default search action
ICITCS 2015: Kuala Lumpur, Malaysia
- 5th International Conference on IT Convergence and Security, ICITCS 2015, Kuala Lumpur, Malaysia, August 24-27, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-6537-6
- Syh-Yuan Tan, Ji-Jian Chin, Geong Sen Poh, Yvonne H. S. Kam, Wei-Chuen Yau:
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications. 1-5 - Michel Toulouse, Quang Minh Bui, Philip Curtis:
A Consensus Based Network Intrusion Detection System. 1-6 - Maleerat Sodanil, Chalermpong Intarat:
A Development of Image Enhancement for CCTV Images. 1-4 - Yuta Urushiyama, Yoshifumi Manabe:
A Double-Private epsilon-Fuzzy Matching Protocol. 1-4 - Seung-Ho Kang:
A Feature Selection Algorithm to Find Optimal Feature Subsets for Detecting DoS Attacks. 1-3 - Idris Abubakar Umar, Zurina Mohd Hanapi, Aduwati Sali, Zuriati Ahmad Zukarnain:
A Forwarding Strategy for DWSIGF Routing Protocol. 1-4 - AHyeon-Ju Park, Hye-Young Kim, Jong-In Lim:
A Framework of Device Authentication Management in IoT Environments. 1-3 - Yew Kwang Hooi, Mohd Fadzil Hassan, Ahmad Izuddin B. Zainal Abidin, Noreen Izza Bt. Arshad, Azmi M. Shariff:
A Generic Ontology Methodology and Factors to Address Design Consistency. 1-5 - Rashmi Agrawal, Babu Ram:
A Modified K-Nearest Neighbor Algorithm to Handle Uncertain Data. 1-4 - So Yeon Kim, Sungdo Gu, Hyun-hwan Jeong, Kyung-Ah Sohn:
A Network Clustering Based Software Attribute Selection for Identifying Fault-Prone Modules. 1-5 - Abdulmawla M. A. Najih, Syed Abdul Rahman Al-Haddad, Abd. Rahman Ramli, Shaiful Jahari Hashim:
A New Colour Image Watermarking Technique Using Special Domain. 1-5 - Soowoong Eo, Wooyeon Jo, Seokjun Lee, Taeshik Shon:
A Phase of Deleted File Recovery for Digital Forensics Research in Tizen. 1-3 - Md. Zaigham Zaheer, Jin Young Kim, Hyoung-Gook Kim, Seung You Na:
A Preliminary Study on Deep-Learning Based Screaming Sound Detection. 1-4 - Shirish Kumar Singh, Bharavi Mishra, Poonam Gera:
A Privacy Enhanced Security Framework for Android Users. 1-6 - Dang Hai Van, Nguyen Dinh Thuc:
A Privacy Preserving Message Authentication Code. 1-4 - Thong-Yun Teh, Yik-Shu Lee, Zi-Yik Cheah, Ji-Jian Chin:
A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices. 1-5 - Yili Wang, Byung Jun Lee, Jung June Lee, Hee Yong Youn:
A PSO-Based Buffer Management Scheme for Improving Hit Ratio of Solid State Drive. 1-5 - K. Sangeeth, Preeja Pradeep, P. L. Divya, P. Rekha, R. D. Arya Devi, Sheeja L., Maneesha Vinodini Ramesh:
A Remote Code Editing Framework for AMRITA Remote Triggered WSN Laboratory. 1-5 - Ali I. Adnan, Zurina Mohd Hanapi, Mohamed Othman, Zuriati Ahmad Zukarnain, Abubakar Sadiq:
A Reputation-Based Routing Protocol for Wireless Sensor Networks. 1-4 - Samaneh Rastegari, Chiou Peng Lam, Philip Hingston:
A Statistical Rule Learning Approach to Network Intrusion Detection. 1-5 - Komchan Chaitien, Chayaphon Tanwongvarl, Soamsiri Chantaraskul:
Adaptive Multichannel Approach for Congestion Control in Vehicular Safety Communications. 1-5 - Nakhoon Baek:
Adding Advanced Debug Output Features to an Existing OpenGL ES 1.1 Implementation. 1-3 - Hye-Young Kim:
An Effective Load Balancing Scheme Maximizes the Lifetime in Wireless Sensor Networks. 1-3 - Song Yi Kim, Hyoseung Kim, Dong Hoon Lee:
An Efficient ID-Based Mutual Authentication Secure against Privileged-Insider Attack. 1-4 - Jisu Kim, Gemoh T., Sanghyun Park, Jinsul Kim, Sunghyun Yoon, HoYong Ryu:
An Efficient Multimedia Transmission Control Methodology Based on NFV. 1-4 - Hitham Alhussian, Nordin Zakaria:
An Efficient Zero-Laxity Based Real-Time Multiprocessor Scheduling Algorithm. 1-4 - Preeja Pradeep, P. L. Divya, R. D. Arya Devi, P. Rekha, K. Sangeeth, Tinu Vinod, Maneesha Vinodini Ramesh:
An Energy Aware Schedule Based Remote Triggered Wireless Sensor Network Laboratory. 1-5 - Kanokwan Atchariyachanvanich, Rungsiman Nararatwong, Nagul Cooharojananone:
An Exploratory Study on Users' Intention to Purchase Items from Mobile Applications in Thailand. 1-5 - Jong Pil Yun, Hyoseung Kim, Dong Hoon Lee:
An Improved Fuzzy Attribute-Based Authentication. 1-5 - Jihyeon Choi, Byung Jun Lee, DongYoung Jung, Hee Yong Youn:
An SSD-Based Accelerator Using Partitioned Bloom Filter for Directory Parsing. 1-5 - Dong-Hyun Kim, Jun-Hwan Huh, Jong-Deok Kim:
Analysis of Broadcast Packet Loss for Unequal Loss Protection in Wi-Fi Broadcasting System. 1-4 - Alemu Molla Kebede, Kaleab Getaneh Tefrie, Kyung-Ah Sohn:
Anonymous Author Similarity Identification. 1-5 - Seungae Kang, Kyungock Yi, Soojung Park, Bonsup Park:
Applications of u-Fitness in Sports Field. 1-3 - Laula Zhumabayeva, Tamara Zhukabayeva, Gairatzhan Mavlankulov, Mohamed Othman:
Arbitrary Petri Nets Controlled Grammars Under Parallel Firing Strategy. 1-3 - Jiyoung Yoon, Nakhoon Baek, Hwanyong Lee:
ARINC661 Graphics Rendering Based on OpenVG. 1-4 - Shuichiro Yamamoto:
Assuring Security through Attribute GSN. 1-5 - Ekarat Prompila, Yachai Limpiyakorn:
Automating Documentation of HTML Prototype. 1-5 - Jongseon Park, Do-Sik An, Gi-Hwan Cho:
Available Bandwidth Estimation Method Adaptive to Network Traffic Load Considering Fairness with UDT Flows. 1-4 - Boonyakorn Jantaranuson, Nagul Cooharojananone:
Background Subtraction from Auto-Exposure Surveillance Camera in Restaurant. 1-5 - Semin Kang, Sung-Soo Kim, Jongho Won, Young-Min Kang:
Bidirectional Constructive Crossover for Evolutionary Approach to Travelling Salesman Problem. 1-4 - Sang Hyun Yoo, Yonjoong Ryou, Kyung Tae Kim, Hee Yong Youn:
Block Replacement Based on Access Locality with Solid State Drive. 1-5 - Ye Tang, Huiyun Li, Guoqing Xu:
Cache Side-Channel Attack to Recover Plaintext against Datagram TLS. 1-6 - Vijay Maurya, Suresh C. Gupta:
Comparative Analysis of Processors Performance Using ANN. 1-5 - Munwar Ali, Low Tang Jung:
Confidentiality Based File Attributes and Data Classification Using TsF-KNN. 1-5 - Sungdo Gu, So Yeon Kim, Hyun-hwan Jeong, Kyung-Ah Sohn:
Constructing and Exploiting Software Metrics Networks for Software Quality Assessment. 1-5 - Seunghoe Gu, Jong-Hwan Kim, Younghoon Kim, Cheoleun Moon, Ikjun Yeom:
Controlled Queue Management in Software-Defined Networks. 1-3 - Anna Epishkina, Konstantin Kogos:
Covert Channels Parameters Evaluation Using the Information Theory Statements. 1-5 - Seungwook Oh, Dae-Won Park, Youngjin Kim, Suhyun Park:
Design and Implementation of Display Module for Feature Symbol Verification Based on S-100. 1-4 - Wonhyuk Lee, Minki Noh, Buseung Cho, TaeYeon Kim, Hyuncheol Kim:
Designing of Healthcare Information Network Using IPv6 Cloud Networks. 1-3 - Wonhyuk Lee, Seunghae Kim, Hongseok Jeon, Hyuncheol Kim:
Detecting an Abnormal Traffic on Healthcare Network. 1-4 - Fumiko Nagoya, Shaoying Liu, Kyousuke Hamada:
Developing a Web Dictionary System Using the SOFL Three-Step Specification Approach. 1-5 - Kenji Ohmori:
Development of Functional Reactive Programming Using an Incrementally Modular Abstraction Hierarchy. 1-5 - H. S. Sheshadri, S. R. Bhagya Shree, Murali Krishna:
Diagnosis of Alzheimer's Disease Employing Neuropsychological and Classification Techniques. 1-6 - Shamimi A. Halim, Muthukkaruppan Annamalai, Mohd Sharifuddin Ahmad, Rashidi Ahmad:
Domain Expert Maintainable Inference Knowledge of Assessment Task. 1-5 - Seung Wan Kim, Young Gyo Jung, Dong Ryeol Shin, Hee Yong Youn:
Dynamic Queue Management Approach for Data Integrity and Delay Differentiated Service in WSN. 1-5 - Ki-sung Hong, Chulung Lee, Kyungchul Lee:
Dynamic Toll Pricing Model for an Intelligent Transportation System with Individual High Occupancy Toll Lanes. 1-6 - Muhammad Najam Dar, M. Usman Akram, Arslan Shaukat, Muazzam Ali Khan:
ECG Based Biometric Identification for Population with Normal and Cardiac Anomalies Using Hybrid HRV and DWT Features. 1-5 - Dongjun Suh, Hyunyoung Kim, Jinsul Kim:
Estimation of Water Demand in Residential Building Using Machine Learning Approach. 1-2 - Pisal Setthawong, Nattaworn Tancharoen:
Extending a Standard Tablet into an Ocarina Playing Gaming Platform with Projected Parallax Layers. 1-5 - Arslan Shaukat, Mansoor Aziz, M. Usman Akram:
Facial Expression Recognition Using Multiple Feature Sets. 1-5 - Hon-Sang Cheong, Wai-Kong Lee:
Fast Implementation of Block Ciphers and PRNGs for Kepler GPU Architecture. 1-5 - K. Prasanna Lakshmi, C. R. K. Reddy:
Fast Rule-Based Prediction of Data Streams Using Associative Classification Mining. 1-5 - Young Kyung Lee, Dong Hoon Lee:
Forward Secure Non-Interactive Key Exchange from Indistinguishability Obfuscation. 1-4 - Piyaporn Samsuwan, Yachai Limpiyakorn:
Generation of Data Warehouse Design Test Cases. 1-4 - Hardeep Singh, Bikram Pal Singh:
HR Challenges & Issues in Insurance Industry: An Empirical Study. 1-5 - Amit P. Ganatra:
Information Fusion (Ensemble System) in Data Warehousing & Data Mining. 1-6 - Lukas Cegan:
Intelligent Preloading of Websites Resources Based on Clustering Web User Sessions. 1-4 - Robin Tommy, Ullas Ravi, Deen Mohan, Jobin Luke, Aswathy S. Krishna, Girija Subramaniam:
Internet of Things (IoT) Expanding the Horizons of Mainframes. 1-4 - Yuangang Yao, Xing Wang, Xiangjie Meng, Xiaofei Zhang, Bin Li:
ISEK: An Information Security Knowledge Graph for CISP Knowledge System. 1-4 - Tee Wee Jing, Wong Seng Yue, Raja Kumar Murugesan:
Learning Outcome Enhancement via Serious Game: Implementing Game-Based Learning Framework in Blended Learning Environment. 1-3 - Kamsiah Mohamed, Mohd Nazran Mohammed Pauzi, Fakariah Hani Hj Mohd Ali, Suriyani Ariffin:
Linearity Test Framework for S-Box in Block Cipher. 1-5 - Erwin Adi, Zubair A. Baig, Chiou Peng Lam, Philip Hingston:
Low-Rate Denial-of-Service Attacks against HTTP/2 Services. 1-5 - Daseul Oh, Dae-Won Park, Yongmin Lim, Suhyun Park:
Methods of GML-Based Representation of S-101 ENC Vector Data. 1-3 - Do Van Thanh, Boning Feng, Clark Swafford, Do van Thuan, Loc H. Khuong:
Mobile Identity as a Tool to Develop Society. 1-6 - Kriengkri Pongpanjanthra, Yachai Limpiyakorn:
Model-Based Approach to Generating Web Portals. 1-5 - Mohammed Salem Atoum:
New MP3 Steganography Data Set. 1-7 - Hwa-Jin Park:
Occlusion Handling Based on Projective Depth in Object Tracking. 1-2 - Thu N. A. Nguyen, Van H. Dang, Thuc Dinh Nguyen:
On the Public Key-Based Auditing Methods. 1-6 - Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng:
On the Security of Two Pairing-Based Signature Schemes. 1-4 - A.-yong Li, Li-rong Wei:
Optimization Model of Information Flow in Power Grid Engineering Construction Projects Based on Improved DSM. 1-4 - Tanveer A. Zia:
Organisations Capability and Aptitude towards IT Security Governance. 1-4 - Vitruvius John D. Barayuga, William Emmanuel S. Yu:
Packet Level TCP Performance of NAT44, NAT64 and IPv6 Using Iperf in the Context of IPv6 Migration. 1-3 - Khush Naseeb Fatima, M. Usman Akram, Shafaat A. Bazaz:
Papilledema Detection in Fundus Images Using Hybrid Feature Set. 1-4 - Kang Chian Le, Rosni Abdullah:
Parallel Strategies for Harmony Search on CUDA to Solve Traveling Salesman Problem. 1-7 - Md. Nazrul Islam, Jaime Gallardo-Alvarado, Othman bin Hj Ahmad, Mazlina Binti Mamat, B. K. Ghosh:
Path Planning Algorithm for Manipulators Based on an Improved Backtracking Search Algorithm. 1-5 - Tamara Zhukabayeva, Zhanar O. Oralbekova, Makpal Zhartybayeva, Ainur Zhumadillayeva, Aigul Adamova:
Prospects of Development of Technologies in the Field of Robotics and the Stages of Design of Mobile Robotic Complex. 1-4 - Nakhoon Baek, Byeonguk Im:
Providing Preliminary Profiling Information for OpenGL ES 1.1 Application Programs. 1-3 - Nor Awani Che Hassan, Kamaludin Mohamad Yusof, Sharifah Kamilah Syed Yusof:
Ranging Estimation Using Dual-Frequency Doppler Technique. 1-5 - Hyunjin Kim, Seokcheol Lee, SungJin Kim, Taeshik Shon:
Reliability Enhanced Communication Guidance for Electric Utilities Based on Regulatory Standard. 1-4 - Firas Najjar, Mohammad M. Kadhum:
Reliable Behavioral Dataset for IPv6 Neighbor Discovery Protocol Investigation. 1-5 - Preeja Pradeep:
Research Domains for Cognitive Radio: A Survey. 1-5 - Trinh Tan Dat, Jin Young Kim, Hyoung-Gook Kim, Kyong-Rok Lee:
Robust Speaker Verification Using Low-Rank Recovery under Total Variability Space. 1-4 - Muhammad Zubair, Changwoo Yoon, Hyunyoung Kim, Jisu Kim, Jinsul Kim:
Smart Wearable Band for Stress Detection. 1-4 - Malek Ahmad Theeb Almomani, Shuib Basri, Ahmad Kamil Bin Mahmood, Amos Orenyi Bajeh:
Software Development Practices and Problems in Malaysian Small and Medium Software Enterprises: A Pilot Study. 1-5 - Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of a Pairing Function for Public Key Cryptosystems. 1-5 - Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability. 1-4 - Shoaib Hassan, Usman Qamar, Taimoor Hassan, Muhammad Waqas:
Software Reverse Engineering to Requirement Engineering for Evolution of Legacy System. 1-4 - Wong Seng Yue, Tee Wee Jing:
Survey Analysis: The Effectiveness of Game-Based Learning (GBL) in Tertiary Education Environment. 1-4 - Shaik Shabana Anjum, Rafidah Md Noor, Mohammad Hossein Anisi:
Survey on MANET Based Communication Scenarios for Search and Rescue Operations. 1-5 - Muhammad Sami, Yasar Ayaz, Mohsin Jamil, Syed Omer Gilani, Muhammad Naveed:
Text Detection and Recognition for Semantic Mapping in Indoor Navigation. 1-4 - Sunyoung Kang:
The Application of Healthcare Device for Exercise Prescription. 1-4 - Hwai-Tsu Hu, Ling-Yuan Hsu, Sheng-Yu Lai, Yu-Jung Chang:
The Use of Spectral Shaping to Extend the Capacity for DWT-Based Blind Audio Watermarking. 1-5 - Mifrah Ahmad, Lukman Ab. Rahim, Noreen Izza Arshad:
Towards an Effective Modelling and Development of Educational Games with Subject-Matter: A Multi-Domain Framework. 1-5 - Majda A. Wazzan, Mohammad Hamza Awedh:
Towards Improving Web Attack Detection: Highlighting the Significant Factors. 1-5 - Youngho Suh, Kyung Tae Kim, Dong Ryeol Shin, Hee Yong Youn:
Traffic-Aware Energy Efficient Routing (TEER) Using Multi-Criteria Decision Making for Wireless Sensor Network. 1-5 - Seungae Kang:
Trend of the Sports Convergence Technology for Health Promotion. 1-3 - Hyoung-Gook Kim, Hye-Seung Cho, Jin Young Kim:
TV Advertisement Search Based on Audio Peak-Pair Hashing in Real Environments. 1-4 - Mustapha Yusuf Abubakar, Low Tang Jung, Oi Mean Foong:
Two Channel Quantum Security Modelling Focusing on Quantum Key Distribution Technique. 1-5 - Mifrah Ahmad, Lukman Ab. Rahim, Noreen Izza Arshad:
Understanding Game Play Domain: An Interpretive Approach towards Modelling Educational Games with Multi-Domain Framework. 1-5 - Geetanjali Sahi:
User Satisfaction and Website Usability: Exploring the Linkages in B2C E-Commerce Context. 1-4 - Narungsun Wilaisakoolyong:
Using Cloud Computing Systems to Create Virtual Classroom Model for Thai-Nichi's Students. 1-4 - Ru Ko, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei:
Vulnerability Detection of Multiple Layer Colluding Application through Intent Privilege Checking. 1-7 - Norzaidi Baharudin, Fakariah Hani Mohd Ali, Mohamad Yusof Darus, Norkhushaini Awang:
Wireless Intruder Detection System (WIDS) in Detecting De-Authentication and Disassociation Attacks in IEEE 802.11. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.