|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 35 publication records. Showing 35 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Davrondzhon Gafurov |
Emerging Biometric Modalities: Challenges and Opportunities. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Davrondzhon Gafurov, Patrick Bours |
Improved Hip-Based Individual Recognition Using Wearable Motion Recording Sensor. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | A. J. Clark, Patton Holliday, Robyn Chau, Harris Eisenberg, Melinda Chau |
Collaborative Geospatial Data as Applied to Disaster Relief: Haiti 2010. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pranab Kumar Dhar, Mohammad Ibrahim Khan, Cheol Hong Kim, Jong-Myon Kim |
An Efficient Audio Watermarking Algorithm in Frequency Domain for Copyright Protection. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Yamamoto, Toshihiro Yamauchi |
Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tai-Hoon Kim, Wai-Chi Fang, Muhammad Khurram Khan, Kirk P. Arnett, Heau-Jo Kang, Dominik Slezak (eds.) |
Security Technology, Disaster Recovery and Business Continuity - International Conferences, SecTech and DRBC 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hsiang-Cheh Huang, Ting-Hsuan Wang, Wai-Chi Fang |
Histogram-Based Reversible Data Hiding with Quadtree Concepts. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rosslin John Robles, Haeng-Kon Kim, Tai-Hoon Kim |
Internet SCADA Utilizing API's as Data Source. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Taehyoung Kim, Inhyuk Kim, Changwoo Min, Young Ik Eom |
MAS: Malware Analysis System Based on Hardware-Assisted Virtualization Technology. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chetana Hegde, H. Rahul Prabhu, D. S. Sagar, P. Deepa Shenoy, K. R. Venugopal 0001, Lalit M. Patnaik |
Human Authentication Based on ECG Waves Using Radon Transform. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mushtaq Ahmad |
Wireless Network Security Vulnerabilities and Concerns. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi |
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Maricel O. Balitanas, Tai-Hoon Kim |
Insecure Information System's Solution Using Isolation Method. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rosslin John Robles, Tai-Hoon Kim |
Communication Security for Control Systems in Smart Grid. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Syed Irfan Nabi, Syed Waqar Nabi, Syed Awais Ahmed Tipu, Bushra Haqqi, Zahra Abid, Khaled Alghathbar |
Data Confidentiality and Integrity Issues and Role of Information Security Management Standard, Policies and Practices - An Empirical Study of Telecommunication Industry in Pakistan. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Raed Alosaimy, Khaled Alghathbar, Alaaeldin M. Hafez, Mohamed Hamdy Eldefrawy |
NMACA Approach Used to Build a Secure Message Authentication Code. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aneel Rahim, Fahad Bin Muhaya |
Discovering the Botnet Detection Techniques. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hong-bin Yim, Jae-Il Jung |
Probabilistic Route Selection Algorithm for IP Traceback. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing |
Fusion of Moving and Static Facial Features for Robust Face Recognition. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid |
Issues of Security and Network Load in Presence - A Survey. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ju-Sung Kang, Okyeon Yi |
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wei Huang, Arthur Mynnet |
Effects of Changes in Lugu Lake Water Quality on Schizothorax Yunnansis Ecological Habitat Based on HABITAT Model. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bo-heung Chung, Jung-nye Kim |
Sample Bytes to Protect Important Data from Unintentional Transmission in Advanced Embedded Device. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Abdullah Sharaf Alghamdi, Syed Amanullah Quadri, Iftikhar Ahmad 0002, Khalid Al-Nafjan |
A Generic Approach to Security Assured Net-Centric Communications Network Architecture for C4I Systems. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jemal H. Abawajy, Tai-Hoon Kim |
Performance Analysis of Cyber Security Awareness Delivery Methods. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Imran Razzak, Muhammad Khurram Khan, Khaled Alghathbar |
Contactless Biometrics in Wireless Sensor Network: A Survey. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Toshihiro Yamauchi, Takayuki Hara, Hideo Taniguchi |
A Mechanism That Bounds Execution Performance for Process Group for Mitigating CPU Abuse. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hoon Ko, Zita A. Vale |
Optimal Intelligent Supervisory Control System in Cyber-Physical Intelligence. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Khaled Alghathbar |
One-Time Password System with Infinite Nested Hash Chains. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Intae Kim, Keewook Rim, Junghyun Lee |
Secure OSGi Platform against Service Injection. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pranab Kumar Dhar, Cheol Hong Kim, Jong-Myon Kim |
Robust Audio Watermarking Scheme Based on Deterministic Plus Stochastic Model. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bilal Khan, Khaled Alghathbar, Muhammad Khurram Khan, Abdullah M. AlKelabi, Abdulaziz Alajaji |
Using Arabic CAPTCHA for Cyber Security. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Davrondzhon Gafurov, Patrick Bours, Bian Yang, Christoph Busch 0001 |
Impact of Finger Type in Fingerprint Authentication. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nagaraj Ambika, G. T. Raju |
Figment Authentication Scheme in Wireless Sensor Network. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Syed Irfan Nabi, Abdulrahman A. Mirza, Khaled Alghathbar |
Information Assurance in Saudi Organizations - An Empirical Study. |
FGIT-SecTech/DRBC |
2010 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #35 of 35 (100 per page; Change: )
|
|