007/978-3-642-17610-4\_14}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/HuangWF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KangY10, author = {Ju{-}Sung Kang and Okyeon Yi}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {On Distinguished Points Method to Implement a Parallel Collision Search Attack on {ECDLP}}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {39--46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_5}, doi = {10.1007/978-3-642-17610-4\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KangY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KhanAKAA10, author = {Bilal Khan and Khaled Alghathbar and Muhammad Khurram Khan and Abdullah M. AlKelabi and Abdulaziz Alajaji}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Using Arabic {CAPTCHA} for Cyber Security}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {8--17}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_2}, doi = {10.1007/978-3-642-17610-4\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KhanAKAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KhanASR10, author = {Zeeshan Shafi Khan and Khaled Alghathbar and Muhammad Sher and Khalid Rashid}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Issues of Security and Network Load in Presence - {A} Survey}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {224--230}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_25}, doi = {10.1007/978-3-642-17610-4\_25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/KhanASR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KimKME10, author = {Taehyoung Kim and Inhyuk Kim and Changwoo Min and Young Ik Eom}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {{MAS:} Malware Analysis System Based on Hardware-Assisted Virtualization Technology}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {134--141}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_15}, doi = {10.1007/978-3-642-17610-4\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KimKME10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KimRL10, author = {Intae Kim and Keewook Rim and Junghyun Lee}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Secure OSGi Platform against Service Injection}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {74--83}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_9}, doi = {10.1007/978-3-642-17610-4\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KimRL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KiskuGS10, author = {Dakshina Ranjan Kisku and Phalguni Gupta and Jamuna Kanta Sing}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Fusion of Moving and Static Facial Features for Robust Face Recognition}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {187--196}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_21}, doi = {10.1007/978-3-642-17610-4\_21}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KiskuGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KoV10, author = {Hoon Ko and Zita A. Vale}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {171--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_19}, doi = {10.1007/978-3-642-17610-4\_19}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KoV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/NabiMA10, author = {Syed Irfan Nabi and Abdulrahman A. Mirza and Khaled Alghathbar}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Information Assurance in Saudi Organizations - An Empirical Study}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {18--28}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_3}, doi = {10.1007/978-3-642-17610-4\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/NabiMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/NabiNTHAA10, author = {Syed Irfan Nabi and Syed Waqar Nabi and Syed Awais Ahmed Tipu and Bushra Haqqi and Zahra Abid and Khaled Alghathbar}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {47--56}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_6}, doi = {10.1007/978-3-642-17610-4\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/NabiNTHAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/RahimM10, author = {Aneel Rahim and Fahad Bin Muhaya}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Discovering the Botnet Detection Techniques}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {231--235}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_26}, doi = {10.1007/978-3-642-17610-4\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/RahimM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/RazzakKA10, author = {Muhammad Imran Razzak and Muhammad Khurram Khan and Khaled Alghathbar}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Contactless Biometrics in Wireless Sensor Network: {A} Survey}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {236--243}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_27}, doi = {10.1007/978-3-642-17610-4\_27}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/RazzakKA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/RoblesK10, author = {Rosslin John Robles and Tai{-}Hoon Kim}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Communication Security for Control Systems in Smart Grid}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {282--289}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_33}, doi = {10.1007/978-3-642-17610-4\_33}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/RoblesK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/RoblesKK10, author = {Rosslin John Robles and Haeng{-}Kon Kim and Tai{-}Hoon Kim}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Internet {SCADA} Utilizing API's as Data Source}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {269--275}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_31}, doi = {10.1007/978-3-642-17610-4\_31}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/RoblesKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/YamamotoY10, author = {Kenji Yamamoto and Toshihiro Yamauchi}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Evaluation of Performance of Secure {OS} Using Performance Evaluation Mechanism of LSM-Based {LSMPMON}}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {57--67}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_7}, doi = {10.1007/978-3-642-17610-4\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/YamamotoY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/YamauchiHT10, author = {Toshihiro Yamauchi and Takayuki Hara and Hideo Taniguchi}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {A Mechanism That Bounds Execution Performance for Process Group for Mitigating {CPU} Abuse}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {84--93}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_10}, doi = {10.1007/978-3-642-17610-4\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/YamauchiHT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/YauPHG10, author = {Wei{-}Chuen Yau and Raphael C.{-}W. Phan and Swee{-}Huay Heng and Bok{-}Min Goi}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Proxy Re-encryption with Keyword Search: New Definitions and Algorithms}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {149--160}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_17}, doi = {10.1007/978-3-642-17610-4\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgit/YauPHG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/YimJ10, author = {Hong{-}bin Yim and Jae{-}Il Jung}, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Probabilistic Route Selection Algorithm for {IP} Traceback}, booktitle = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, pages = {94--103}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4\_11}, doi = {10.1007/978-3-642-17610-4\_11}, timestamp = {Tue, 10 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/YimJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fgit/2010sectech, editor = {Tai{-}Hoon Kim and Wai{-}Chi Fang and Muhammad Khurram Khan and Kirk P. Arnett and Heau{-}Jo Kang and Dominik Slezak}, title = {Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings}, series = {Communications in Computer and Information Science}, volume = {122}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17610-4}, doi = {10.1007/978-3-642-17610-4}, isbn = {978-3-642-17609-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/2010sectech.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.