default search action
12th ICITST 2017: Cambridge, UK
- 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, Cambridge, United Kingdom, December 11-14, 2017. IEEE 2017, ISBN 978-1-908320-93-3
Keynotes
- Charles Kim:
Keynote speaker 1: Cyber-resilient ICS through diversified redundancy and intrusion detection. 15 - Evangelos Pournaras:
Keynote speaker 2: Participatory self-management systems for resilient smart cities. 16 - Gary B. Wills:
Keynote speaker 3: Looking after our IP in supply chain. 17 - Anne E. James:
Keynote speaker 4: Cloud forensics. 18 - Steven Furnell:
Keynote speaker 5: Taming security technology. 19 - Enrico Malfa:
Keynote speaker 6: Steel made in Europe: The backbone of sustainability. 20
Workshops
Workshop 1: Chaos-based Data Protection, Data Security and Hiding in Multimedia Communications (CDP-DSHMC 2017)
- Tasnime Omrani, Rabei Becheikh, Olfa Mannai, Rhouma Rhouma, Safya Belghith:
RARE: A robust algorithm for rapid encryption. 23-28 - Marwa Saidi, Houcemeddine Hermassi, Rhouma Rhouma, Safya Belghith:
LSB-hamming based chaotic steganography (LH-Steg). 29-34 - Nabil Abdoun, Safwan El Assad, Khodor Hammoud, Rima Assaf, Mohamad Khalil, Olivier Déforges:
New keyed chaotic neural network hash function based on sponge construction. 35-38 - Desislav Andreev, Simona Petrakieva, Ina Taralova:
Reveal false names of accounts as a result of hackers attacks: Security systems with heightened safety of information. 39-42 - Ta Thi Kim Hue, Thang Manh Hoang, An Braeken:
Lightweight signcryption scheme based on discrete Chebyshev maps. 43-47
Workshop 2: The 8th International Workshop on Cloud Applications and Security (CAS'17)
- Muhammad Saqib Niaz, Gunter Saake:
Forward secure searchable symmetric encryption. 49-54 - Deepak Janardhanan, Enda Barrett:
CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models. 55-60 - Rachael Shaw, Enda Howley, Enda Barrett:
An advanced reinforcement learning approach for energy-aware virtual machine consolidation in cloud data centers. 61-66 - Martin Duggan, Karl Mason, Jim Duggan, Enda Howley, Enda Barrett:
Predicting host CPU utilization in cloud computing using recurrent neural networks. 67-72
Sessions
Session 1: Information Security
- Christophe Feltus, Erik H. A. Proper:
Towards a security and privacy co-creation method. 75-80 - Roman Graf, Ross King:
Secured transactions technique based on smart contracts for situational awareness tools. 81-86 - Messaouda Boumaraf, Fatiha Merazka:
Speech encryption based on hybrid chaotic key generator for AMR-WB G.722.2 codec. 87-91 - Ferda Ernawan, Muhammad Nomani Kabir, Zuriani Mustaffa:
A blind watermarking technique based on DCT psychovisual threshold for a robust copyright protection. 92-97 - Fredrik Blix, Salah Addin Elshekeil, Saran Laoyookhong:
Data protection by design in systems development: From legal requirements to technical solutions. 98-103
Session 2: Cyber Security
- Saja Alqurashi, Omar Batarfi:
A comparison between API call sequences and opcode sequences as reflectors of malware behavior. 105-110 - Basil Alothman, Prapa Rattadilok:
Android botnet detection: An integrated source code mining approach. 111-115 - Fayez Alotaibi, Nathan L. Clarke, Steven Furnell:
An analysis of home user security awareness & education. 116-122 - Shaikha AlShehyari, Chan Yeob Yeun, Ernesto Damiani:
Monitoring darknet activities by using network telescope. 123-128 - Faisal Alotaibi, Steven Furnell, Ingo Stengel, Maria Papadaki:
Enhancing cyber security awareness with mobile games. 129-134
Session 3: Wireless Networking and Communication
- Shinsaku Kiyomoto, Anirban Basu, Mohammad Shahriar Rahman, Sushmita Ruj:
On blockchain-based authorization architecture for beyond-5G mobile services. 136-141 - Daehee Kim, Jaekeun Yun, Sungjun Kim:
Hybrid public key authentication for wireless sensor networks. 142-143 - Norah S. Farooqi:
Intelligent safety management system for crowds using sensors. 144-147 - Abdullah Alhumaidi Alotaibi, Marios C. Angelides:
A hybrid approach for femtocell co-tier interference mitigation. 148-153
Session 4: Internet Application and Technology
- Aspen Olmsted:
Entity identity, performance, and storage. 155-160 - Ashik Mostafa Alvi, Md. Faqrul Islam Shaon, Prithvi Ranjan Das, Manazir Mustafa, Mohammad Rezaul Bari:
Automated course management system. 161-166 - Omotayo Kayode Abatan, Manoj S. Maharaj:
Change management and the integration of information technology: Research notes from selected African universities. 167-172 - Victor Clincy, Hossain Shahriar:
Web service injection attack detection. 173-178 - Ahyoung Kim, Junwoo Lee:
Mobile business performance metrics: Framework and case study. 179-184
Session 5: Internet Applications and Technology
- Luis F. Mejia-Ricart, Paul Helling, Aspen Olmsted:
Evaluate action primitives for human activity recognition using unsupervised learning approach. 186-188 - Pasha Sadeghian, Casey Wilson, Stephen Goeddel, Aspen Olmsted:
Classification of music by composer using fuzzy min-max neural networks. 189-192 - Pasha Sadeghian, Aspen Olmsted:
Assessment of fuzzy min-max neural networks for classification tasks. 193-196 - Huicong Loi, Aspen Olmsted:
Low-cost detection of backdoor malware. 197-198 - Walter Blair, Aspen Olmsted, Paul Anderson:
Docker vs. KVM: Apache spark application performance and ease of use. 199-201
Session 6: Internet Applications and Technology
- Ryan Lile, Aspen Olmsted:
Meaningful sandbox data. 203-204 - Elizabeth Healy, Husna Siddiqui, Aspen Olmsted:
Classifying influenza outbreaks by analyzing and filtering Twitter data. 205-207 - Casey Wilson, Aspen Olmsted:
Handling an organization's communication needs with a single web service. 208-209 - Andrew Bissada, Aspen Olmsted:
Mobile multi-factor authentication. 210-211 - William Kennedy, Aspen Olmsted:
Three factor authentication. 212-213
Session 7: Infonomics and e-Technology
- Md. Tomig Uddin Ahmed, Nazrul Islam Bhuiya, Md. Mahbubur Rahman:
A secure enterprise architecture focused on security and technology-transformation (SEAST). 215-220 - Ahana Roy, Aspen Olmsted:
Distributed query processing and data sharing. 221-224 - Rio Guntur Utomo, Robert John Walters, Gary B. Wills:
Factors affecting the implementation of information assurance for eGovernment in Indonesia. 225-230 - Chatipot Srimuang, Nagul Cooharojananone, Uthai Tanlamai, Achara Chandrachai, Kanokwan Atchariyachanvanich:
The study of public organization's intention to use an open government data assessment application: Testing with an applicable TAM. 231-236
Session 8: Wireless Networking and Communication
- Faris A. Almalki, Marios C. Angelides:
Propagation modelling and performance assessment of aerial platforms deployed during emergencies. 238-243 - Callum Brill, Thomas Nash:
A comparative analysis of MANET routing protocols through simulation. 244-247 - Omego Obinna, Eckhard Pfluegel, Charles A. Clarke, Martin J. Tunnicliffe:
A multi-channel steganographic protocol for secure SMS mobile banking. 248-253
Session 9: Cyber Security
- Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Gerhard Tauber:
On the cost of cyber security in smart business. 255-260 - Sanjay Kumar, Ari Viinikainen, Timo Hämäläinen:
Evaluation of ensemble machine learning methods in mobile threat detection. 261-268 - Abidullah Zarghoon, Irfan Awan, Jules Pagna Disso, Richard Dennis:
Evaluation of AV systems against modern malware. 269-273 - Lamya Alqaydi, Chan Yeob Yeun, Ernesto Damiani:
Security enhancements to TLS for improved national control. 274-279
Session 10: Information Security
- Basil Alothman, Prapa Rattadilok:
Towards using transfer learning for Botnet Detection. 281-282 - Timibloudi S. Enamamu, Nathan L. Clarke, Paul S. Haskell-Dowland, Fudong Li:
Transparent authentication: Utilising heart rate for user authentication. 283-289 - Thomas Nash, Aspen Olmsted:
Performance vs. security: Implementing an immutable database in MySQL. 290-291
Session 11: Cloud Security
- Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos:
An architecture for privacy-preserving sharing of CTI with 3rd party analysis services. 293-297 - Abeer F. Alkhwaldi, Mumtaz M. Kamala, Rami Qahwaji:
From e-govemment to cloud-government: Challenges of Jordanian citizens' acceptance for public services. 298-304 - Alaa Altorbaq, Fredrik Blix, Stina Sorman:
Data subject rights in the cloud: A grounded study on data protection assurance in the light of GDPR. 305-310 - Shuaiyi Bu, Shuxin Yang, Haoming Ji:
Distributed computing framework in security: Case study of encryption method. 311-318
Session 12: Infonomics and e-Technology
- Yen-Mei Lee:
Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions. 320-324 - Paweena Wanchai:
Customer churn analysis : A case study on the telecommunication industry of Thailand. 325-331 - Haya Alshehri, Farid Meziane:
The influence of advanced and secure e-commerce environments on customers behaviour: The case of Saudis in the UK. 332-337
Session 13: Infonomics and e-Technology
- Paul Helling, Ahana Roy, Aspen Olmsted:
Effects of lexicon size on solving bananagrams. 339-341 - Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian:
Work in Progress: Nobody knows who you really are online/on the world wide web - Amazon-recognition-service based 'Virtualnet' supported authentication: How certain are you it is indeed you in front of a screen? 342-345 - Wayne Chen, Aspen Olmsted:
Considerations for OSV over Linux-based virtual machines. 346-348 - Seamus Dowling, Michael Schukat, Hugh Melvin:
Using analysis of temporal variances within a honeypot dataset to better predict attack type probability. 349-354
Session 14: Internet Applications and Technology
- Thomas Briggs, Aspen Olmsted:
Client side calculation of 'bacon number'. 356-358 - Prathap Siddavaatam, Reza Sedaghat, Aakriti Tarun Sharma:
intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks. 359-364 - Clara Bertolissi, Omar Boucelma, Worachet Uttha:
Enhancing security in the cloud: When traceability meets access control. 365-366 - Cameron Hamilton, Aspen Olmsted:
Database multi-factor authentication via pluggable authentication modules. 367-368
Session 15: Internet Applications and Technology
- Blake Badders, Aspen Olmsted:
Improve CRUD performance on hierarchical data: Nested interval model vs. nested set model. 370-371 - Juhua Liu, Wei Li, Guoqiang Bai:
Efficient hardware implementation of ITUbee for lightweight application. 372-376 - Stephen Goeddel, Pasha Sadeghian, Aspen Olmsted:
Weighing the shopping benefits of a smarter refrigerator. 377-378 - Preston T. Owens, Aspen Olmsted:
Optimizing synchronization of cloud storage services: Combining benchmark monitoring and learning-based framework. 379-380
Session 16: Cloud Security and Digital Forensics
- Roland Pellegrini, Patrick Rottmann, Georg Strieder:
Preventing vendor lock-ins via an interoperable multi-cloud deployment approach. 382-387 - Shahlaa Mashhadani, Hiba Al-Kawaz, Nathan L. Clarke, Steven Furnell, Fudong Li:
A novel multimedia-forensic analysis tool (M-FAT). 388-395 - Thomas Zefferer, Dominik Ziegler, Andreas Reiter:
Best of two worlds: Secure cloud federations meet eIDAS. 396-401
Session 17: Infonomics and e-Technology
- Husna Siddiqui, Aspen Olmsted, Brendan Keane:
Venmo: Exposing a user's lifestyle. 403-404 - Philip McShane, Darryl Stewart:
Challenge based visual speech recognition using deep learning. 405-410 - Nagul Cooharojananone, Krittika Akasarakul, Thipsuda Wongkhamdi, Phonkornkrit Pruetthiwongwanich, Kanokwan Atchariyachanvanich:
The study of the local community products (OTOP) website characteristics toward buyer decision using eye tracking. 411-416 - W. P. Yuen, K. B. Chuah:
Data visibility and trust enhancement of enterprise customers in cloud computing services. 417-422
Session 18: Information and Cyber Security
- Ahana Roy, Louis Mejia, Paul Helling, Aspen Olmsted:
Automation of cyber-reconnaissance: A Java-based open source tool for information gathering. 424-426 - Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer:
Towards a security baseline for IaaS-cloud back-ends in Industry 4.0. 427-432 - Daniel Fischer, Bernd Markscheffel, K. Scherr:
Secure e-mail communication - Comparison and selection of encryption solutions using an utility value analysis approach. 433-435 - Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer:
Towards comparing programming paradigms. 436-437
Session 19: Intelligent Control
- Ahmad Bennakhi, Mohamed A. Jeragh:
Applying dynamic verification tagging to the k-anonymity model. 439-443 - Kritika Kongsoontornkijkul, Rath Pichyangkura, Pakpachong Vadhanasindhu, Kanlaya Vanichbuncha:
A study of factors effecting Thailand talent mobility programme: Case of university and food technology industry. 444-449 - Thomas Nash, Aspen Olmsted:
shinySDM: Point and click species distribution modeling. 450-451 - Seth Stoudenmier, Aspen Olmsted:
Efficient retrieval of information from hierarchical REST requests. 452-454
Session 20: Information Security and Intelligent Control
- Kouya Tochikubo:
Multiple assignment secret sharing scheme using hierarchical threshold scheme. 456-461 - Husna Siddiqui, Elizabeth Healy, Aspen Olmsted:
Bot or not. 462-463 - Yichen Ma, Fuyao Wang, Zhuozheng Wang:
Intelligent laboratory management system based on Internet of Things. 464-467
Session 21: Infonomics and e-Technology
- Walter Blair, Aspen Olmsted, Paul Anderson:
Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input files. 469-471 - Luis F. Mejia-Ricart, Aspen Olmsted:
Avoiding unnecessary deaths: Drag-Back, a deadlock avoidance model. 472-474 - Khurram Mahmood, Zainab Nayyar, Hafiz Mushtaq:
Role of transformational leadership on e-govemment switching: Multi-channel and digital divide. 475-478 - Keshnee Padayachee, Elias Worku:
Shared situational awareness in information security incident management. 479-483 - Michelle G. Cacais, Gilvandenys Leite Sales:
A collaborative system for corporate performance evaluation using gamification and the learning vectors model. 484-489
Session 22: Infonomics and e-Technology
- Casey Wilson, Anna V. Sandifer, Aspen Olmsted:
Designing an assembly language using MIT App inventor. 491-493 - Ali Aydin Selçuk, Fatih Orhan, Berker Batur:
Undecidable problems in malware analysis. 494-497 - Wren Chan, Aspen Olmsted:
Ethereum transaction graph analysis. 498-500 - Anna V. Sandifer, Casey Wilson, Aspen Olmsted:
Detection of fake online hotel reviews. 501-502
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.