default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 40 matches
- 2019
- Sabbir Ahmed, Tamkin Mahmud Tan, Anna Mary Mondol, Zawad Alam, Noshin Nawal, Jia Uddin:
Automated Toll Collection System Based on RFID Sensor. ICCST 2019: 1-3 - Simon Attfield, Nallini Selveraj, Neesha Kodagoda, Peter J. Passmore, Elke Dunke:
Patterns of Life Visualiations for Intelligence Analysis: Exploring Animation with POLAR. ICCST 2019: 1-6 - Kwasi Boakye-Boateng, Arash Habibi Lashkari:
Securing GOOSE: The Return of One-Time Pads. ICCST 2019: 1-8 - Daniela Buser, Yanik Sterchi, Adrian Schwaninger:
Effects of Time on Task, Breaks, and Target Prevalence on Screener Performance in an X-ray Image Inspection Task. ICCST 2019: 1-6 - Barbara Corsetti, Raul Sánchez-Reillo, Richard M. Guest, Marco Santopietro:
Face Image Analysis in Mobile Biometric Accessibility Evaluations. ICCST 2019: 1-5 - N. Divya:
Image Specific Similar Target Detection in Aerial Images Using Gaussian Mixture Model. ICCST 2019: 1-5 - Lucindia Dupak, Subhasish Banerjee:
Role of Bio-Inspired Algorithms for Designing Protocols in MANET-Review. ICCST 2019: 1-6 - Miguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte, Réjean Plamondon:
Generating Off-line and On-line Forgeries from On-line Genuine Signatures. ICCST 2019: 1-6 - Raul Garcia-Martin, Raul Sánchez-Reillo, J. Enrique Suarez Pascual:
Wrist Vascular Biometric Capture Using a Portable Contactless System. ICCST 2019: 1-6 - Ines Goicoechea-Telleria, Kiyoshi Kiyokawa, Anas Husseis, Judith Liu-Jimenez, Raul Sánchez-Reillo:
Fingerprint Presentation Attack Detection: Multispectral imaging with a narrow-band camera using Bag of Features. ICCST 2019: 1-6 - Heinz Hertlein, Aladdin M. Ariyaeeinia, Zoe Jeffrey, Soodamani Ramalingam:
Effectiveness in the Realisation of Speaker Authentication. ICCST 2019: 1-5 - Anas Husseis, Judith Liu-Jimenez, Ines Goicoechea-Telleria, Raul Sánchez-Reillo:
A Survey in Presentation Attack and Presentation Attack Detection. ICCST 2019: 1-13 - Justin Joseph, Saumya Bhadauria:
Cookie Based Protocol to Defend Malicious Browser Extensions. ICCST 2019: 1-6 - K. Kirutika, V. Vetri Selvi, Ranjani Parthasarathi, G. Subrahmanya V. R. K. Rao:
Controller Monitoring System In Software Defined Networks Using Random Forest Algorithm. ICCST 2019: 1-6 - Balaraja Lavanya, V. ThamizhThendral:
A novel data ciphering method for secure cloud storage. ICCST 2019: 1-6 - Divyans Mahansaria, Uttam Kumar Roy:
Secure Authentication for ATM transactions using NFC technology. ICCST 2019: 1-5 - T. A. Mohanaprakash, J. Andrews:
Novel privacy preserving system for Cloud Data security using Signature Hashing Algorithm. ICCST 2019: 1-6 - T. Nathezhtha, Sangeetha Dhamodaran, Vaidehi V.:
WC-PAD: Web Crawling based Phishing Attack Detection. ICCST 2019: 1-6 - Atieh Merikh Nejadasl, Mahmoud Chizari:
Using finger for touchscreen devices; is it safe? ICCST 2019: 1-3 - M. G. Padmashree, J. S. Arunalatha, K. R. Venugopal:
HPAKE: Hybrid Precocious Authentication and Key Establishment in IoT. ICCST 2019: 1-6 - Purushotham Parthiban Parthy, Gowthamaraj Rajendran:
Identification and prevention of social engineering attacks on an enterprise. ICCST 2019: 1-5 - Wendy Ponce-Hernandez, Ramon Blanco-Gonzalo, Raul Sánchez-Reillo, Judith Liu-Jimenez:
Template protection approaches: Fuzzy Vault scheme. ICCST 2019: 1-5 - Manthan Prajapati, Dharmesh Dave:
Host-based Forensic Artefacts of Botnet Infection. ICCST 2019: 1-4 - Rishu Raj, Soumya Michael, D. Femi:
Forest Monitoring System through RFID and Tensorflow Object Detection. ICCST 2019: 1-4 - Gowthamaraj Rajendran, R. S. Ragul Nivash, Purushotham Parthiban Parthy, S. Balamurugan:
Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures. ICCST 2019: 1-6 - Bobba Basaveswara Rao, Suneetha Bulla, Gangadhara Rao Kancherla, K. Chandan:
HRF (HTTP Request Filtering): A New Detection Mechanism of EDoS Attack on Cloud. ICCST 2019: 1-7 - Roopa Ravish, Varun R. Gupta, K. J. Nagesh, Amruth Karnam, Shanta Rangaswamy:
Software Implementation of an Automatic Movable Road Barrier. ICCST 2019: 1-6 - Michael Rhead, Soodamani Ramalingam, Robert Gurney, William E. Martin, Andrew Jones:
Implications of the Method of Construction of UK Number Plates for Infrared Reflectance and Camera Settings on ANPR System. ICCST 2019: 1-5 - S. Abijah Roseline, A. D. Sasisri, S. Geetha, C. Balasubramanian:
Towards Efficient Malware Detection and Classification using Multilayered Random Forest Ensemble Technique. ICCST 2019: 1-6 - K. B. Sarmila, S. V. Manisekaran:
A Study on Security Considerations in IoT Environment and Data Protection Methodologies for Communication in Cloud Computing. ICCST 2019: 1-6
skipping 10 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-21 02:57 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint