default search action
ICCST 2018: Montreal, QC, Canada
- 2018 International Carnahan Conference on Security Technology, ICCST 2018, Montreal, QC, Canada, October 22-25, 2018. IEEE 2018, ISBN 978-1-5386-7931-9
- Pablo Fernández López, Kiyoshi Kiyokawa, Yang Wu, Judith Liu-Jimenez:
Influence of Walking Speed and Smartphone Position on Gait Recognition. 1-5 - Robin Riz à Porta, Yanik Sterchi, Adrian Schwaninger:
Examining Threat Image Projection Artifacts and Related Issues: A Rating Study. 1-4 - Dongwan Shin, Jiangfeng Sun:
An Empirical Study of SSL Usage in Android Apps. 1-5 - Basirudin Djamaluddin, Ahmed Alnazeer, Farag Azzedin:
Web Deception Towards Moving Target Defense. 1-5 - Vincent E. Urias, William M. S. Stout, Brian P. Van Leeuwen, Han Lin:
Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper. 1-5 - Jorge Sanchez-Casanova, Ines Goicoechea-Telleria, Judith Liu-Jimenez, Raul Sánchez-Reillo:
Performing a Presentation Attack Detection on Voice Biometrics. 1-5 - Vincent E. Urias, Brian P. Van Leeuwen, William M. S. Stout, Han Lin:
Applying a Threat Model to Cloud Computing. 1-5 - Bhashyam Balaji:
Quantum Radar: Snake Oil or Good Idea? 1-7 - C. M. Keith Harman:
MIMO Cable Guided Radar. 1-5 - William M. S. Stout, Brian P. Van Leeuwen, Vincent E. Urias, Julian Tuminaro, Spencer Schrock, Nomaan Dossaji:
Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of Moving Target Defenses. 1-5 - Rima Rana, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem. 1-5 - Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani:
The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time Intervals. 1-6 - M. Phil Lowney, Hong Liu, Eugene Chabot:
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics. 1-5 - Soodamani Ramalingam, Fabio Garzia:
Facial Expression Recognition using Transfer Learning. 1-5 - Paloma Tirado-Martin, Raul Sánchez-Reillo, Jongwon Park:
Effects of Data Reduction when using Gaussian Mixture Models in Unidimensional Biometric Signals. 1-5 - Fabio Garzia, Roberto Cusani, Francesco Borghini, Benedetta Saltini, Mara Lombardi, Soodamani Ramalingam:
Perceived Risk Assessment through Open-Source Intelligent Techniques for Opinion Mining and Sentiment Analysis: The Case Study of the Papal Basilica and Sacred Convent of Saint Francis in Assisi, Italy. 1-5 - Ana Ferreira, Joana Muchagata:
TagUBig - Taming Your Big Data. 1-5 - Joana Muchagata, Ana Ferreira:
Translating GDPR into the mHealth Practice. 1-5 - Chiara Lunerti, Richard M. Guest, Jon Baker, Pablo Fernández López, Raul Sánchez-Reillo:
Sensing Movement on Smartphone Devices to Assess User Interaction for Face Verification. 1-5 - Omar Gutierrez, Jeffreys J. Saavedra, Mayra Zurbarán, Augusto Salazar, Pedro M. Wightman:
User-Centered Differential Privacy Mechanisms for Electronic Medical Records. 1-5 - Bhashyam Balaji, Duncan England:
Quantum Illumination: A Laboratory Investigation. 1-4 - Arash Habibi Lashkari, Andi Fitriah Abdul Kadir, Laya Taheri, Ali A. Ghorbani:
Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification. 1-7 - Andreas Walz, Axel Sikora:
Maximizing and Leveraging Behavioral Discrepancies in TLS Implementations using Response-Guided Differential Fuzzing. 1-5 - Attaullah Buriro, Rutger Van Acker, Bruno Crispo, Athar Mahboob:
AirSign: A Gesture-Based Smartwatch User Authentication. 1-5 - Fatma Al Maqbali, Chris J. Mitchell:
Email-based Password Recovery - Risking or Rescuing Users? 1-5 - Zahid Akhtar, João Monteiro, Tiago H. Falk:
Adversarial Examples Detection Using No-Reference Image Quality Features. 1-5 - Christer J. Wilkinson:
Airport Staff Access Control: Biometrics at Last? 1-8 - Fabio Garzia, Mara Lombardi, Mario Fargnoli, Soodamani Ramalingam:
PSA-LOPA - A Novel Method for Physical Security Risk Analysis based on Layers of Protection Analysis. 1-5 - Nicanor García-Ospina, Juan Rafael Orozco-Arroyave, Jesús Francisco Vargas-Bonilla:
Speaker Verification System for Online Education Platforms. 1-5 - Ines Goicoechea-Telleria, Ana Garcia-Peral, Anas Husseis, Raul Sánchez-Reillo:
Presentation Attack Detection Evaluation on Mobile Devices: Simplest Approach for Capturing and Lifting a Latent Fingerprint. 1-5 - Chaofan Wang, Michael Olson, Benjamin Sherman, Nyambuu Dorjkhand, Joseph Mehr, Shailesh Singh:
Enhanced Buried Perimeter Protection using A Fiber-Optic Target Classification Sensor. 1-5 - David Luong, Bhashyam Balaji, Chung Wai Sandbo Chang, Vadiraj Manjunath, Ananthapadmanabha Rao, Christopher M. Wilson:
Microwave Quantum Radar: An Experimental Validation. 1-5 - William M. S. Stout:
Toward a Multi-Agent System Architecture for Insight & Cybersecurity in Cyber-Physical Networks. 1-5 - Vladimir Smejkal, Jindrich Kodl, Frantisek Hortai, Petr Tesar:
About the Abuse Options of the Dynamic Biometric Signature. 1-6 - Jalil Nourmohammadi-Khiarak, Andrzej Pacut:
An Ear Anti-Spoofing Database with Various Attacks. 1-5 - Ann E. Speed, Bryana L. Woo, Camron G. Kouhestani, Jaclynn J. Stubbs, Gabriel C. Birch:
Human Factors in Security. 1-5 - Krystyna Ljubymenko, Milan Adamek:
Security Personnel of New Generation. 1-4 - Ana Ferreira:
Why Ransomware Needs A Human Touch. 1-5 - Jaclynn J. Stubbs, Camron G. Kouhestani, Bryana L. Woo, Gabriel C. Birch:
Counter Unmanned Aerial System Security Education. 1-5 - Alessandro Di Federico, Pietro Fezzardi, Giovanni Agosta:
rev.ng: A Multi-Architecture Framework for Reverse Engineering and Vulnerability Discovery. 1-5 - Lindemberg Naffah Ferreira:
Comparing Brazilian Platforms for Monitoring Roads, Designed to Support Law Enforcement. 1-5 - George D. O'Mahony, Philip J. Harris, Colin C. Murphy:
Analyzing the Vulnerability of Wireless Sensor Networks to a Malicious Matched Protocol Attack. 1-5 - Chaofan Wang, Michael Olson, Benjamin Sherman, Nyambuu Dorjkhand, Joseph Mehr, Shailesh Singh:
Reliable Leak Detection in Pipelines Using Integrated DdTS Temperature and DAS Acoustic Fiber-Optic Sensor. 1-5 - Meghan A. Galiardi, Stephen J. Verzi, Gabriel C. Birch, Jaclynn J. Stubbs, Bryana L. Woo, Camron G. Kouhestani:
Physical Security Assessment Using Temporal Machine Learning. 1-5 - Nicole Hättenschwiler, Sarah Merks, Adrian Schwaninger:
Airport Security X-Ray Screening of Hold Baggage: 2D Versus 3D Imaging and Evaluation of an on-Screen Alarm Resolution Protocol. 1-5 - Miguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte, Rejean Plamondon:
A Biometric Attack Case Based on Signature Synthesis. 1-6 - Sarah Merks, Nicole Hättenschwiler, Melina Zeballos, Adrian Schwaninger:
X-ray Screening of Hold Baggage: Are the Same Visual-Cognitive Abilities Needed for 2D and 3D Imaging? 1-5 - Armanas Povilionis, Franco Arcieri, Maurizio Talamo, Indiraiith Viji Ananth, Christian H. Schunck, Peter Rosengren, Jesper Thestrup, Jutta G. Richter, Agostino Chiaravalottik, Orazio Schillaci, Henrike Gappa, Carlos A. Velasco:
Identity Management, Access Control and Privacy in Integrated Care Platforms: The PICASO Project. 1-5 - Anton Siser, Ladislav Maris, David Rehak, Witalis Pellowski:
The use of Expert Judgement as the Method to Obtain Delay Time Values of Passive Barriers in the Context of the Physical Protection System. 1-5 - Pierpaolo Napolitano, Giuliano Rossi, Mara Lombardi, Fabio Garzia, Massimo Ilariucci, Giuseppe Forino:
Threats Analysis and Security Analysis for Critical Infrastructures: Risk Analysis Vs. Game Theory. 1-5 - Ramon Blanco-Gonzalo, Barbara Corsetti, Ines Goicoechea-Telleria, Anas Husseis, Judith Liu-Jimenez, Raul Sánchez-Reillo, Teodors Eglitis, Elakkiya Ellavarason, R. M. Guest, Chiara Lunerti, M. Azimi, J. Khiarak, Salatiel Ezennaya-Gomez, Nicholas Whiskerd, R. Kuzu, Ebenezer Okoh:
Attacking a Smartphone Biometric Fingerprint System: A Novice's Approach. 1-5 - Jimmy Anderson Florez Zuluaga, Jesús Francisco Vargas-Bonilla, José David Ortega Pabón, Carlos Mario Suarez Rios:
Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent Tools. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.