Search dblp for Publications

export results for "toc:db/conf/fgit/sectech2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/fgit/AbawajyK10,
  author       = {Jemal H. Abawajy and
                  Tai{-}Hoon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Performance Analysis of Cyber Security Awareness Delivery Methods},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {142--148},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_16},
  doi          = {10.1007/978-3-642-17610-4\_16},
  timestamp    = {Sat, 30 Sep 2023 09:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/AbawajyK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/Ahmad10,
  author       = {Mushtaq Ahmad},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Wireless Network Security Vulnerabilities and Concerns},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {207--219},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_23},
  doi          = {10.1007/978-3-642-17610-4\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/Ahmad10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AlghamdiQAA10,
  author       = {Abdullah Sharaf Alghamdi and
                  Syed Amanullah Quadri and
                  Iftikhar Ahmad and
                  Khalid Al{-}Nafjan},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {A Generic Approach to Security Assured Net-Centric Communications
                  Network Architecture for {C4I} Systems},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {244--249},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_28},
  doi          = {10.1007/978-3-642-17610-4\_28},
  timestamp    = {Wed, 01 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/AlghamdiQAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AlosaimyAHE10,
  author       = {Raed Alosaimy and
                  Khaled Alghathbar and
                  Alaaeldin M. Hafez and
                  Mohamed Hamdy Eldefrawy},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {{NMACA} Approach Used to Build a Secure Message Authentication Code},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {290--298},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_34},
  doi          = {10.1007/978-3-642-17610-4\_34},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/AlosaimyAHE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/AmbikaR10,
  author       = {Nagaraj Ambika and
                  G. T. Raju},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Figment Authentication Scheme in Wireless Sensor Network},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {220--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_24},
  doi          = {10.1007/978-3-642-17610-4\_24},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/AmbikaR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/BalitanasK10,
  author       = {Maricel O. Balitanas and
                  Tai{-}Hoon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Insecure Information System's Solution Using Isolation Method},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {276--281},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_32},
  doi          = {10.1007/978-3-642-17610-4\_32},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/BalitanasK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/ChungK10,
  author       = {Bo{-}heung Chung and
                  Jung{-}nye Kim},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Sample Bytes to Protect Important Data from Unintentional Transmission
                  in Advanced Embedded Device},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {68--73},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_8},
  doi          = {10.1007/978-3-642-17610-4\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/ChungK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/ClarkHCEC10,
  author       = {A. J. Clark and
                  Patton Holliday and
                  Robyn Chau and
                  Harris Eisenberg and
                  Melinda Chau},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Collaborative Geospatial Data as Applied to Disaster Relief: Haiti
                  2010},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {250--258},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_29},
  doi          = {10.1007/978-3-642-17610-4\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/ClarkHCEC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/DharKK10,
  author       = {Pranab Kumar Dhar and
                  Cheol Hong Kim and
                  Jong{-}Myon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic
                  Model},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {114--125},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_13},
  doi          = {10.1007/978-3-642-17610-4\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/DharKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/DharKKK10,
  author       = {Pranab Kumar Dhar and
                  Mohammad Ibrahim Khan and
                  Cheol Hong Kim and
                  Jong{-}Myon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {An Efficient Audio Watermarking Algorithm in Frequency Domain for
                  Copyright Protection},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {104--113},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_12},
  doi          = {10.1007/978-3-642-17610-4\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/DharKKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/EldefrawyKA10,
  author       = {Mohamed Hamdy Eldefrawy and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {One-Time Password System with Infinite Nested Hash Chains},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {161--170},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_18},
  doi          = {10.1007/978-3-642-17610-4\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/EldefrawyKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/Gafurov10,
  author       = {Davrondzhon Gafurov},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Emerging Biometric Modalities: Challenges and Opportunities},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {29--38},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_4},
  doi          = {10.1007/978-3-642-17610-4\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/Gafurov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/GafurovB10,
  author       = {Davrondzhon Gafurov and
                  Patrick Bours},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Improved Hip-Based Individual Recognition Using Wearable Motion Recording
                  Sensor},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {179--186},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_20},
  doi          = {10.1007/978-3-642-17610-4\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/GafurovB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/GafurovBYB10,
  author       = {Davrondzhon Gafurov and
                  Patrick Bours and
                  Bian Yang and
                  Christoph Busch},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Impact of Finger Type in Fingerprint Authentication},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {1--7},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_1},
  doi          = {10.1007/978-3-642-17610-4\_1},
  timestamp    = {Wed, 06 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/GafurovBYB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/HegdePSSVP10,
  author       = {Chetana Hegde and
                  H. Rahul Prabhu and
                  D. S. Sagar and
                  P. Deepa Shenoy and
                  K. R. Venugopal and
                  Lalit M. Patnaik},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Human Authentication Based on {ECG} Waves Using Radon Transform},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {197--206},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_22},
  doi          = {10.1007/978-3-642-17610-4\_22},
  timestamp    = {Mon, 23 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/HegdePSSVP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/HuangM10,
  author       = {Wei Huang and
                  Arthur Mynnet},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis
                  Ecological Habitat Based on {HABITAT} Model},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {259--268},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_30},
  doi          = {10.1007/978-3-642-17610-4\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/HuangM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/HuangWF10,
  author       = {Hsiang{-}Cheh Huang and
                  Ting{-}Hsuan Wang and
                  Wai{-}Chi Fang},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Histogram-Based Reversible Data Hiding with Quadtree Concepts},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {126--133},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_14},
  doi          = {10.1007/978-3-642-17610-4\_14},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/HuangWF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KangY10,
  author       = {Ju{-}Sung Kang and
                  Okyeon Yi},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {On Distinguished Points Method to Implement a Parallel Collision Search
                  Attack on {ECDLP}},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {39--46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_5},
  doi          = {10.1007/978-3-642-17610-4\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KangY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KhanAKAA10,
  author       = {Bilal Khan and
                  Khaled Alghathbar and
                  Muhammad Khurram Khan and
                  Abdullah M. AlKelabi and
                  Abdulaziz Alajaji},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Using Arabic {CAPTCHA} for Cyber Security},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {8--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_2},
  doi          = {10.1007/978-3-642-17610-4\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KhanAKAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KhanASR10,
  author       = {Zeeshan Shafi Khan and
                  Khaled Alghathbar and
                  Muhammad Sher and
                  Khalid Rashid},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Issues of Security and Network Load in Presence - {A} Survey},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {224--230},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_25},
  doi          = {10.1007/978-3-642-17610-4\_25},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/KhanASR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KimKME10,
  author       = {Taehyoung Kim and
                  Inhyuk Kim and
                  Changwoo Min and
                  Young Ik Eom},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {{MAS:} Malware Analysis System Based on Hardware-Assisted Virtualization
                  Technology},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {134--141},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_15},
  doi          = {10.1007/978-3-642-17610-4\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KimKME10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KimRL10,
  author       = {Intae Kim and
                  Keewook Rim and
                  Junghyun Lee},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Secure OSGi Platform against Service Injection},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {74--83},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_9},
  doi          = {10.1007/978-3-642-17610-4\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KimRL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KiskuGS10,
  author       = {Dakshina Ranjan Kisku and
                  Phalguni Gupta and
                  Jamuna Kanta Sing},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Fusion of Moving and Static Facial Features for Robust Face Recognition},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {187--196},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_21},
  doi          = {10.1007/978-3-642-17610-4\_21},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KiskuGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KoV10,
  author       = {Hoon Ko and
                  Zita A. Vale},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {171--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_19},
  doi          = {10.1007/978-3-642-17610-4\_19},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KoV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/NabiMA10,
  author       = {Syed Irfan Nabi and
                  Abdulrahman A. Mirza and
                  Khaled Alghathbar},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Information Assurance in Saudi Organizations - An Empirical Study},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {18--28},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_3},
  doi          = {10.1007/978-3-642-17610-4\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/NabiMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/NabiNTHAA10,
  author       = {Syed Irfan Nabi and
                  Syed Waqar Nabi and
                  Syed Awais Ahmed Tipu and
                  Bushra Haqqi and
                  Zahra Abid and
                  Khaled Alghathbar},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Data Confidentiality and Integrity Issues and Role of Information
                  Security Management Standard, Policies and Practices - An Empirical
                  Study of Telecommunication Industry in Pakistan},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {47--56},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_6},
  doi          = {10.1007/978-3-642-17610-4\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/NabiNTHAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/RahimM10,
  author       = {Aneel Rahim and
                  Fahad Bin Muhaya},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Discovering the Botnet Detection Techniques},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {231--235},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_26},
  doi          = {10.1007/978-3-642-17610-4\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/RahimM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/RazzakKA10,
  author       = {Muhammad Imran Razzak and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Contactless Biometrics in Wireless Sensor Network: {A} Survey},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {236--243},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_27},
  doi          = {10.1007/978-3-642-17610-4\_27},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/RazzakKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/RoblesK10,
  author       = {Rosslin John Robles and
                  Tai{-}Hoon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Communication Security for Control Systems in Smart Grid},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {282--289},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_33},
  doi          = {10.1007/978-3-642-17610-4\_33},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/RoblesK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/RoblesKK10,
  author       = {Rosslin John Robles and
                  Haeng{-}Kon Kim and
                  Tai{-}Hoon Kim},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Internet {SCADA} Utilizing API's as Data Source},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {269--275},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_31},
  doi          = {10.1007/978-3-642-17610-4\_31},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/RoblesKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/YamamotoY10,
  author       = {Kenji Yamamoto and
                  Toshihiro Yamauchi},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Evaluation of Performance of Secure {OS} Using Performance Evaluation
                  Mechanism of LSM-Based {LSMPMON}},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {57--67},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_7},
  doi          = {10.1007/978-3-642-17610-4\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/YamamotoY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/YamauchiHT10,
  author       = {Toshihiro Yamauchi and
                  Takayuki Hara and
                  Hideo Taniguchi},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {A Mechanism That Bounds Execution Performance for Process Group for
                  Mitigating {CPU} Abuse},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {84--93},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_10},
  doi          = {10.1007/978-3-642-17610-4\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/YamauchiHT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/YauPHG10,
  author       = {Wei{-}Chuen Yau and
                  Raphael C.{-}W. Phan and
                  Swee{-}Huay Heng and
                  Bok{-}Min Goi},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Proxy Re-encryption with Keyword Search: New Definitions and Algorithms},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {149--160},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_17},
  doi          = {10.1007/978-3-642-17610-4\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgit/YauPHG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/YimJ10,
  author       = {Hong{-}bin Yim and
                  Jae{-}Il Jung},
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Probabilistic Route Selection Algorithm for {IP} Traceback},
  booktitle    = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  pages        = {94--103},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4\_11},
  doi          = {10.1007/978-3-642-17610-4\_11},
  timestamp    = {Tue, 10 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/YimJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fgit/2010sectech,
  editor       = {Tai{-}Hoon Kim and
                  Wai{-}Chi Fang and
                  Muhammad Khurram Khan and
                  Kirk P. Arnett and
                  Heau{-}Jo Kang and
                  Dominik Slezak},
  title        = {Security Technology, Disaster Recovery and Business Continuity - International
                  Conferences, SecTech and {DRBC} 2010, Held as Part of the Future Generation
                  Information Technology Conference, {FGIT} 2010, Jeju Island, Korea,
                  December 13-15, 2010. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {122},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17610-4},
  doi          = {10.1007/978-3-642-17610-4},
  isbn         = {978-3-642-17609-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/2010sectech.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics